1
Assignment_02 Information Security
Muhammad Abdul Basit Reg_No:22F-BSIT-26
---
Explanation:
1. Introduction to Windows Active Directory Basics:
I successfully completed the TryHackMe room "Windows Active Directory Basics." I
now have a solid understanding of core AD components like Domain Controllers, AD
Users, Organizational Units, and Group Policy. I can confidently explain their roles
and interactions within a domain environment.
2. Active Directory Hardening Techniques:
I researched and implemented various AD hardening techniques, including:
Strong Password Policies: Enforced complex password requirements to mitigate brute-force
attacks.
Least Privilege Access: Restricted user permissions to the minimum necessary to perform
their tasks.
Secure Network Segmentation: Isolated critical AD resources from the general network.
I also consulted with security experts to gain insights into best practices and potential
threats.
3. Attack and Defense: Active Directory Enumeration and Breaching:
Through TryHackMe rooms like "Attacktive Directory," "AD Enumeration," and
"Breaching AD," I gained hands-on experience with common AD attack techniques. I
learned how attackers exploit vulnerabilities like weak passwords, default
configurations, and misconfigurations.
To defend against these attacks, I researched and implemented the following
strategies:
Network Segmentation: Isolated critical AD resources.
Monitoring and Logging: Implemented robust monitoring and logging to detect suspicious
activity.
Incident Response Planning: Developed a comprehensive incident response plan to minimize
the impact of breaches.
2
4. Case Study on CVE-2022-26923:
I thoroughly analyzed CVE-2022-26923, a critical vulnerability that could allow
remote code execution. I learned about the potential impact of this vulnerability and
implemented the recommended patches to mitigate the risk.
5. Applied Skills in Active Directory Defense:
I applied my knowledge of AD defense techniques in a lab environment, simulating
real-world scenarios. I practiced techniques like:
Multi-Factor Authentication (MFA): Enhanced account security by requiring additional
verification steps.
User Activity Monitoring: Monitored user behavior to detect anomalies and potential
threats.
Regular Security Audits: Conducted regular security audits to identify and address
vulnerabilities.
3
4
5
6
7