Главная
Study mode:
on
1
Intro
2
The story begins
3
Windows Security Questions Feature Overview
4
Usage
5
The History of Security Questions
6
Windows Passwords vs. Security Questions
7
Security Attack Scenarios
8
Roadmap
9
LSA Secrets Introduction
10
LSA Secrets Encryption
11
LSA Secrets Permissions
12
blackhat Security Question LSA Secret
13
Remote LSA Secrets Read/Write Implementations
14
Remote Password Reset
15
Restore Previous Password
16
Demo
17
Goal Achieved
18
Recommendations
Description:
Explore an effective approach for creating persistence by exploiting vulnerabilities in Windows 10's security questions feature in this 23-minute Black Hat conference talk. Delve into how a well-intended security measure can become a potential threat, as presenters Magal Baz and Tom Sela demonstrate the risks associated with this feature introduced in April. Learn about LSA Secrets, their encryption and permissions, and how they relate to the new security questions. Discover remote LSA Secrets read/write implementations, remote password reset techniques, and methods to restore previous passwords. Witness a live demonstration of the exploit and gain valuable insights into recommendations for mitigating these security risks.

When Everyone's Dog is Named Fluffy - Abusing the Brand New Security Questions in Windows to Gain Domain-Wide Persistence

Black Hat
Add to list
0:00 / 0:00