Главная
Study mode:
on
1
Intro
2
Motivation
3
Major Breaches
4
Target Breach
5
Home Depot Breach
6
Missed Alarms
7
The Biggest Issue
8
US Senate Report
9
Summary
10
Las Vegas Sands
11
Saudi Aramco
12
Industry Response
13
Credential Theft
14
Malware Detection
15
Windows Passwords
16
MiniCATs
17
Boring Alternatives
18
Defending Against This
19
Hand Diagram
20
Credentials
21
hashes
22
why did this fail
23
local administrators group
24
check nondefault registry keys
25
force guests
26
special rights assignment
27
firewall policies
28
remote desktop
29
false positives
30
test domain
31
reused credentials
32
domain compromise
33
whats the biggest deal
34
how to prevent this
35
authentication policies in silos
36
what can we do offensively
37
password reuse
38
brute force
39
hash cap
40
check
Description:
Explore credential assessment mapping and privilege escalation techniques in this comprehensive conference talk from Derbycon 2015. Delve into major breaches, including Target and Home Depot, and analyze missed alarms and industry responses. Examine credential theft methods, Windows password vulnerabilities, and malware detection strategies. Learn about defending against these attacks through authentication policies, firewall configurations, and remote desktop security. Investigate offensive techniques such as password reuse, brute force attacks, and hash capture. Gain insights into preventing domain compromise and implementing effective security measures to protect against large-scale credential-based attacks.

Credential Assessment Mapping Privilege Escalation at Scale

Add to list
0:00 / 0:00