Главная
Study mode:
on
1
Intro
2
Overview
3
Slides
4
Im not normal
5
The first day of reckoning
6
Red Team
7
Homer Simpson
8
Why are we doing this
9
Use side
10
Audits
11
Secure Configuration
12
Netbios
13
Demo
14
Its not magic
15
Live demo
16
The dark web
17
ARP spoofing
18
A caution
19
wretch32
20
honey users
Description:
Explore techniques for preventing credential theft and lateral movement after initial compromise in this BSides Cleveland 2016 conference talk. Delve into topics such as red team strategies, secure configuration, Netbios, and ARP spoofing. Learn about the importance of audits, the concept of honey users, and the potential risks associated with the dark web. Gain insights from live demonstrations and practical examples to enhance your understanding of cybersecurity defense mechanisms.

Preventing Credential Theft Lateral Movement After Initial Compromise

Add to list
0:00 / 0:00