Главная
Study mode:
on
1
DEF CON 31 - Spooky Authentication at a Distance - Tamas Jos
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Watch a 45-minute DEF CON 31 conference talk exploring an innovative post-exploitation technique for proxying Windows authentication protocols remotely without requiring elevated privileges. Learn how security professionals can achieve complete user impersonation on their own machines using only a basic agent on the target system. Discover the real-world applications of this technique through a demonstration of executing a no-interaction, full domain takeover using malicious peripherals in a simulated restricted environment.

Spooky Authentication at a Distance - Post-exploitation Techniques for Windows Environments

DEFCONConference
Add to list
0:00 / 0:00