Главная
Study mode:
on
1
Intro
2
Encyclopedia of Windows Privilege Escalation
3
Old Skewl Local Exploits
4
Look For Creds On The Box
5
Unattended Installs - Client
6
Unattended Installs - Server
7
User Permissions
8
AlwaysInstallElevated
9
Missing Autoruns
10
Service Quoting - CVE-2000-1128
11
Service Quoting (Manual)
12
DLL Loading or Bad permissions
13
Pentest Monkey Script to Check
14
MSF getsystem
15
Binary Replacement
16
Debugging CMD.exe
17
Passwords - best persistence method
18
Passwords through process dumping
19
Rename on next reboot
20
Exporting Wireless Configs
21
BITSADMIN Downloader/Exec
22
Password Filters (requires reboot)
23
Password Filters hooking, no reboot
24
Command Line PPTP Tunnel
25
Just uninstall a patch
26
LNK (Shortcuts) with UNC icons
27
Auth and Persistence
28
Stealing SSL Cookies
29
DEP Exclusions
Description:
Explore Windows attack techniques and privilege escalation methods in this comprehensive conference talk from DerbyCon 3.0. Delve into topics such as local exploits, credential hunting, unattended installations, user permissions, and service vulnerabilities. Learn about advanced techniques like binary replacement, process debugging, password extraction, and wireless configuration exploitation. Discover persistence methods, including password filters, command-line tunneling, and patch manipulation. Gain insights into authentication bypasses and persistence techniques, such as stealing SSL cookies and exploiting DEP exclusions. Enhance your understanding of Windows security vulnerabilities and attack vectors through this in-depth presentation by Rob Fuller and Chris Gates.

Windows Attacks At Is The New Black - Rob Fuller And Chris Gates

Add to list