Explore Windows attack techniques and privilege escalation methods in this comprehensive conference talk from DerbyCon 3.0. Delve into topics such as local exploits, credential hunting, unattended installations, user permissions, and service vulnerabilities. Learn about advanced techniques like binary replacement, process debugging, password extraction, and wireless configuration exploitation. Discover persistence methods, including password filters, command-line tunneling, and patch manipulation. Gain insights into authentication bypasses and persistence techniques, such as stealing SSL cookies and exploiting DEP exclusions. Enhance your understanding of Windows security vulnerabilities and attack vectors through this in-depth presentation by Rob Fuller and Chris Gates.
Windows Attacks At Is The New Black - Rob Fuller And Chris Gates