Главная
Study mode:
on
1
Intro
2
black hat What We Will Show
3
black hat Attackers Move Laterally...
4
blackhat Kerberos
5
black hat MSRPC - Microsoft Remote Procedure Call
6
black hat GSSAPI / SSPI
7
black hat TLS (Transport Layer Security)
8
black hat CredSSP
9
black hat RDP (Remote Desktop Protocol)
10
black hat RDP Flow
11
black hat RDP - Certificate Validation
12
blackhat Protocols Recap
13
black hat The Journey
14
black hat Do You See the issue?
15
blackhat Vulnerability Flow Chart
16
black hat RSA Quick Overview
17
blackhat "Broken" RSA
18
blackhat Requirement For Public Key
19
black hat Finding A Suitable Protocol
20
black hat MSRPC!
21
blackhat #1 Try - Exploiting NTLM
22
blackhat #2 Try - Exploiting Kerberos
23
black hat Exploit Details
24
black hat Success!
25
black hat Should I care?
26
black hat Affected Systems
27
black hat Patch Details
28
black hat Disclosure Timeline
29
black hat Tools
30
blackhat Key Takeaways
Description:
Explore a chosen-plaintext attack exploiting a logical vulnerability in Windows authentication protocols, particularly focusing on Remote Desktop Protocol (RDP). Delve into the intricacies of network security, examining how attackers can move laterally through systems using various protocols such as Kerberos, MSRPC, GSSAPI/SSPI, TLS, and CredSSP. Understand the RDP flow and certificate validation process, and discover the journey that led to identifying this vulnerability. Learn about RSA encryption, the requirements for public keys, and the process of finding a suitable protocol for exploitation. Follow the presenters' attempts to exploit NTLM and Kerberos, leading to a successful attack. Gain insights into the affected systems, patch details, and disclosure timeline. Acquire knowledge about relevant tools and key takeaways to enhance your understanding of this critical security issue in Windows authentication protocols.

Server Tailgating - A Chosen-Plaintext Attack on RDP

Black Hat
Add to list