Главная
Study mode:
on
1
Intro
2
Who are we
3
Agenda
4
Primer
5
Pass a Hash
6
Attacker Mindset
7
Credentials
8
One Entry Point
9
Expanding
10
How to Detect
11
Centralized Logging
12
Event Logs
13
Example
14
A logon
15
Metasploit
16
Domain Domain User
17
Conclusion
18
Questions
Description:
Explore the critical importance of detecting more than just Pass-the-Hash attacks in this 29-minute Black Hat conference talk. Delve into the world of compromised credentials, understanding why they remain a persistent threat in cybersecurity. Learn systematic approaches to prevent credential abuse and discover more efficient detection techniques beyond traditional IoCs. Gain insights from security experts Matt Hathaway and Jeff Myers as they break down the attacker's mindset, discuss various entry points, and demonstrate practical examples using tools like Metasploit. Understand the significance of centralized logging and event analysis in identifying and mitigating credential-based threats across domains.

Why You Need to Detect More Than Pass-the-Hash

Black Hat
Add to list