Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Windows Security
#Windows Privilege Escalation
Showing:
143
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
HackerSploit
Penetration Testing Bootcamp
24
rewiews
Learn the basics of Penetration Testing and get introduced to Web Application penetration testing with this course that is a part of the open source cybersecurity training initiative.
Add to list
49
Lesons
10 hours
On-Demand
Free-Video
Cyber Mentor
NTLM Relay, Token Impersonation, Pass the Hash, PsExec, and More
0
rewiews
Explore advanced Active Directory exploitation techniques including NTLM relay, token impersonation, and pass-the-hash attacks. Learn practical skills for penetration testing and network security.
Add to list
31
Lesons
2 hours 8 minutes
On-Demand
Free-Video
Windows Server and Active Directory Penetration Testing
0
rewiews
Learn comprehensive Active Directory penetration testing techniques for Windows Server, covering privilege escalation, persistence, and advanced exploits using various tools and methodologies.
Add to list
28
Lesons
20 hours
On-Demand
Free-Video
Linode
Windows Privilege Escalation Techniques - Red Team Series
0
rewiews
Learn advanced Windows privilege escalation techniques, including UAC bypass, kernel exploits, and token impersonation. Enhance your red team skills with practical demonstrations and in-depth explanations.
Add to list
12
Lesons
46 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Windows Event Log Persistence Techniques - Bypassing Protections and Maintaining Access
0
rewiews
Explore Windows Event Log persistence techniques, bypassing security measures, and elevating privileges in red team operations. Learn innovative approaches for undetectable attacks using Windows itself.
Add to list
1
Lesons
40 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Silent Steps in Windows Using Syscalls - Evading AV/EDR Defenses
0
rewiews
Explora cómo utilizar syscalls en Windows para evadir defensas AV/EDR, analizando su funcionamiento e interacción mediante ingeniería inversa para lograr evasiones efectivas.
Add to list
1
Lesons
36 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Windows Privilege Escalation Techniques - Ekoparty Summer Workshop 2024
0
rewiews
Taller práctico de post-explotación en Windows, enfocado en técnicas de escalada de privilegios y ataques "Living off the land". Cubre recopilación de información, servicios inseguros, UAC bypass y automatización.
Add to list
1
Lesons
1 hour 54 minutes
On-Demand
Free-Video
Cyber Mentor
Attacktive Directory Walkthrough - TryHackMe
0
rewiews
Comprehensive walkthrough of Active Directory exploitation techniques on TryHackMe platform, covering reconnaissance, privilege escalation, and lateral movement strategies.
Add to list
1
Lesons
37 minutes
On-Demand
Free-Video
Cyber Mentor
Print Nightmare - Domain Controller Domination
0
rewiews
Explore the Print Nightmare vulnerability and its impact on domain controllers. Learn about this critical security flaw and its potential for system compromise in Windows environments.
Add to list
1
Lesons
12 minutes
On-Demand
Free-Video
Cyber Mentor
Domain Admin via IPv6 DNS Takeover
0
rewiews
Explore obtaining domain admin privileges through IPv6 DNS takeover using mitm6. Learn about NTLM relaying, Kerberos delegation, and compromising IPv4 networks via IPv6.
Add to list
1
Lesons
11 minutes
On-Demand
Free-Video
Bill Buchanan OBE
Security Scan with Nessus - Comprehensive Guide
0
rewiews
Learn to perform security scans using Nessus, covering policy creation, scanning techniques, and interpreting results for various systems including web servers and Windows.
Add to list
14
Lesons
26 minutes
On-Demand
Free-Video
Cyber Mentor
Windows Privilege Escalation for Beginners
0
rewiews
Learn techniques for escalating privileges on Windows systems, from initial foothold to advanced attacks like kernel exploits and impersonation, with hands-on demonstrations.
Add to list
12
Lesons
3 hours 12 minutes
On-Demand
Free-Video
Pass the Hash Techniques for Advanced Network Penetration - Lecture 10
0
rewiews
Learn advanced techniques for Pass the Hash attacks, enhancing your penetration testing skills and understanding of network security vulnerabilities.
Add to list
1
Lesons
38 minutes
On-Demand
Free-Video
Windows Command Line Incident Response - Outerz0ne 2011
0
rewiews
Explore Windows command line tools for effective incident response, enhancing your ability to investigate and mitigate security breaches efficiently.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
BruCON Security Conference
Attack Surface and Security Implications of eSIM Technology
0
rewiews
Explore the security vulnerabilities and potential risks associated with eSIM technology in mobile phones and desktop devices, raising awareness about offensive operations and post-compromise scenarios.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
OWASP Foundation
Hacking Alexa and Cortana: Vulnerabilities in Voice Assistant Partnerships
0
rewiews
Explore innovative "Evil Maid" attacks on Windows, vulnerabilities in Cortana-Alexa integration, and the challenges of merging new concepts with existing security mechanisms. Gain insights into AI and IoT security.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
Security Onion
Pcaps Ahoy! Commodity Malware Infections on Windows Hosts - Security Onion Conference 2018
0
rewiews
Explore commodity malware infections on Windows hosts through packet capture analysis, enhancing your network security skills and threat detection capabilities.
Add to list
1
Lesons
33 minutes
On-Demand
Free-Video
Cooper
WHIDS Integration with MISP
0
rewiews
Explore WHIDS integration with MISP for enhanced threat intelligence sharing and incident response capabilities in cybersecurity operations.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
Cooper
Exploiting Group Policy Objects for Persistence and Lateral Movement
0
rewiews
Explore how Group Policy Objects can be exploited for malware distribution and network persistence. Learn about PowershellEmpire modules and countermeasures for enhanced cybersecurity in enterprise environments.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
Cooper
The Rise of Malicious MSIX Files
0
rewiews
Explore the emerging threat of malicious MSIX files, their impact on cybersecurity, and strategies for detection and prevention in this insightful conference presentation.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
HackerSploit
Windows Red Team Lateral Movement Techniques - PsExec and RDP
0
rewiews
Explore lateral movement techniques on Windows using PsExec and RDP. Learn how adversaries pivot through systems to gain access and achieve objectives stealthily.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
HackerSploit
Windows Red Team Privilege Escalation Techniques - Bypassing UAC and Kernel Exploits
0
rewiews
Explore Windows privilege escalation techniques, including UAC bypassing and kernel exploits. Learn adversarial methods to gain higher system permissions and enhance your cybersecurity skills.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
HackerSploit
Windows Red Team - Dynamic Shellcode Injection and PowerShell Obfuscation
0
rewiews
Explore dynamic shellcode injection into executables and PowerShell obfuscation for Windows defense evasion. Learn advanced techniques to avoid detection during system compromise.
Add to list
1
Lesons
37 minutes
On-Demand
Free-Video
HackerSploit
Installing and Configuring Wazuh for SIEM - Blue Team Operations
0
rewiews
Learn to set up Wazuh SIEM for detecting intrusions, attacks, and malicious activity. Covers installation and agent configuration on Windows and Linux for effective security data management.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
HackerSploit
Bypassing UAC with UACMe - HEK.SI 2022 Conference Presentation
0
rewiews
Comprehensive guide to bypassing User Account Control on Windows 10 for privilege escalation, presented at HEK.SI 2022. Covers techniques using UACMe tool to elevate privileges and enhance system access.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
HackerSploit
Windows Enumeration with winPEAS
0
rewiews
Automate Windows local enumeration and identify privilege escalation vectors using winPEAS. Learn efficient techniques for system analysis and vulnerability detection.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
OffensiveCon
The Print Spooler Bug that Wasn't in the Print Spooler
0
rewiews
Explore a unique Windows vulnerability discovery, from initial bug report to full exploit chain, with insights on Microsoft's patch process and security implications.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
Black Hat
Unveiling the Cracks in Virtualization - VMware Workstation Escape
0
rewiews
Explore VMware Workstation vulnerabilities, focusing on USB controller exploits. Learn about information leakage, arbitrary read/write, and bypassing Windows protections in virtualization escapes.
Add to list
1
Lesons
37 minutes
On-Demand
Free-Video
DefCamp
Deep Dive Into DLL Hijacking - Discovery, Automation and Impact
0
rewiews
Explore DLL hijacking techniques, including discovery methods, automation processes, and potential impacts in this cybersecurity presentation from DefCamp 2023.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
John Hammond
The Mark of the Web - Understanding Internet Security Zones
0
rewiews
Explore the Mark of the Web security feature, its impact on file downloads, and how it affects system protection and user experience in Windows operating systems.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
Black Hat
From BYOVD to 0-Day - Unveiling Advanced Exploits in Cyber Recruiting Scams
0
rewiews
Unveiling sophisticated cyber-attacks disguised as job recruitment, featuring 0-day exploits and advanced rootkit capabilities. Explores novel attack methods targeting Asia, bypassing security measures.
Add to list
1
Lesons
37 minutes
On-Demand
Free-Video
HackMiami
Impacket Tools for Pentesting Secure Environments - 02-11-2023
0
rewiews
Explore advanced pentesting techniques for secure environments using Responder, CrackMapExec, and Impacket utilities. Enhance your cybersecurity skills.
Add to list
1
Lesons
32 minutes
On-Demand
Free-Video
HackMiami
Hunting File System Redirection Bugs Through Instrumentation
0
rewiews
Explore file system redirection vulnerabilities and learn advanced techniques for identifying and exploiting these security risks in Windows systems.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
Dr Josh Stroschein
Binary File Dissection with Malcat - Features and Live Demo
0
rewiews
Explore Malcat's powerful features for binary file analysis. Dive into hexadecimal editing, disassembly, and live demo of NSIS dropper dissection and shellcode emulation with the creator.
Add to list
1
Lesons
1 hour 47 minutes
On-Demand
Free-Video
Association for Computing Machinery (ACM)
Automated Implementation of Windows-Related Security-Configuration Guides
0
rewiews
Explore automated implementation of Windows security guides using NLP and verification techniques. Learn about extraction, research questions, and current limitations in this field.
Add to list
7
Lesons
21 minutes
On-Demand
Free-Video
SyScan360
Windows Systems and Code Signing Protection
0
rewiews
Explore Windows systems and code signing protection techniques, focusing on security vulnerabilities and mitigation strategies for software developers and cybersecurity professionals.
Add to list
1
Lesons
26 minutes
On-Demand
Free-Video
SyScan360
Abusing Symbolic Links on Windows - A Link to the Past
0
rewiews
Explore techniques for exploiting symbolic links on Windows systems, uncovering potential vulnerabilities and security risks in file system operations.
Add to list
1
Lesons
40 minutes
On-Demand
Free-Video
HackerSploit
TryHackMe Ice - Walkthrough - Windows Privilege Escalation
0
rewiews
Comprehensive walkthrough of Windows exploitation and post-exploitation techniques using TryHackMe's Ice challenge, covering essential skills for penetration testing and privilege escalation.
Add to list
1
Lesons
33 minutes
On-Demand
Free-Video
HackerSploit
Windows Privilege Escalation - Token Impersonation With RoguePotato & PrintSpoofer
0
rewiews
Elevate Windows privileges using access token impersonation techniques RoguePotato and PrintSpoofer. Learn practical steps for privilege escalation in penetration testing and cybersecurity.
Add to list
1
Lesons
30 minutes
On-Demand
Free-Video
HackerSploit
Windows Privilege Escalation - Exploiting AutoRun Programs
0
rewiews
Demonstrating how to identify and exploit AutoRun programs in Windows Registry for privilege escalation, with practical examples and tools like winPEAS.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
Microsoft
Secure Your Workforce with Windows and Intune
0
rewiews
Explore Windows security features, IT services, and management tools for protecting devices and data across various work environments. Learn about innovations in Surface and Windows 365 for comprehensive business security.
Add to list
1
Lesons
34 minutes
On-Demand
Free-Video
Cooper
Undocumented Windows Hash Leak Vulnerability
0
rewiews
Uncover an undocumented Windows feature that leaks valuable hashes, enabling faster privilege escalation and domain admin access. Learn this simple yet powerful technique from experienced IT security specialists.
Add to list
1
Lesons
17 minutes
On-Demand
Free-Video
Cooper
Windows Systems and Code Signing Protection - Hack.lu 2016
0
rewiews
Explores Windows code signing mechanisms, kernel implications, rootkit bypass techniques, and user-land protections, focusing on authenticode and its impact on system security.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
ALPChecker: Detecting Spoofing and Blinding Attacks on ALPC - HITB 2023
0
rewiews
Presentation on ALPChecker, a new security tool designed to detect kernel mode attacks on Windows' ALPC mechanism, addressing vulnerabilities in inter-process communication.
Add to list
1
Lesons
19 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Privilege Escalation from Medium to High Integrity Level in Windows
0
rewiews
Unveiling a Windows design flaw allowing privilege escalation from Medium to High integrity level, demonstrating a 100% reliable exploit on the latest Windows versions.
Add to list
1
Lesons
34 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Windows Agentless C2 - Abusing the MDM Client Stack
0
rewiews
Unveils innovative research on exploiting Windows MDM stack for agentless C2 systems. Explores vulnerabilities, custom C2 server creation, and remote device control techniques, inspiring new defensive strategies.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
HackMiami
Hunting File System Redirection Bugs Through Instrumentation
0
rewiews
Explore file system redirection vulnerabilities and learn dynamic testing techniques using Microsoft's Detours for effective bug hunting in Windows systems.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
OffensiveCon
Attacking Windows Device Drivers: Almost Escaping the Sandbox
0
rewiews
Explore techniques for attacking Windows device drivers and potential sandbox escape methods in this advanced security analysis presentation.
Add to list
1
Lesons
30 minutes
On-Demand
Free-Video
OffensiveCon
Practical Exploitation of Registry Vulnerabilities in the Windows Kernel
0
rewiews
Explore practical exploitation techniques for Windows kernel registry vulnerabilities, enhancing your understanding of system security and potential attack vectors.
Add to list
1
Lesons
54 minutes
On-Demand
Free-Video
OffensiveCon
Your Mitigations Are My Opportunities - Windows Exploitation and Bypass Techniques
0
rewiews
Explore Windows exploitation techniques, bypassing security measures like HVCI and EDR, with insights on disabling drivers and practical demonstrations.
Add to list
17
Lesons
50 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Securing Windows Workloads in Cloud Native Environments
0
rewiews
Learn strategies and best practices for enhancing security in Windows-based cloud environments, focusing on workload protection and risk mitigation.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
DEFCONConference
Winning the Game of Active Directory - Securing Against Common Attack Strategies
0
rewiews
Master essential Active Directory security strategies, from common attack vectors to implementing robust defensive measures for protecting enterprise environments and preventing network compromises.
Add to list
8
Lesons
43 minutes
On-Demand
Free-Video
HackerSploit
The Complete PGP Encryption Tutorial Using Gpg4win and GnuPG
0
rewiews
Comprehensive guide on using PGP encryption with Gpg4win and GnuPG on Windows and Linux. Learn to secure your communications and protect sensitive data effectively.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
Cooper
Matching Windows Event Log IDs with MITRE ATT&CK
0
rewiews
Explore Windows Event Log IDs and their correlation with MITRE ATT&CK framework, enhancing threat detection and incident response capabilities in cybersecurity.
Add to list
1
Lesons
30 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
WoW Hell - Rebuilding Heaven's Gate
0
rewiews
Explore WoW64 architecture, its translation mechanisms, and potential vulnerabilities. Learn about reverse engineering techniques and bypassing security measures in Windows systems.
Add to list
7
Lesons
34 minutes
On-Demand
Free-Video
Recon Conference
Living Off the Walled Garden
0
rewiews
Explore Windows security vulnerabilities in ELAM and PPL, revealing how overly-permissive rules can be exploited for malware protection and code execution, hampering detection efforts.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
Recon Conference
OopsSec - The Bad, the Worst, and the Ugly of APT
0
rewiews
Unveiling critical mistakes in APT campaigns across global threat actors, revealing advanced TTPs, and exploring real-time monitoring of sophisticated attacks. Insights on improving organizational defense against evolving threats.
Add to list
1
Lesons
1 hour
On-Demand
Free-Video
Recon Conference
The Last Generic Win32K KASLR Defeat in Windows
0
rewiews
Detailed exploration of Windows kernel security, focusing on KASLR defeats, heap vulnerabilities, and recent changes in RS4. Insights into potential exploits and current Windows KASLR state.
Add to list
1
Lesons
55 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Smartphones Insecurity
0
rewiews
Comprehensive analysis of smartphone vulnerabilities, exploring security flaws and potential exploits in mobile platforms. Insights from experienced security researchers on reverse engineering and exploit development.
Add to list
1
Lesons
59 minutes
On-Demand
Free-Video
WEareTROOPERS
Abusing Privileged File Operations on Windows
0
rewiews
Explore techniques for exploiting privileged file operations in Windows systems, uncovering potential vulnerabilities and security risks.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
WEareTROOPERS
Subverting Trust in Windows
0
rewiews
Explore techniques for manipulating Windows trust mechanisms, including code signing and execution policies, to bypass security controls and elevate privileges.
Add to list
1
Lesons
1 hour
On-Demand
Free-Video
Security BSides San Francisco
Using Ancient Math to Speed Up Security Assessments of Windows Executables
0
rewiews
Discover how to accelerate Windows executable security assessments using Euclidean Distance and Bayes Theorem, enabling rapid triage and efficient risk reduction in regulated environments.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
BruCON Security Conference
Disrupting the Kill Chain
0
rewiews
Comprehensive defense strategy for Windows environments, leveraging native Microsoft tools to disrupt cyber-attack kill chains. Covers detection, response, and automated remediation across various attack stages.
Add to list
1
Lesons
59 minutes
On-Demand
Free-Video
44CON Information Security Conference
IBM - Trusteer Rapport - Does IBM Intentionally Backdoor Machines?
0
rewiews
Investigates potential security concerns with IBM/Trusteer Rapport software, examining its code execution speed, system access, and implications for user privacy and system integrity.
Add to list
12
Lesons
36 minutes
On-Demand
Free-Video
Cooper
Abusing Bash for Windows
0
rewiews
Explore techniques for exploiting Bash on Windows, including remote shells, password extraction, and AppLocker bypasses. Learn about security implications and forensic considerations.
Add to list
23
Lesons
18 minutes
On-Demand
Free-Video
Microsoft
Windows - Building What Matters Most for Your Business
0
rewiews
Insider's view of top Windows features for secure hybrid work, including Windows 365, Intune, Defender, Teams, Loop, and Surface, presented by Microsoft's engineering leaders.
Add to list
14
Lesons
50 minutes
On-Demand
Free-Video
Black Hat
Detecting Access Token Manipulation
0
rewiews
Demystifying Windows access token manipulation attacks and providing effective detection strategies for defensive practitioners in enterprise environments.
Add to list
15
Lesons
39 minutes
On-Demand
Free-Video
Subverting Trust in Windows - A Case Study of the How and Why of Engaging in Security Research
0
rewiews
Explore Windows security research through a case study on subverting trust, covering dynamic analysis, code signatures, and PowerShell, with insights on validating trust and lessons learned.
Add to list
43
Lesons
49 minutes
On-Demand
Free-Video
Windows Event Logs - Zero to Hero
0
rewiews
Comprehensive guide to leveraging Windows Event Logs for security monitoring, from basic concepts to advanced techniques for threat detection and incident response.
Add to list
16
Lesons
48 minutes
On-Demand
Free-Video
Deploying PAWs as Part of a Strategy to Limit Credential Theft and Lateral Movement
0
rewiews
Explore strategies to limit credential theft and lateral movement using Privileged Access Workstations (PAWs), including deployment models, Active Directory setup, and network segmentation.
Add to list
32
Lesons
49 minutes
On-Demand
Free-Video
Black Hat
TeamTNT - Explosive Cryptomining
0
rewiews
Explore TeamTNT's cryptojacking tactics targeting Linux servers, including their attack methods, credential theft, and evolution from Docker instances to Windows systems.
Add to list
26
Lesons
31 minutes
On-Demand
Free-Video
Security BSides San Francisco
Building an Effective Intrusion Detection Program
0
rewiews
Learn to build an effective intrusion detection program using affordable tools. Covers cloud apps, endpoints, network security monitoring, and crowdsourced incident response to catch breaches quickly.
Add to list
21
Lesons
38 minutes
On-Demand
Free-Video
Black Hat
ZEROing Trust - Do Zero Trust Approaches Deliver Real Security?
0
rewiews
Analyze effectiveness of zero trust security across modern OS platforms, examining measurable properties to establish trust in various threat scenarios.
Add to list
1
Lesons
54 minutes
On-Demand
Free-Video
Black Hat
EBPF ELFs JMPing Through the Windows
0
rewiews
Explore eBPF for Windows: capabilities, security model, design, and attack surface. Uncover vulnerabilities, witness fuzzing demos, and discuss exploitation challenges in Windows Protected Process.
Add to list
1
Lesons
40 minutes
On-Demand
Free-Video
Black Hat
Safeguarding Your Business Assets Through Understanding of the Win32API
0
rewiews
Explore Win32API vulnerabilities and learn advanced techniques to protect business assets from potential security threats in Windows systems.
Add to list
1
Lesons
2 hours 2 minutes
On-Demand
Free-Video
Black Hat
DKOM - Direct Kernel Object Manipulation
0
rewiews
Explore advanced Windows kernel manipulation techniques, focusing on DKOM for stealthy system modifications and rootkit development.
Add to list
1
Lesons
1 hour 33 minutes
On-Demand
Free-Video
Black Hat
Addressing Complete Security to Save Money
0
rewiews
Explore comprehensive Windows security strategies to reduce costs and enhance protection in this insightful presentation on addressing vulnerabilities and implementing effective safeguards.
Add to list
1
Lesons
39 minutes
On-Demand
Free-Video
How Do I Detect Technique X in Windows - Applied Methodology to Definitively Answer This Question
0
rewiews
Learn a systematic approach to detect specific techniques in Windows, enhancing your ability to identify and analyze potential security threats and vulnerabilities.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Hunting Windows Desktop Window Manager Bugs
0
rewiews
Exploring Windows Desktop Window Manager vulnerabilities, focusing on DirectComposition UserSpace. Covers architecture, attack surfaces, and specific CVEs, offering insights into bug hunting techniques and security implications.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
WEareTROOPERS
Windows Hello from the Other Side
0
rewiews
Explore Windows Hello vulnerabilities and attack techniques in this IT security talk, covering biometric authentication weaknesses and potential exploits in Windows systems.
Add to list
1
Lesons
57 minutes
On-Demand
Free-Video
WEareTROOPERS
The Power of Coercion Techniques in Windows Environments
0
rewiews
Explore coercion techniques in Windows environments, their impact on IT security, and strategies for defense against these powerful attack vectors.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
Security BSides London
Layers on Layers - Bypassing Security for Fun and Profit V2
0
rewiews
Explore kernel vulnerabilities in Windows and their impact on security solutions. Learn how to bypass multiple layers of protection and discuss more robust defensive strategies.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Local Privilege Escalation in 2016
0
rewiews
Explore techniques for local privilege escalation on Windows and Unix systems, learning how to elevate user privileges to gain full system access in various scenarios.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Suborner - Windows Bribery for Invisible Persistence
0
rewiews
Discover a stealthy Windows persistence technique that creates invisible machine accounts, evades detection, and impersonates existing users. Learn about the Suborner Attack's implementation and effectiveness.
Add to list
1
Lesons
1 hour 4 minutes
On-Demand
Free-Video
Black Hat
Pass the Hash 2 - The Admin's Revenge
0
rewiews
Explore advanced strategies to detect and prevent Pass-The-Hash attacks in Windows networks, addressing vulnerabilities and enhancing enterprise security against lateral movement.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
Black Hat
Ozone HIPS - Unbreakable Windows
0
rewiews
Explore cutting-edge Host Intrusion Prevention System technology for Windows, enhancing system security and resilience against cyber threats.
Add to list
1
Lesons
1 hour 18 minutes
On-Demand
Free-Video
Black Hat
Shatter-Proofing Windows
0
rewiews
Explore techniques for enhancing Windows security against shatter attacks, focusing on vulnerabilities in message-passing mechanisms and potential safeguards for system integrity.
Add to list
1
Lesons
33 minutes
On-Demand
Free-Video
Black Hat
Virtual Private Problems
0
rewiews
Explore virtual private network vulnerabilities and security challenges in Windows environments, focusing on potential risks and mitigation strategies.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
Black Hat
Defense in Depth - Winning in Spite of Yourself - Foiling JD
0
rewiews
Comprehensive Windows security strategies: from email protection to advanced IP filtering. Learn to secure systems, disable vulnerable services, and implement robust defense measures.
Add to list
12
Lesons
1 hour 7 minutes
On-Demand
Free-Video
Black Hat
Windows Security Configuration Guide
0
rewiews
Comprehensive guide to configuring Windows security settings, covering best practices and advanced techniques for system administrators and security professionals.
Add to list
1
Lesons
1 hour 16 minutes
On-Demand
Free-Video
Black Hat
Deep Technical Audit - How to Mitigate Risks Presented in Other Sessions
0
rewiews
Comprehensive guide to mitigating Windows security risks through deep technical auditing, addressing vulnerabilities discussed in other sessions.
Add to list
1
Lesons
2 hours 2 minutes
On-Demand
Free-Video
Black Hat
How to Stay Up-To-Date On Security Patches
0
rewiews
Learn effective strategies for maintaining Windows 2002 security, including patch management techniques and best practices for staying current with the latest security updates.
Add to list
1
Lesons
1 hour 50 minutes
On-Demand
Free-Video
Black Hat
They'll Never See It Coming!
0
rewiews
Explore advanced Windows exploitation techniques and stealthy attack strategies to enhance your cybersecurity skills and stay ahead of potential threats.
Add to list
1
Lesons
1 hour 33 minutes
On-Demand
Free-Video
Black Hat
The Devil Inside - Planning Security in Active Directory Design
0
rewiews
Explore advanced security strategies for Active Directory design, focusing on proactive planning and robust protection against potential threats in Windows environments.
Add to list
1
Lesons
1 hour 15 minutes
On-Demand
Free-Video
44CON Information Security Conference
Lifting the Fog of War
0
rewiews
Explore MS-RPC's role in Windows, its vulnerabilities, and defensive mechanisms. Learn to utilize built-in features for tracking and defending against RPC-based attacks, with practical tools and signatures.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
Windows Attacks At Is The New Black - Rob Fuller And Chris Gates
0
rewiews
Explore Windows privilege escalation techniques, from local exploits to password manipulation, with insights on persistence methods and system vulnerabilities.
Add to list
29
Lesons
48 minutes
On-Demand
Free-Video
Windows Owned By Default
0
rewiews
Explore Windows vulnerabilities and default security flaws with expert Mark Baggett. Learn essential techniques for identifying and mitigating risks in Windows systems.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
Antipwny - A Windows Based IDS IPS for Metasploit
0
rewiews
Explore a Windows-based IDS/IPS for Metasploit, enhancing network security and threat detection capabilities through innovative defense mechanisms.
Add to list
1
Lesons
26 minutes
On-Demand
Free-Video
The TrueCrypt Audit - How It Happened and What We Found
0
rewiews
Comprehensive analysis of the TrueCrypt audit process, covering its inception, execution, findings, and aftermath. Explores broader implications for open-source security audits and cryptography.
Add to list
48
Lesons
55 minutes
On-Demand
Free-Video
Check Your Privileges - Futzing with File Shares for Low Hanging Fruit
0
rewiews
Explore SMB/CIFS vulnerabilities, bad defaults, and privilege escalation techniques in Windows networks. Learn practical security tweaks and tools for identifying and mitigating common file share risks.
Add to list
17
Lesons
44 minutes
On-Demand
Free-Video
load more...