Searching for RPC Functions to Coerce Authentications in Microsoft Protocols

Searching for RPC Functions to Coerce Authentications in Microsoft Protocols

Black Hat via YouTube Direct link

Intro

1 of 13

1 of 13

Intro

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Searching for RPC Functions to Coerce Authentications in Microsoft Protocols

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Required information to call a Remote Procedure
  3. 3 Remote Procedures manipulating files
  4. 4 Automated search of RPCs triggering authentications
  5. 5 Parsing Microsoft Open Specifications documentation
  6. 6 Microsoft Open Specifications structure
  7. 7 Parsing Interface Definition Language (IDL)
  8. 8 Searching for interesting RPC functions
  9. 9 Autogenerating proof of concept python scripts
  10. 10 IDL types vs Impacket types
  11. 11 Windows coerced authentications methods
  12. 12 Coercer: mode scan
  13. 13 Defense techniques

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.