Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Watch a 45-minute DEF CON 31 conference talk exploring an innovative post-exploitation technique for proxying Windows authentication protocols remotely without requiring elevated privileges. Learn how security professionals can achieve complete user impersonation on their own machines using only a basic agent on the target system. Discover the real-world applications of this technique through a demonstration of executing a no-interaction, full domain takeover using malicious peripherals in a simulated restricted environment.