Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Spooky Authentication at a Distance - Post-exploitation Techniques for Windows Environments

DEFCONConference via YouTube

Overview

Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Watch a 45-minute DEF CON 31 conference talk exploring an innovative post-exploitation technique for proxying Windows authentication protocols remotely without requiring elevated privileges. Learn how security professionals can achieve complete user impersonation on their own machines using only a basic agent on the target system. Discover the real-world applications of this technique through a demonstration of executing a no-interaction, full domain takeover using malicious peripherals in a simulated restricted environment.

Syllabus

DEF CON 31 - Spooky Authentication at a Distance - Tamas Jos

Taught by

DEFCONConference

Reviews

Start your review of Spooky Authentication at a Distance - Post-exploitation Techniques for Windows Environments

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.