Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Watch a 45-minute DEF CON 31 conference talk exploring an innovative post-exploitation technique for proxying Windows authentication protocols remotely without requiring elevated privileges. Learn how security professionals can achieve complete user impersonation on their own machines using only a basic agent on the target system. Discover the real-world applications of this technique through a demonstration of executing a no-interaction, full domain takeover using malicious peripherals in a simulated restricted environment.