Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Spooky Authentication at a Distance - Post-exploitation Techniques for Windows Environments

DEFCONConference via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Watch a 45-minute DEF CON 31 conference talk exploring an innovative post-exploitation technique for proxying Windows authentication protocols remotely without requiring elevated privileges. Learn how security professionals can achieve complete user impersonation on their own machines using only a basic agent on the target system. Discover the real-world applications of this technique through a demonstration of executing a no-interaction, full domain takeover using malicious peripherals in a simulated restricted environment.

Syllabus

DEF CON 31 - Spooky Authentication at a Distance - Tamas Jos

Taught by

DEFCONConference

Reviews

Start your review of Spooky Authentication at a Distance - Post-exploitation Techniques for Windows Environments

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.