Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Locked Down, Not Locked Out - How I Escaped Your Secure Operator Workstation

DEFCONConference via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn how to identify and exploit common security vulnerabilities in "locked down" operator workstations through this 25-minute DEF CON 33 conference talk. Discover recurring security flaws that penetration testers exploit across multiple industries, including misconfigurations, weak application controls, and overlooked "living off the land" techniques that allow attackers to break out of restricted environments using only standard operator account permissions and local machine tools. Explore real-world breakout scenarios demonstrating how attackers escalate privileges and compromise systems without triggering security alerts, while examining why these vulnerabilities persist despite variations in vendor solutions and industry-specific constraints. Gain practical, vendor-agnostic defense strategies to harden operator workstations against these common attack vectors, making it significantly more difficult for attackers to succeed in compromising critical systems.

Syllabus

DEF CON 33 - Locked Down, Not Locked Out: How I Escaped Yr Secure Operator Workstation - Aaron Boyd

Taught by

DEFCONConference

Reviews

Start your review of Locked Down, Not Locked Out - How I Escaped Your Secure Operator Workstation

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.