Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore secure and insecure remote operations in Windows environments through this technical conference talk. Dive into hands-on examples for both offensive and defensive teams, examining the pros and cons of various remote administration tools, protocols, and APIs. Learn about jump server architectures, role-based shells, and creative ways to limit PowerShell. Discover fresh research on achieving full token hijacking from network logon-type sessions without using hashes or TGTs. Gain valuable insights for improving remote operations security and understanding potential attack vectors in Windows-based systems.