Preventing Credential Theft Lateral Movement After Initial Compromise
Offered By: YouTube
Course Description
Overview
Explore techniques for preventing credential theft and lateral movement after initial compromise in this BSides Cleveland 2016 conference talk. Delve into topics such as red team strategies, secure configuration, Netbios, and ARP spoofing. Learn about the importance of audits, the concept of honey users, and the potential risks associated with the dark web. Gain insights from live demonstrations and practical examples to enhance your understanding of cybersecurity defense mechanisms.
Syllabus
Intro
Overview
Slides
Im not normal
The first day of reckoning
Red Team
Homer Simpson
Why are we doing this
Use side
Audits
Secure Configuration
Netbios
Demo
Its not magic
Live demo
The dark web
ARP spoofing
A caution
wretch32
honey users
Related Courses
Your IPv6 Default Config Meets FOCA - And Starts to CryWEareTROOPERS via YouTube Lack of Self Isolation - Inside a Container Exploit
Docker via YouTube Exploiting the Netlogon Protocol
Hack In The Box Security Conference via YouTube Wireshark Network Analysis - Network Management Tools
Write your own Operating System via YouTube ARP Spoofing and Poisoning: Understanding Man-in-the-Middle Attacks - Demo
Satish C J via YouTube