YoVDO

Attacking EvilCorp - Anatomy of a Corporate Hack

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Ethical Hacking Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the anatomy of a corporate hack in this 52-minute conference talk from Derbycon 2016. Delve into the world of cybersecurity as Sean Metcalf and Will Schroeder guide you through the process of attacking a fictional corporation, EvilCorp. Learn about various hacking techniques, including enumeration, local group manipulation, token stealing, and subversive profiles. Discover the intricacies of Kerberos exploitation and targeted compromise strategies. Examine the concept of Root CID 509 and its implications. Conclude with valuable insights on mitigations to protect against such attacks. Gain a comprehensive understanding of corporate hacking methodologies and defense mechanisms in this informative presentation.

Syllabus

Intro
About us
Shortcut
Digging Deeper
Enumerating
Get Local Group
Steal Tokens
Subversive Profiles
Kerberos Team
Targeted Compromise
Kerberos Service Ticket
Root CID 509
Mitigations


Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube