A Process is No One - Hunting for Token Manipulation
Offered By: Black Hat via YouTube
Course Description
Overview
Syllabus
Introduction
What is Hunting
Normal Hunt Cycle
Hypothesis Driven Hunting
Benefits
HypothesisDriven Hunting
Hacker Lifecycle
Mitre Attack Framework
Tactics Techniques Procedures
Tactics
Procedures
Why is this useful
What is this process
Building the hunt hypothesis
Identifying the tactic
Identifying the procedures
Scope
Documentation
Conclusion
Benefit
Tactics and Techniques
Access Token Manipulation
Windows Authentication
Access tokens
Token types
General overview
Token impersonation
Visualization
Create a Process
Make an Impostor Token
Create a New logon session
Collection Requirements
Collecting Access Tokens
Get Access Token
Impersonation
GetSystem
Kerberos ticket granting ticket
Get Kerberos ticket granting ticket
Make token attack
Scope of analysis
Excluded factors
Demo
Questions
Taught by
Black Hat
Related Courses
TOTAL: CompTIA CySA+ Cybersecurity Analyst (CS0-003)Udemy Operationalizing Cyber Threat Intel: Pivoting & Hunting
Pluralsight Threat Hunting with Yara
Pluralsight Enterprise Security: Policies, Practices, and Procedures
Pluralsight Managing and Responding to Security Events Using Azure Sentinel
Pluralsight