YoVDO

Intrusion Auditing Under Windows NT

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Forensic Analysis Courses

Course Description

Overview

Explore intrusion auditing techniques for Windows NT systems in this 43-minute Black Hat USA 1999 conference talk by JD Glaser. Learn how to effectively examine and preserve evidence left behind by intruders for potential criminal prosecution. Discover the limitations of NT's built-in tools and gain insights into using specialized free tools designed for non-destructive auditing. Follow a step-by-step demonstration covering key aspects of post-break-in analysis, including event log examination, file system configuration assessment, permission and file attribute analysis, surrounding system inspection, trojan behavior detection, backdoor identification, and vulnerability mitigation. Enhance your ability to conduct thorough and forensically sound intrusion audits on Windows NT environments.

Syllabus

Black Hat USA 1999 - Intrusion Auditing Under Windows NT


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube