YoVDO

Defeating Pass-the-Hash - Separation of Powers

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Windows 10 Security Courses

Course Description

Overview

Explore a Black Hat conference talk on defeating Pass-the-Hash attacks through separation of powers in Windows 10. Delve into the critical issue of symmetric credential reuse in system breaches and learn how Windows 10 implements strong isolation of sensitive artifacts to thwart these attacks. Examine the challenges of securing legacy protocols like Kerberos and NTLM while maintaining business functionality. Discover how virtualization technology enables a new level of OS isolation, sequestering hashes, keys, and other secrets in protected physical memory. Gain insights into Windows 10's approach to guaranteeing secret isolation, its implications beyond client security, and the feasibility of achieving this without major protocol revisions. Enhance your understanding of advanced cybersecurity measures in this 48-minute presentation by Seth Moore and Baris Saydag.

Syllabus

Defeating Pass-the-Hash: Separation Of Powers


Taught by

Black Hat

Related Courses

Windows 10 Security Features
Microsoft via edX
Protecting Devices and Applications in Microsoft 365
Pluralsight
Microsoft Cybersecurity Stack: Securing Windows 10 in the Enterprise
LinkedIn Learning
Windows 10: Security
LinkedIn Learning
Breaking VSM by Attacking SecureKernel
Black Hat via YouTube