Defeating Pass-the-Hash - Separation of Powers
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a Black Hat conference talk on defeating Pass-the-Hash attacks through separation of powers in Windows 10. Delve into the critical issue of symmetric credential reuse in system breaches and learn how Windows 10 implements strong isolation of sensitive artifacts to thwart these attacks. Examine the challenges of securing legacy protocols like Kerberos and NTLM while maintaining business functionality. Discover how virtualization technology enables a new level of OS isolation, sequestering hashes, keys, and other secrets in protected physical memory. Gain insights into Windows 10's approach to guaranteeing secret isolation, its implications beyond client security, and the feasibility of achieving this without major protocol revisions. Enhance your understanding of advanced cybersecurity measures in this 48-minute presentation by Seth Moore and Baris Saydag.
Syllabus
Defeating Pass-the-Hash: Separation Of Powers
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube