YoVDO

Defeating Pass-the-Hash - Separation of Powers

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Windows 10 Security Courses

Course Description

Overview

Explore a Black Hat conference talk on defeating Pass-the-Hash attacks through separation of powers in Windows 10. Delve into the critical issue of symmetric credential reuse in system breaches and learn how Windows 10 implements strong isolation of sensitive artifacts to thwart these attacks. Examine the challenges of securing legacy protocols like Kerberos and NTLM while maintaining business functionality. Discover how virtualization technology enables a new level of OS isolation, sequestering hashes, keys, and other secrets in protected physical memory. Gain insights into Windows 10's approach to guaranteeing secret isolation, its implications beyond client security, and the feasibility of achieving this without major protocol revisions. Enhance your understanding of advanced cybersecurity measures in this 48-minute presentation by Seth Moore and Baris Saydag.

Syllabus

Defeating Pass-the-Hash: Separation Of Powers


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube