YoVDO

Exploiting Group Policy Objects for Persistence and Lateral Movement

Offered By: Cooper via YouTube

Tags

Network Security Courses Cybersecurity Courses Penetration Testing Courses Lateral Movement Courses Windows Security Courses Group Policy Objects Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a presentation on leveraging Group Policy Objects (GPOs) for persistence and lateral movement in compromised networks. Delve into how GPOs, typically used for centralized management of Microsoft operating systems and applications, can be exploited for malicious purposes. Learn about a proof of concept inspired by Phineas Fishers' HackingTeam breach, demonstrating automated malware distribution and persistence techniques. Discover new PowershellEmpire Framework modules created by the presenters for GPO exploitation. Examine potential countermeasures, including detection and prevention mechanisms, to defend against these tactics. Gain insights from penetration testers Yves Kraft and Immanuel Willi as they share their expertise in building and deconstructing security systems.

Syllabus

Hack.lu 2016 badGPO - Using GPOs for Persistence and Lateral Movement


Taught by

Cooper

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network