YoVDO

Undocumented Windows Hash Leak Vulnerability

Offered By: Cooper via YouTube

Tags

Windows Security Courses Cybersecurity Courses Network Security Courses Reverse Engineering Courses Privilege Escalation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Discover an undocumented Windows feature that leaks valuable system hashes in this 17-minute conference talk from Hack.lu 2016. Learn how this simple trick can dramatically accelerate the process of gaining control over user accounts and achieving domain administration privileges, without the need for complex exploitation techniques. Presented by m4xk, an experienced IT security professional with a passion for reverse engineering and system exploitation, and sıx, an IT Security Specialist focused on uncovering and exploiting software vulnerabilities. Both speakers hold OSCP certifications and bring years of practical experience in Windows, Linux, and Unix administration to their analysis of this critical security issue.

Syllabus

Hack.lu 2016 The Legend of Windows: A Link to the Hash by m4xk and sıx


Taught by

Cooper

Related Courses

An Introduction to Computer Networks
Stanford University via Independent
Computer Networks
University of Washington via Coursera
Computer Networking
Georgia Institute of Technology via Udacity
Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Model Building and Validation
AT&T via Udacity