YoVDO

Undocumented Windows Hash Leak Vulnerability

Offered By: Cooper via YouTube

Tags

Windows Security Courses Cybersecurity Courses Network Security Courses Reverse Engineering Courses Privilege Escalation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Discover an undocumented Windows feature that leaks valuable system hashes in this 17-minute conference talk from Hack.lu 2016. Learn how this simple trick can dramatically accelerate the process of gaining control over user accounts and achieving domain administration privileges, without the need for complex exploitation techniques. Presented by m4xk, an experienced IT security professional with a passion for reverse engineering and system exploitation, and sıx, an IT Security Specialist focused on uncovering and exploiting software vulnerabilities. Both speakers hold OSCP certifications and bring years of practical experience in Windows, Linux, and Unix administration to their analysis of this critical security issue.

Syllabus

Hack.lu 2016 The Legend of Windows: A Link to the Hash by m4xk and sıx


Taught by

Cooper

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network