YoVDO

Undocumented Windows Hash Leak Vulnerability

Offered By: Cooper via YouTube

Tags

Windows Security Courses Cybersecurity Courses Network Security Courses Reverse Engineering Courses Privilege Escalation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Discover an undocumented Windows feature that leaks valuable system hashes in this 17-minute conference talk from Hack.lu 2016. Learn how this simple trick can dramatically accelerate the process of gaining control over user accounts and achieving domain administration privileges, without the need for complex exploitation techniques. Presented by m4xk, an experienced IT security professional with a passion for reverse engineering and system exploitation, and sıx, an IT Security Specialist focused on uncovering and exploiting software vulnerabilities. Both speakers hold OSCP certifications and bring years of practical experience in Windows, Linux, and Unix administration to their analysis of this critical security issue.

Syllabus

Hack.lu 2016 The Legend of Windows: A Link to the Hash by m4xk and sıx


Taught by

Cooper

Related Courses

Dal Reverse engineering alla stampa 3D
University of Naples Federico II via Federica
Rapid Manufacturing
Indian Institute of Technology Kanpur via Swayam
Generative Design for Industrial Applications
Autodesk via Coursera
Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX
Functional And Conceptual Design
Indian Institute of Technology Madras via Swayam