Abusing Privileged File Operations on Windows
Offered By: WEareTROOPERS via YouTube
Course Description
Overview
Explore techniques for exploiting privileged file operations on Windows systems in this informative conference talk. Delve into the intricacies of Windows security mechanisms and learn how attackers can leverage vulnerabilities in file handling processes to escalate privileges and gain unauthorized access. Discover real-world examples, mitigation strategies, and best practices for securing Windows environments against these types of attacks.
Syllabus
TR19: Abusing privileged file operations on Windows
Taught by
WEareTROOPERS
Related Courses
Cybersecurity Roles, Processes & Operating System SecurityIBM via Coursera Operating Systems and Security
IBM via edX Hacking in Practice: Intensive Ethical Hacking MEGA Course
Udemy The Complete Cyber Security Course : Hackers Exposed!
Udemy Learning Computer Security and Internet Safety
LinkedIn Learning