YoVDO

Abusing Privileged File Operations on Windows

Offered By: WEareTROOPERS via YouTube

Tags

TROOPERS Courses Cybersecurity Courses Ethical Hacking Courses Windows Security Courses

Course Description

Overview

Explore techniques for exploiting privileged file operations on Windows systems in this informative conference talk. Delve into the intricacies of Windows security mechanisms and learn how attackers can leverage vulnerabilities in file handling processes to escalate privileges and gain unauthorized access. Discover real-world examples, mitigation strategies, and best practices for securing Windows environments against these types of attacks.

Syllabus

TR19: Abusing privileged file operations on Windows


Taught by

WEareTROOPERS

Related Courses

Modmob Tools - Home Made Tools to Test Mobile Devices and Monitor Networks
WEareTROOPERS via YouTube
Microsoft IT - Secure Journey to IPv6-Only
WEareTROOPERS via YouTube
Introducing Faction - A Modern, Powerful, Multiplayer C2 Framework
WEareTROOPERS via YouTube
A Diet of Poisoned Fruit - Designing Implants and OT Payloads for ICS Embedded Devices
WEareTROOPERS via YouTube
Hardware Side Channel Attacks on the Cheapest
WEareTROOPERS via YouTube