Completed
Security Descriptor
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
An ACE in the Hole - Stealthy Host Persistence via Security Descriptors
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Introductions
- 3 Overview
- 4 Offensive Implications
- 5 WinRM Backdoor
- 6 Misconfigured Configurations
- 7 General Persistence Approach
- 8 Domain Join Systems
- 9 We Believe
- 10 What is a Securable Object
- 11 What is a Security Descriptor
- 12 Where do security descriptors come from
- 13 What are decals
- 14 Object rights
- 15 Services
- 16 AntiAudit Measures
- 17 Methodology
- 18 Existing Tools
- 19 Caveats
- 20 Security Descriptors
- 21 Object Takeover Primitives
- 22 Process Rights
- 23 Case Studies
- 24 Service Control Manager
- 25 Security Descriptor
- 26 Decom
- 27 WMyClasses
- 28 WMyRemoteAccess
- 29 Printer Objects
- 30 Printer RPC
- 31 Commandlets
- 32 Remote Registry
- 33 Hash Dumping
- 34 Backdooring
- 35 MEMEMIC
- 36 Defensive Enumeration
- 37 Takeaways
- 38 Microsoft troll slides
- 39 RPC protocols