Exploiting DCOM

Exploiting DCOM

Black Hat via YouTube Direct link

Two steps of authentication

16 of 28

16 of 28

Two steps of authentication

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Exploiting DCOM

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 BIACK HAT
  3. 3 DCOM runtime
  4. 4 Windows Built-in DCOM Apps
  5. 5 Demonstration environment
  6. 6 Exploit code
  7. 7 Stealing IE's data
  8. 8 Activate ShellWindows
  9. 9 Get IDispatch
  10. 10 Get browsing URL strings
  11. 11 Incoming data
  12. 12 Navigation events
  13. 13 Change browsing pages
  14. 14 Create new windows
  15. 15 Component activation procedure 1. NEGOTIATE
  16. 16 Two steps of authentication
  17. 17 Logon audit 1/2
  18. 18 Logon audit 2/2 Remote PC
  19. 19 DCOM authentication Remote PC
  20. 20 Default setting of DCOM authentication
  21. 21 Event handling model
  22. 22 Reverse authentication Local PC
  23. 23 1. Set account on local PC
  24. 24 Use classic security model 1/2
  25. 25 Use classic security model 2/2
  26. 26 Trojan Office
  27. 27 DCOM exploit prevention
  28. 28 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.