Completed
Reverse authentication Local PC
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Exploiting DCOM
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 BIACK HAT
- 3 DCOM runtime
- 4 Windows Built-in DCOM Apps
- 5 Demonstration environment
- 6 Exploit code
- 7 Stealing IE's data
- 8 Activate ShellWindows
- 9 Get IDispatch
- 10 Get browsing URL strings
- 11 Incoming data
- 12 Navigation events
- 13 Change browsing pages
- 14 Create new windows
- 15 Component activation procedure 1. NEGOTIATE
- 16 Two steps of authentication
- 17 Logon audit 1/2
- 18 Logon audit 2/2 Remote PC
- 19 DCOM authentication Remote PC
- 20 Default setting of DCOM authentication
- 21 Event handling model
- 22 Reverse authentication Local PC
- 23 1. Set account on local PC
- 24 Use classic security model 1/2
- 25 Use classic security model 2/2
- 26 Trojan Office
- 27 DCOM exploit prevention
- 28 Conclusion