Completed
Conclusion
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Exploiting DCOM
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 BIACK HAT
- 3 DCOM runtime
- 4 Windows Built-in DCOM Apps
- 5 Demonstration environment
- 6 Exploit code
- 7 Stealing IE's data
- 8 Activate ShellWindows
- 9 Get IDispatch
- 10 Get browsing URL strings
- 11 Incoming data
- 12 Navigation events
- 13 Change browsing pages
- 14 Create new windows
- 15 Component activation procedure 1. NEGOTIATE
- 16 Two steps of authentication
- 17 Logon audit 1/2
- 18 Logon audit 2/2 Remote PC
- 19 DCOM authentication Remote PC
- 20 Default setting of DCOM authentication
- 21 Event handling model
- 22 Reverse authentication Local PC
- 23 1. Set account on local PC
- 24 Use classic security model 1/2
- 25 Use classic security model 2/2
- 26 Trojan Office
- 27 DCOM exploit prevention
- 28 Conclusion