Completed
Defending Against This
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Credential Assessment Mapping Privilege Escalation at Scale
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Motivation
- 3 Major Breaches
- 4 Target Breach
- 5 Home Depot Breach
- 6 Missed Alarms
- 7 The Biggest Issue
- 8 US Senate Report
- 9 Summary
- 10 Las Vegas Sands
- 11 Saudi Aramco
- 12 Industry Response
- 13 Credential Theft
- 14 Malware Detection
- 15 Windows Passwords
- 16 MiniCATs
- 17 Boring Alternatives
- 18 Defending Against This
- 19 Hand Diagram
- 20 Credentials
- 21 hashes
- 22 why did this fail
- 23 local administrators group
- 24 check nondefault registry keys
- 25 force guests
- 26 special rights assignment
- 27 firewall policies
- 28 remote desktop
- 29 false positives
- 30 test domain
- 31 reused credentials
- 32 domain compromise
- 33 whats the biggest deal
- 34 how to prevent this
- 35 authentication policies in silos
- 36 what can we do offensively
- 37 password reuse
- 38 brute force
- 39 hash cap
- 40 check