Red Team Revenge - Attacking Microsoft ATA

Red Team Revenge - Attacking Microsoft ATA

44CON Information Security Conference via YouTube Direct link

Introduction

1 of 18

1 of 18

Introduction

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Red Team Revenge - Attacking Microsoft ATA

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 About Nikhil
  3. 3 What is ATA
  4. 4 Threats of Interest
  5. 5 Avoiding ATA Detection
  6. 6 SPN Scanning
  7. 7 AES Keys
  8. 8 False Events
  9. 9 Golden Ticket
  10. 10 AES Key Bypass
  11. 11 Ticket Lifetime
  12. 12 MongoDB Backend
  13. 13 Change attribution
  14. 14 Defense
  15. 15 Limitations of ATA
  16. 16 How to detect ATA
  17. 17 Limitations
  18. 18 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.