Completed
Limitations of ATA
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Red Team Revenge - Attacking Microsoft ATA
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 About Nikhil
- 3 What is ATA
- 4 Threats of Interest
- 5 Avoiding ATA Detection
- 6 SPN Scanning
- 7 AES Keys
- 8 False Events
- 9 Golden Ticket
- 10 AES Key Bypass
- 11 Ticket Lifetime
- 12 MongoDB Backend
- 13 Change attribution
- 14 Defense
- 15 Limitations of ATA
- 16 How to detect ATA
- 17 Limitations
- 18 Conclusion