Completed
SP signing diagram
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
How to Own Any Windows Network via Group Policy Hijacking Attacks
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Outline
- 3 What is Group Policy
- 4 How does it work
- 5 Configuration settings
- 6 Prepatch scenario
- 7 How can it be attacked
- 8 Threat scenarios
- 9 Domain controllers
- 10 Domain members
- 11 SP signing
- 12 SP signing scenarios
- 13 SP signing diagram
- 14 Does it work
- 15 How to get a shell
- 16 Summary
- 17 Exploit process
- 18 Demo
- 19 Windows Domain Member
- 20 Linux Server
- 21 System Shells
- 22 Group Policy
- 23 Weak Passwords
- 24 User Settings
- 25 Local Configuration
- 26 Update User Settings
- 27 Win logon session
- 28 MS15011 and MS15014
- 29 How effective are these controls
- 30 User settings exploit
- 31 Is kerberos viable
- 32 kerberos example
- 33 decryption
- 34 domain controller
- 35 hardened uncpass
- 36 kerberos
- 37 log in
- 38 read response
- 39 caveats
- 40 Mitigation
- 41 User Policy