Completed
Skeleton Key Malware Detection
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Watching the Watchdog - Protecting Kerberos Authentication With Network Monitoring
Automatically move to the next video in the Classroom when playback concludes
- 1 Watching the Watchdog Protecting Kerberos
- 2 Why do Attackers Target Kerberos?
- 3 Kerberos: Stealing
- 4 The attack campaign • Attackers installed a malware on DC to authenticate as any user by using a secret password
- 5 AES vs. RC4: Key Derivation
- 6 Attacker + RC4
- 7 The Skeleton Key Malware: Kerberos
- 8 Skeleton Key Malware Detection
- 9 PAC (Privilege Attribute Certificate)
- 10 TGT Integrity
- 11 Let's Play Spot the Difference
- 12 Golden Ticket in the Wild
- 13 Diamond PAC exploit
- 14 Questions?