Why You Need to Detect More Than Pass-the-Hash

Why You Need to Detect More Than Pass-the-Hash

Black Hat via YouTube Direct link

Example

13 of 18

13 of 18

Example

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Why You Need to Detect More Than Pass-the-Hash

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Who are we
  3. 3 Agenda
  4. 4 Primer
  5. 5 Pass a Hash
  6. 6 Attacker Mindset
  7. 7 Credentials
  8. 8 One Entry Point
  9. 9 Expanding
  10. 10 How to Detect
  11. 11 Centralized Logging
  12. 12 Event Logs
  13. 13 Example
  14. 14 A logon
  15. 15 Metasploit
  16. 16 Domain Domain User
  17. 17 Conclusion
  18. 18 Questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.