Explore techniques for preventing credential theft and lateral movement after initial compromise in this BSides Cleveland 2016 conference talk. Delve into topics such as red team strategies, secure configuration, Netbios, and ARP spoofing. Learn about the importance of audits, the concept of honey users, and the potential risks associated with the dark web. Gain insights from live demonstrations and practical examples to enhance your understanding of cybersecurity defense mechanisms.
Overview
Syllabus
Intro
Overview
Slides
Im not normal
The first day of reckoning
Red Team
Homer Simpson
Why are we doing this
Use side
Audits
Secure Configuration
Netbios
Demo
Its not magic
Live demo
The dark web
ARP spoofing
A caution
wretch32
honey users