Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Preventing Credential Theft Lateral Movement After Initial Compromise

via YouTube

Overview

Explore techniques for preventing credential theft and lateral movement after initial compromise in this BSides Cleveland 2016 conference talk. Delve into topics such as red team strategies, secure configuration, Netbios, and ARP spoofing. Learn about the importance of audits, the concept of honey users, and the potential risks associated with the dark web. Gain insights from live demonstrations and practical examples to enhance your understanding of cybersecurity defense mechanisms.

Syllabus

Intro
Overview
Slides
Im not normal
The first day of reckoning
Red Team
Homer Simpson
Why are we doing this
Use side
Audits
Secure Configuration
Netbios
Demo
Its not magic
Live demo
The dark web
ARP spoofing
A caution
wretch32
honey users

Reviews

Start your review of Preventing Credential Theft Lateral Movement After Initial Compromise

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.