Overview
Syllabus
Intro
Introductions
Overview
Offensive Implications
WinRM Backdoor
Misconfigured Configurations
General Persistence Approach
Domain Join Systems
We Believe
What is a Securable Object
What is a Security Descriptor
Where do security descriptors come from
What are decals
Object rights
Services
AntiAudit Measures
Methodology
Existing Tools
Caveats
Security Descriptors
Object Takeover Primitives
Process Rights
Case Studies
Service Control Manager
Security Descriptor
Decom
WMyClasses
WMyRemoteAccess
Printer Objects
Printer RPC
Commandlets
Remote Registry
Hash Dumping
Backdooring
MEMEMIC
Defensive Enumeration
Takeaways
Microsoft troll slides
RPC protocols