Overview
Syllabus
Intro
black hat Newer "Secure" Admin Methods
black hat Exploiting Typical Administration
black hat MFA Recommendations
black hat Enterprise Password Vault
black hat Attacking Enterprise Password Vault
black hat Exploit Password Vault Access
black hat Password Vaults on the Internet
black hat Password Vault Config Weaknesses
black hat Admin Forest Pros & Cons
black hat Admin Forest Implementation
black hat Admin Forest Discovery
black hat Cross-Forest Administration
black hat AD Defensive Pillars
black hat Administrative Credential Isolation & Protection
black hat Admin Systems: Convincing Admins
black hat A Workable Admin System
black hat Admin Workstation Deployment
black hat Product Permission Requirements
Taught by
Black Hat