Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Exploiting Group Policy Objects for Persistence and Lateral Movement

Cooper via YouTube

Overview

Explore a presentation on leveraging Group Policy Objects (GPOs) for persistence and lateral movement in compromised networks. Delve into how GPOs, typically used for centralized management of Microsoft operating systems and applications, can be exploited for malicious purposes. Learn about a proof of concept inspired by Phineas Fishers' HackingTeam breach, demonstrating automated malware distribution and persistence techniques. Discover new PowershellEmpire Framework modules created by the presenters for GPO exploitation. Examine potential countermeasures, including detection and prevention mechanisms, to defend against these tactics. Gain insights from penetration testers Yves Kraft and Immanuel Willi as they share their expertise in building and deconstructing security systems.

Syllabus

Hack.lu 2016 badGPO - Using GPOs for Persistence and Lateral Movement

Taught by

Cooper

Reviews

Start your review of Exploiting Group Policy Objects for Persistence and Lateral Movement

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.