Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore secure and insecure remote operations in Windows environments through this technical conference talk. Dive into hands-on examples for both offensive and defensive teams, examining the pros and cons of various remote administration tools, protocols, and APIs. Learn about jump server architectures, role-based shells, and creative ways to limit PowerShell. Discover fresh research on achieving full token hijacking from network logon-type sessions without using hashes or TGTs. Gain valuable insights for improving remote operations security and understanding potential attack vectors in Windows-based systems.