ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

BlueHat IL 2019 - Benjamin Delpy (@gentilkiwi) - You (dis)liked mimikatz? Wait for kekeo

Автор: Microsoft Israel R&D Center

Загружено: 2019-02-18

Просмотров: 8246

Описание: For years, you’ve tried to fight mimikatz, first to understand it, and maybe fight it again.
This little kiwi fruit shaped program has given you a hard time, extracted your password, stolen your credentials, played with your nerves and certificates ...

But our friends in New Zealand know it best: there are many different kiwis... and perhaps the fruit is the most lucrative, but it's not the most sadistic.

The kiwi animal may not fly, and it remains complex to build it from source, its effects are not less devastating...I will introduce "kekeo", the little animal brother of mimikatz.

If you enjoyed playing with Kerberos, ASN1, security providers..., then you'll love adopting this furry, sweet animal. From its birth with MS14-068 to cleartext passwords without local administrator rights, you'll know everything about this animal.

This talk will embed CredSSP and TSSP with cleartext credential, explore a little bit about PKINITMustiness and the RSA-on-the-fly for Kerberos with PKI!

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
BlueHat IL 2019 - Benjamin Delpy (@gentilkiwi) - You (dis)liked mimikatz? Wait for kekeo

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

BlueHat IL 2019 - Andrew

BlueHat IL 2019 - Andrew "bunnie" Huang - Supply Chain Security: "If I were a Nation State...”

BlueHat IL 2019 — Лука Тодеско (@qwertyoruiop) — Жизнь в качестве iOS-злоумышленника

BlueHat IL 2019 — Лука Тодеско (@qwertyoruiop) — Жизнь в качестве iOS-злоумышленника

How it began: The Story Behind Mimikatz - Paula Januszkiewicz talks with Benjamin Delpy

How it began: The Story Behind Mimikatz - Paula Januszkiewicz talks with Benjamin Delpy

BlueHat IL 2017 - Benjamin Delpy 'gentilkiwi' - From Mimikatz to Kekeo

BlueHat IL 2017 - Benjamin Delpy 'gentilkiwi' - From Mimikatz to Kekeo

BlueHat IL 2020 - David Weston - Keeping Windows Secure

BlueHat IL 2020 - David Weston - Keeping Windows Secure

TR19: Fun with LDAP and Kerberos: Attacking AD from non-Windows machines

TR19: Fun with LDAP and Kerberos: Attacking AD from non-Windows machines

BlueHat IL 2025 - Yonatan Zunger - Keynote - What does AI safety and security mean?

BlueHat IL 2025 - Yonatan Zunger - Keynote - What does AI safety and security mean?

DEEP 2018: Benjamin Delpy

DEEP 2018: Benjamin Delpy

1. Introduction, Threat Models

1. Introduction, Threat Models

Running an SQL Injection Attack - Computerphile

Running an SQL Injection Attack - Computerphile

SANS DFIR Webcast - Memory Forensics for Incident Response

SANS DFIR Webcast - Memory Forensics for Incident Response

Beyond the Mcse: Active Directory for the Security Professional

Beyond the Mcse: Active Directory for the Security Professional

Exploiting Network Printers

Exploiting Network Printers

Infecting the Enterprise: Abusing Office365+Powershell for Covert C2

Infecting the Enterprise: Abusing Office365+Powershell for Covert C2

BlueHat IL 2018 - Vincent Le Toux & Benjamin Delpy - What Can Make Your Million Dollar SIEM Go Blind

BlueHat IL 2018 - Vincent Le Toux & Benjamin Delpy - What Can Make Your Million Dollar SIEM Go Blind

SHELLCON 2017 Technical Keynote: What Can Reverse Engineering Do For You? Amanda Rousseau

SHELLCON 2017 Technical Keynote: What Can Reverse Engineering Do For You? Amanda Rousseau

In-memory Evasion (1 of 4) - Detections

In-memory Evasion (1 of 4) - Detections

BlueHat IL 2025 - Ori David - Now You See Me, Now You Don’t - Abusing VBS Enclaves to Create...

BlueHat IL 2025 - Ori David - Now You See Me, Now You Don’t - Abusing VBS Enclaves to Create...

Delegating Kerberos To Bypass Kerberos Delegation Limitation by Charlie Bromberg

Delegating Kerberos To Bypass Kerberos Delegation Limitation by Charlie Bromberg

Abusing Microsoft Kerberos: Sorry You Guys Don't Get It

Abusing Microsoft Kerberos: Sorry You Guys Don't Get It

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]