Elevating your Windows Privileges Like a Boss! - Jake Williams

preview_player
Показать описание

Description: Local privilege escalation on Windows is becoming increasingly difficult. Gone are the days when you could just easily exploit the Windows kernel. Multiple controls (KASLR, DEP, SMEP, etc.) have made kernel mode exploitation of the bugs that are discovered much more difficult. In this talk, we'll discuss multiple opportunities for privilege escalation including using COM objects, DLL side loading, and various privileges assigned to user accounts. Bring a Windows 10 VM. We'll have instructions available for recreating the scenarios demonstrated in the talk.

Wild West Hackin' Fest Socials

Wild West Hackin' Fest Shirts & Hoodies

Backdoors & Breaches - Incident Response Card Game

Antisyphon Training

Educational Infosec Content

#infosec #wwhf
Рекомендации по теме
Комментарии
Автор

God damn man, this is the best info sec stand-up show i ever saw. This guy have a good sense of humor.

VegaSlayer
Автор

Comment about subinacls vs powershell. I think if one pipes the output of Get-ACL to ConvertFromSddlString it will display in a more readable format

jamiekomodo
Автор

Very nice! I Really did learn some things there.

easirslicer
Автор

Presentation: Windows Privileges Escalation
Laptop: Apple Macbook

roberternest
Автор

Don't just half own the whole shadow brokers thing, it screams disingenuous humility. You dropped it in your slideshow, you're proud of it and that's ok.

christabor