Demo - Hack Password Hash (Pass-the-hash) - BSides Amman 2019

Поділитися
Вставка
  • Опубліковано 28 вер 2024
  • Learn how to hack Windows memory and steal password hashes and use it to impersonate the local administrator account on a Windows Machine, and then use that hash to connect to remote resources using pass-the-hash technique.
    I was honored to be speaking at the first Security Bsides Conference in Amman Jordan [20 April 2019 - ASU]. As requested by many attendees, I am making this session available online and the slides available on SlideShare.
    The slides are available on SlideShare here:
    www.slideshare...
    This is part of a full session I presented in BSides Amman Security Conference.
    • Security BSides Amman ...
    Connect with me
    ----------------------------
    About me: me.ahasayen.com
    Blog: blog.ahasayen.com
    Twitter: / ammarhasayen
    LinkedIn: / ammarhasayen
    Instagram: / ammarhasayen
    SlideShare: www.slideshare...
    Learn more about Bsides Amman
    / bsidesamman
    View my Pluralsight course : Implementing Azure AD Privileged Identity Management
    www.pluralsigh...

КОМЕНТАРІ • 12

  • @ZakariaRahim-uj8hy
    @ZakariaRahim-uj8hy 4 місяці тому

    I have been trying to understand pass the hash until I watch this your video 😁you are the best

  • @sks6867
    @sks6867 4 роки тому +2

    Everything was so neat, clean and systematic that even a newbie can understand this technique. Moreover explaining how to prevent this kind of attacks is like a bonus tip. Well done and keep posting such videos.

  • @mohamedhammad1819
    @mohamedhammad1819 4 роки тому

    great explanation, will done,

  • @kabookeo
    @kabookeo 5 років тому +2

    Explained very well. Thank you!

  • @akshatswami9401
    @akshatswami9401 3 роки тому

    Use GameCrook, it works 100%.

  • @Iowa.k
    @Iowa.k 3 роки тому +1

    Can you do a demo on the pass-the-hash alert in Defender for Identity?

  • @fatimaalmarzouqi3539
    @fatimaalmarzouqi3539 3 роки тому +1

    create material thanks for the great job

  • @ahmadabdalla90
    @ahmadabdalla90 4 роки тому

    Keen to know your thoughts on a commonly used tool for CLI internet access via outbound proxy (cntlm), one options of the confit options would be store your ntlm hash on its configuration file in plain text.

  • @yehabashaw7374
    @yehabashaw7374 4 роки тому

    Concise presentation! Thank you for sharing Ammar.

  • @reancybersecurity
    @reancybersecurity 4 роки тому

    Great video

  • @AmitKumar-ih8tk
    @AmitKumar-ih8tk 4 роки тому

    Well explained.. thanks