{"id":412,"date":"2014-10-30T15:17:28","date_gmt":"2014-10-30T19:17:28","guid":{"rendered":"http:\/\/adsecurity.org\/?p=412"},"modified":"2014-10-29T21:45:40","modified_gmt":"2014-10-30T01:45:40","slug":"bluehat-2014-slides-reality-bites-the-attackers-view-of-windows-authentication-and-post-exploitation","status":"publish","type":"post","link":"https:\/\/adsecurity.org\/?p=412","title":{"rendered":"BlueHat 2014 Slides: Reality Bites &#8211; The Attacker&#8217;s View of Windows Authentication and Post-exploitation"},"content":{"rendered":"<p>Each year, Microsoft invites security researchers (aka hackers) to speak to Microsoft employees about security issues.<\/p>\n<p>One of the most interesting talks listed at <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/dn456542.aspx\">&#8220;BlueHat&#8221; 2014 <\/a>was the one by the &#8220;Pass-the-Hash&#8221; experts, Chris Campbell, Bejamin Delpy, and Skip Duckwall.<\/p>\n<blockquote><p>This talk will focus on the how Windows authentication works in the real world and what are the popular attacks against it. You will learn the thought process of attackers in the real world and how it differs from a defender\u2019s perspective. We\u2019ll also cover post-exploitation tools and techniques such as Mimikatz. Finally, we\u2019ll discuss next steps \u2013 How do you design services that are breach-resistant and make authentication harder to crack.<\/p><\/blockquote>\n<p><a href=\"http:\/\/www.slideshare.net\/gentilkiwi\/bluehat-2014realitybites\">BlueHat 2014 Slides: Reality Bites: The Attacker&#8217;s View of Windows Authentication and Post-exploitation &#8211; Chris Campbell, Benjamin Delpy, &amp; Skip Duckwall<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Each year, Microsoft invites security researchers (aka hackers) to speak to Microsoft employees about security issues. One of the most interesting talks listed at &#8220;BlueHat&#8221; 2014 was the one by the &#8220;Pass-the-Hash&#8221; experts, Chris Campbell, Bejamin Delpy, and Skip Duckwall. This talk will focus on the how Windows authentication works in the real world and &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/adsecurity.org\/?p=412\">Continue reading<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[113,205,206,207,44,204],"class_list":["post-412","post","type-post","status-publish","format-standard","hentry","category-microsoft-security","tag-activedirectorysecurity","tag-kerberosgoldenticket","tag-kerberossilverticket","tag-mimikatz","tag-passthehash","tag-windowssecurity","item-wrap"],"_links":{"self":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/412","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=412"}],"version-history":[{"count":1,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/412\/revisions"}],"predecessor-version":[{"id":413,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/412\/revisions\/413"}],"wp:attachment":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=412"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=412"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=412"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}