Where 2 Worlds Collide Bringing Mimikatz et al to UNIX

Subscribers:
6,120
Published on ● Video Link: https://www.youtube.com/watch?v=uqc4AC-Yzb8



Duration: 43:41
0 views
0


Over the past fifteen years there's been an uptick in "interesting" UNIX infrastructures being integrated into customers' existing AD forests. Whilst the threat models enabled by this should be quite familiar to anyone securing a heterogeneous Windows network, they may not be as well understood by a typical UNIX admin who does not have a strong background in Windows and AD. Over the last few months I've spent some time looking a number of specific AD integration solutions (both open and closed source) for UNIX systems and documenting some of the tools, tactics and procedures that enable attacks on the forest to be staged from UNIX.


Presenters:
Tim (Wadhwa-)Brown - Head Of Research, CX EMEAR Security Architecture, Cisco
Tim Brown joined Cisco as part of their acquisition of Portcullis for whom he worked for almost 12 years. He is equally happy performing white box assessments with access to source code or where necessary diving into proprietary binaries and protocols using reverse engineering methodologies. Tim has contributed to a number of Cisco's bespoke methodologies covering subjects as diverse as secure development, host hardening, risk and compliance, ERP and SCADA. In 2016-2017, Tim looked at targets as varied as Active Directory, z/OS mainframes, power stations, cars, banking middleware and enterprise SAP Landscapes. Outside of the customer driven realm of information assurance, Tim is also a prolific researcher with papers on UNIX, KDE, Vista and web application security to his name. Tim is credited with almost 150 vulnerability advisories covering both kernel and userland, remote and local. Tim particularly like to bug hunt enterprise UNIX solutions.
Black Hat - Europe - 2018
Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2021-12-21Video Killed the Text Star OSINT Approach
2021-12-21Deep Impact Recognizing Unknown Malicious Activities from Zero Knowledge
2021-12-21A Measured Response to a Grain of Rice
2021-12-21Secure Boot Under Attack Simulation to Enhance Fault Attacks & Defenses
2021-12-21When Everyone's Dog is Named Fluffy Black Hat - Europe - 2018
2021-12-21DeepPhish Simulating Malicious AI Black Hat - Europe - 2018
2021-12-21Locknote Conclusions and Key Takeaways from Black Hat Europe 2018
2021-12-21When Machines Can't Talk Black Hat - Europe - 2018
2021-12-21Divide et Impera MemoryRanger Runs Drivers in Isolated Kernel Spaces
2021-12-21AI Gone Rogue Exterminating Deep Fakes Before They Cause Menace
2021-12-21Where 2 Worlds Collide Bringing Mimikatz et al to UNIX
2021-12-21Malware Buried Deep Down the SPI Flash Sednit's First UEFI Rootkit Found in the Wild
2021-12-21Attacking and Defending Blockchains From Horror Stories to Secure Wallets
2021-12-21Straight Outta VMware Modern Exploitation of the SVGA Device for Guest to Host Escapes
2021-12-21Network Defender Archeology An NSM Case Study in Lateral Movement with DCOM
2021-12-21Attacking Hardware Systems Using Resonance and the Laws of Physics
2021-12-21The Last Line of Defense Understanding and Attacking Apple File System on iOS
2021-12-21Eternal War in XNU Kernel Objects Black Hat - Europe - 2018
2021-12-21Evolving Security Experts Among Teenagers Black Hat - Europe - 2018
2021-12-21No Free Charge Theorem 2 0 How to Steal Private Information from a Mobile Device Using a Powerbank
2021-12-21Off Path Attacks Against PKI Black Hat - Europe - 2018



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering