It was a great conference with really awesome people. Can‘t wait for 2025.
@travispatt9073 ай бұрын
Haha 35:00 is so cool! For some rudimentary clarification, if any of you guys remember downloading games off the net in the old days. They would put a cd-key on the game cover to prevent piracy. If you ever downloaded a "crack" to play the game (a patch essentially), what that does is it over writes the part of the code for the jump (JMP) operation to check the serial Key (CD-key). It replaces that part of the code with a NOP (No Operation) instruction. This prevents the program from jumping to the protection code (e.g., where it checks for the serial key), effectively bypassing the check. NOP's are nice because they take up the same amount of space as the instruction being replaced (so it doesn't affect the size of the program). No go out and play Starcraft for free you crazy 90's kids!
@ahmedbenalal1914 ай бұрын
Cheers to you akhi, well done!
@mohamedboublenza82075 ай бұрын
I'm proud of you brother
@logan0x5 ай бұрын
how to download the slides ?
@fatm3at6 ай бұрын
where can I get this slide?
@hacktivityconf5 ай бұрын
Hi. We have contacted the presenter for the slides.
@fatm3at5 ай бұрын
@@hacktivityconf Thanks! looking forward to it!
@tamassari75296 ай бұрын
Szuper előadás volt! Köszönöm Péter!
@hacktivityconf5 ай бұрын
Nekünk is nagyon tetszett :)
@imca_b_55176 ай бұрын
Thanks for information ❤
@MikeLitoris-h7s7 ай бұрын
Wow 500,000 devices that's insane I'm just now hearing about this
@Photoemulator7 ай бұрын
The close captioning needs work mostly because the speaker has a significant accent, which makes the captioning process difficult. But it should have been checked.
@hacktivityconf5 ай бұрын
Thank you for the feedback. We forwarded this issue to the online media team for review.
@telecatsermaster7 ай бұрын
Excellent demonstration. Well done.
@JNET_Reloaded7 ай бұрын
voice is boring asf an cant even see screen that well pointless
@faucetcryptos81487 ай бұрын
Muito bom! Uma tecnica bastante volatil, o poder dos socks proxys.
@g.s.33898 ай бұрын
that's why companies should have their own github or gitlab repository.
@d8rh8r358 ай бұрын
Great talk man.. awesome
@TheCyberWarriorGuy8 ай бұрын
:)
@ilovetensor9 ай бұрын
There are bad guys every where, I dont know why they do this but this is really cruel to get over someone's open source. Really a great topic and a great video which requires more and more popularity so that it creates awareness.
@lancemarchetti86739 ай бұрын
Brilliant
@TurkVladimir9 ай бұрын
Thanks Great Video
@AnilYadav-ce3gf9 ай бұрын
Nice work. Is it ported on an actual ARM chipset?
@NAWAF-SUDO9 ай бұрын
Pretty good video, We want more videos about AD.
@hacktivityconf8 ай бұрын
Thank you. We recommend the following one for you kzbin.info/www/bejne/hYLCp4qtqJV5gZI
@יקירזילברמן-ע5צ9 ай бұрын
Really like the content, Yossi! One small question - you showed that after stealing the security token of a domain admin's WinRM process (initiated after logon type = network), you can not only impersonate the user on the local machine, but also over the network. Can you explain how is it possible? I thought that the TGT / NTLM hash is not stored on the remote machine when doing network logon, so what kind of information was relayed to the remote services which made them 'trust' they are indeed talking to the domain admin, after the impersonation?
@hacktivityconf8 ай бұрын
Your question has been relayed to the speaker.
@imca_b_55179 ай бұрын
Thank you so much for providing valuable information ❤
@imca_b_55179 ай бұрын
Great information ❤
@w3w3w310 ай бұрын
very interesting, thanks
@pwnonymous10 ай бұрын
what a bountiful lesson from a grade A professional!
@knoblauchhorst940510 ай бұрын
great talk!
@sotecluxan422110 ай бұрын
@nathanfitzpatrick315211 ай бұрын
Would like hear his thoughts on the Pmkid attack!
@user-vg5rv5xf4u11 ай бұрын
Ahhhh ahmmmmmm
@davidtchanga6470 Жыл бұрын
what is PTK sir ?
@LockSpaz Жыл бұрын
Great presentation; but I had to chuckle @ 7:05 when the key pins defied gravity and floated back up after their driver pins were set.
@ankurverma1157 Жыл бұрын
Nice
@AlexPund Жыл бұрын
HAHAHAAHA POPUP WINDOW BYPASS CRACK 2022
@dzxxbj Жыл бұрын
code properties graph???
@marcuswilliams3455 Жыл бұрын
Wow, this presentation has been very informative. From ages ago, I always felt mainframe should be accessed only from the within the network, with limited access to the real world via proxies, security tunnels, etc. Yeah, mainframe security reminds like when you are locked outside your house, but then you realize the loopholes as to get in.
@vaster1142 Жыл бұрын
He's funny 😂
@TsukiCTF Жыл бұрын
Great talk!
@an0n_r0 Жыл бұрын
Thank you! :)
@huzifaahmed1426 Жыл бұрын
still worth 💗💗💗
@tdsrtfgrshdty Жыл бұрын
dgrhtjykgh
@night_xdrive Жыл бұрын
Zbs 🎉
@douro20 Жыл бұрын
Péter Szőr, bless his soul ..he died very young... anyone know how he died?
@MohamedAfzal Жыл бұрын
great tool and very informative presentation
@kushakush8776 Жыл бұрын
Website name
@britox.6216 Жыл бұрын
this man’s a legend
@GreddyCZ91 Жыл бұрын
second!
@patriciaukem5738 Жыл бұрын
Joe i love ya video soooooooooooooooooooooooo much
@gtworek2 жыл бұрын
Thank you again for inviting ma and for your hospitability :)