BHIS | Coercions and Relays - The First Cred is the Deepest with Gabriel Prud'homme | 1.5 Hours

  Рет қаралды 13,763

Black Hills Information Security

Black Hills Information Security

Күн бұрын

Пікірлер: 11
@uyscuti5118
@uyscuti5118 Жыл бұрын
This was the most thorough and helpful video Ive ever seen, I cannot thank you enough!
@xxxyyy1503
@xxxyyy1503 2 жыл бұрын
Thanks a lot. I really liked this type of presentation where all commands and demos were shown. Straight to the point, but explained all necessary details without discussing god and the world. I would really wish that other people would structure/present talks in the same way. Thumbs up, one of the best talks I saw since a long time.
@GCodesDev
@GCodesDev Жыл бұрын
I love the name of this talk so much
@h4gg497
@h4gg497 2 жыл бұрын
Awesome talk bro, been deep diving into this topic lately so really useful to see such a comprehensive reference. Well presented.
@markwharton2
@markwharton2 2 жыл бұрын
Going to have to practice these, with Responder, then Inveigh, and finally, Pretender! Thanks so much!
@michaelritter9292
@michaelritter9292 2 жыл бұрын
first time ever I leave a comment.... but bro this is such an amazing video... i am amazed. very useful
@TAPCybersec
@TAPCybersec 2 жыл бұрын
Great presentation! I've used Responder and Inveigh, but not Pretender. I'm gonna have to tinker a bit with the latter.
@luizfelipegrillo9134
@luizfelipegrillo9134 2 жыл бұрын
Amazing techniques! Congrats and tks a lot!
@menez031
@menez031 Жыл бұрын
Great presentation! Do the smbrelay and MiTM6 attacks only work if there are misconfigurations/share typo's? I have had some engagements where they work great whereas others dont work at all and I dont know if its specific to the above or not. Every vid and reference I see intiiates the capture by accessing a non-existent share
@kireyn
@kireyn Жыл бұрын
Great content, like it and was looking for it) Think Gabriel was messing a bit with a Windows computer locking shortcut( is pressing Windows Key + L).
@bhagyalakshmi1053
@bhagyalakshmi1053 Жыл бұрын
John bl👍 Liters salm size big
Kerberos & Attacks 101
1:00:11
Black Hills Information Security
Рет қаралды 12 М.
BHIS | Demystifying Web3 Attack Vectors, with Beau Bullock and Steve Borosh | 1 Hour
1:04:40
Black Hills Information Security
Рет қаралды 5 М.
The Ultimate Sausage Prank! Watch Their Reactions 😂🌭 #Unexpected
00:17
La La Life Shorts
Рет қаралды 7 МЛН
Noodles Eating Challenge, So Magical! So Much Fun#Funnyfamily #Partygames #Funny
00:33
SCCM Exploitation: The First Cred Is the Deepest II w/ Gabriel Prud'homme | 1-Hour
1:17:21
Black Hills Information Security
Рет қаралды 9 М.
TCP Fundamentals Part 1 // TCP/IP Explained with Wireshark
1:17:24
Chris Greer
Рет қаралды 447 М.
[2024 Fall] AI Makerspace: PEFT and Quantization of transformer models
1:00:35
Securing AWS Discover Cloud Vulnerabilities via Pentesting Techniques | Beau Bullock
57:41
Black Hills Information Security
Рет қаралды 10 М.
EDITED EDITION - Getting Started in Pentesting The Cloud-Azure | Beau Bullock | 1-Hour
1:07:03
Black Hills Information Security
Рет қаралды 30 М.
C Programming Tutorial for Beginners
3:46:13
freeCodeCamp.org
Рет қаралды 14 МЛН
BHIS | Shellcode Execution with GoLang | Joff Thyer | 1 Hour
1:04:23
Black Hills Information Security
Рет қаралды 6 М.
Attack Tactics: Part 1
55:25
Black Hills Information Security
Рет қаралды 16 М.
Snowflake
1:17:52
Jignesh Patel
Рет қаралды 807