Lateral Movement Techniques in windows environment

Abstract

Workshop Time - 02:00 pm - 06:00 pm (SGT)

In today’s tough environment, data breaches are becoming more prevalent, and enterprises may be affected. Organizations are still pondering how they were hacked, and they have begun to explore ways to mimic the attacks they are currently suffering. We’re aiming to re-create techniques used by attacker to laterally move from one machine to another in windows environment.


  • Active Directory Fundamentals
  • NTLM and Kerberos Authentication
  • What is Lateral Movement
  • Why Lateral Movement
  • PowerShell Remoting
  • Service Controller
  • PsExec
  • Task Scheduler
  • Windows Management Instrumentation (WMI)
  • Pass the hash, Over Pass the hash , Pass the Ticket
  • SCShell
  • COM and DCOM

Register for this workshop

Speakers Information


Samaksh Kaushik

Samaksh (aka zarvis) works as Sec. Consultant/Red Teamer at Payatu, specializing in areas not limited to but including Web, Network, Mobile, Red Team, etc. In his spare time, he likes to read about other areas of technology. He holds OSCP, CRTP, CEH certifications. His course interest lies in Offensive tool development, Red Teaming, Automating stuff. He can be reached at https://github.com/zarvisd


Hari Prasad

Hari Prasad (@MrH4r1) works as a Sec. Consultant/Red Teamer at Payatu, specializing in the web app, API, and mobile app penetration testing. He began his career as a web application developer and then applied his talents to hack security things. In his spare time, he enjoys bug bounty hunting and has been honored by a number of companies. Apart from that, he enjoys doing Red Teaming research. He has a number of certificates, including CEH and CRTP.





View Full Schedule

Subscribe to Our Mailing List

Join our community mailing list for updated on conference annoucements, important dates and discussions.