Tech

Cain BeEF Hash: Snagging passwords without popping boxes


Expo Theatre (Hall G) October 20, 2009 - Feedback   

Bookmark and Share

Ryan Linn

Chaining exploits and abusing trust are two heavily discussed topics in security today. If you ever deal with Windows domains come see what tools and techniques can be used to quietly liberate hashes even if the workstations are patched. This presentation will go in depth into what tools can facilitate turning acquired credentials into usable passwords quickly. Once the demonstrations are finished, there will be explanations of techniques and policies that can be used to mitigate and reduce the impact of these types of attacks.