Explore a typical hash attack, how systems are cached, and the best approach for clearing.
- [01:26] - Pass the hash
- [12:57] - Attack scenario
- [26:28] - Demo: Has Crack
- [39:49] - MS why not just fix it?
Full course outline:
- Mod 01: Today's Threat Landscape
- Mod 02: Principles of Security
- Mod 03: Understanding Your Enemy
- Mod 04: Phases of Hackers
- Mod 05: What Motivates Hackers?
- Mod 06: Pass the Hash
- Mod 07: Windows Security Capabilities and Tools