Windows Privilege Escalation Techniques

This presentation is a collection of techniques that pentesters use after obtaining a foothold on a network. There will be demos :)

At a bare minimum, the following techniques will be discussed:
1. design issues
2. misconfigurations
3. binary planting
4. permission issues
5. memory and disk forensics
6. hash passing/spraying


Riyaz Walikar

I like photography, stargazing, collecting stamps and fishing.


Starts at Saturday June 11 2016, 03:30 PM. The sessions runs for about 1 hour.