Credential dumping is a common technique among cyber criminals. This literally allows access to the keys that control the kingdom leading to complete dominance. So how do you block it? I'm going to show you an easy way using Attack Surface Reduction rules in Windows...
Demystifying Attack Surface Reduction Rules: [ Ссылка ]
Deployment Documentation: [ Ссылка ]
Table of Contents:
00:00:00 Intro
00:00:35 Disclaimer
00:00:54 Demo w/o ASR
00:04:12 Demo w/ASR
00:05:33 Final Thoughts
Note: The views and expressions on my videos do not represent those of my employer and are strictly my own.
All content provided on this channel is for informational purposes only. The owner of this channel makes no representations as to the accuracy or completeness of any information on this site or found by following any link on this channel.
The owner of this channel will not be liable for any errors or omissions in this information nor for the availability of this information. The owner will not be liable for any losses, injuries, or damages from the display or use of this information.
These terms and conditions is subject to change at anytime with or without notice.
Ещё видео!