Slide 44
Slide 44 text
Attack Methods:
- Intel AMT
- Pass-The-Hash (PTH)
- SMBEXEC by brav0hax
- DCOM Lateral Movement
- Network scan visualization with Neo4J, Moloch, etc.
Defense:
- Hardening of workstations, servers, etc.
- Previous recommendations (least privileges, etc.)