Chapter

Extracting Passwords using Mimikatz
listen on Spotify
15:32 - 24:20 (08:48)

A group of techies gathered in a small room to discuss using Mimikatz to extract clear text passwords from unpatched systems that lack protection for cached passwords. They also discussed using timeline tools to identify affected systems.

Clips
Sensitive information like login credentials can be stored in clear text in the memory of unpatched systems, making it easy for hackers to extract the data using tools like Mimikatz.
15:32 - 19:54 (04:22)
listen on Spotify
Data Security
Summary

Sensitive information like login credentials can be stored in clear text in the memory of unpatched systems, making it easy for hackers to extract the data using tools like Mimikatz. This can lead to devastating data breaches with serious consequences.

Chapter
Extracting Passwords using Mimikatz
Episode
103: Cloud Hopper
Podcast
Darknet Diaries
The process of identifying a malware attack involves building a timeline of files created, modified, and accessed on disk, correlating that with the connection time to the command and control server, analyzing new or modified files, and narrowing them down to possible malicious files.
19:54 - 24:20 (04:26)
listen on Spotify
Malware Detection
Summary

The process of identifying a malware attack involves building a timeline of files created, modified, and accessed on disk, correlating that with the connection time to the command and control server, analyzing new or modified files, and narrowing them down to possible malicious files.

Chapter
Extracting Passwords using Mimikatz
Episode
103: Cloud Hopper
Podcast
Darknet Diaries