Chapter
Clips
Sensitive information like login credentials can be stored in clear text in the memory of unpatched systems, making it easy for hackers to extract the data using tools like Mimikatz.
15:32 - 19:54 (04:22)
Summary
Sensitive information like login credentials can be stored in clear text in the memory of unpatched systems, making it easy for hackers to extract the data using tools like Mimikatz. This can lead to devastating data breaches with serious consequences.
ChapterExtracting Passwords using Mimikatz
Episode103: Cloud Hopper
PodcastDarknet Diaries
The process of identifying a malware attack involves building a timeline of files created, modified, and accessed on disk, correlating that with the connection time to the command and control server, analyzing new or modified files, and narrowing them down to possible malicious files.
19:54 - 24:20 (04:26)
Summary
The process of identifying a malware attack involves building a timeline of files created, modified, and accessed on disk, correlating that with the connection time to the command and control server, analyzing new or modified files, and narrowing them down to possible malicious files.