Hacktivity - IT Security Festival
Hacktivity - IT Security Festival
The IT Security Festival
- Free late night party
- Wargame, hardware hacking, lockpicking, surprises
- Presentations, workshops
- 1000+ attendants
#HACKTIVITY is the biggest event of its kind in Central & Eastern Europe. About 1000 visitors are coming from all around the globe every year to learn more about the latest trends of cybersecurity, get inspired by people with similar interest and develop themselves via comprehensive workshops and training sessions.
www.hacktivity.com
Пікірлер
Cheers to you akhi, well done!
I'm proud of you brother
how to download the slides ?
where can I get this slide?
Hi. We have contacted the presenter for the slides.
@@hacktivityconf Thanks! looking forward to it!
Szuper előadás volt! Köszönöm Péter!
Nekünk is nagyon tetszett :)
Thanks for information ❤
Wow 500,000 devices that's insane I'm just now hearing about this
The close captioning needs work mostly because the speaker has a significant accent, which makes the captioning process difficult. But it should have been checked.
Thank you for the feedback. We forwarded this issue to the online media team for review.
Excellent demonstration. Well done.
voice is boring asf an cant even see screen that well pointless
Muito bom! Uma tecnica bastante volatil, o poder dos socks proxys.
that's why companies should have their own github or gitlab repository.
Great talk man.. awesome
:)
There are bad guys every where, I dont know why they do this but this is really cruel to get over someone's open source. Really a great topic and a great video which requires more and more popularity so that it creates awareness.
Brilliant
Thanks Great Video
Nice work. Is it ported on an actual ARM chipset?
Pretty good video, We want more videos about AD.
Thank you. We recommend the following one for you kzread.info/dash/bejne/gYWT2Lmwo5Ose5M.html
Really like the content, Yossi! One small question - you showed that after stealing the security token of a domain admin's WinRM process (initiated after logon type = network), you can not only impersonate the user on the local machine, but also over the network. Can you explain how is it possible? I thought that the TGT / NTLM hash is not stored on the remote machine when doing network logon, so what kind of information was relayed to the remote services which made them 'trust' they are indeed talking to the domain admin, after the impersonation?
Your question has been relayed to the speaker.
Thank you so much for providing valuable information ❤
Great information ❤
very interesting, thanks
what a bountiful lesson from a grade A professional!
great talk!
Would like hear his thoughts on the Pmkid attack!
Ahhhh ahmmmmmm
what is PTK sir ?
Great presentation; but I had to chuckle @ 7:05 when the key pins defied gravity and floated back up after their driver pins were set.
Nice
HAHAHAAHA POPUP WINDOW BYPASS CRACK 2022
code properties graph???
Wow, this presentation has been very informative. From ages ago, I always felt mainframe should be accessed only from the within the network, with limited access to the real world via proxies, security tunnels, etc. Yeah, mainframe security reminds like when you are locked outside your house, but then you realize the loopholes as to get in.
He's funny 😂
Great talk!
Thank you! :)
still worth 💗💗💗
dgrhtjykgh
Zbs 🎉
Péter Szőr, bless his soul ..he died very young... anyone know how he died?
great tool and very informative presentation
Website name
this man’s a legend
second!
Joe i love ya video soooooooooooooooooooooooo much
Thank you again for inviting ma and for your hospitability :)
china boy: privacy?
!
5:59 link so you don't have to type: kzread.info/dash/bejne/oYxm28mRfruumbA.html