Wherever and whenever you log on to any Windows workstation or servers you leave your password credentials behind. The common knowledge is that when we set up our password in Windows it is hashed and stored either in SAM or a ntds.dit database in Active Directory. This is useful for verification purposes, but if your operating system can re-use the password it means others can decrypt it! Another thing is that when a hash is cached may be reused for authentication later.
Join Paula Januszkiewicz, Enterprise Security MVP and Microsoft Security Trusted Advisor, in this engaging webcast to learn about the famous pass-the-hash attack, learn the encryption and decryption techniques being used nowadays in systems, networks, and applications, and learn how to prevent password credentials from being leaked!
- How to prevent password credential leakage in Windows
- How credential attacks work
- What is the role of cryptography for passwords in Windows
- How Pass-The-Hash attacks work and how to prevent them
Paula Januszkiewicz, CEO CQURE, penetration tester and mentor of CQURE Academy. Paula is also an Enterprise Security MVP and trainer (MCT) and Microsoft Security Trusted Advisor. She is also a top speaker at many well-known conferences including TechEd North America, TechEd Europe, TechEd Middle East, RSA, TechDays, CyberCrime, etc., and is often rated as number-one speaker.
Paula is engaged as a keynote speaker for security related events and she writes articles on Windows Security. Her company CQURE has now 3 locations New York, Dubai and Warsaw. Paula has conducted hundreds of IT security audits and penetration tests, including those for governmental organizations, she is a renowned security consultant. Her distinct specialization is related to Microsoft security solutions in which she holds multiple Microsoft certifications, besides being familiar with and possessing certifications in other related technologies and operating systems. Paula is passionate about sharing her knowledge with others.
In private, she enjoys researching new technologies, which she converts to authored trainings. She wrote a book about Threat Management Gateway 2010, and is working on her next book. She has access to a source code of Windows! Every year she makes over 200 flights (2013 - 248) to gain more and more experience, provides penetration tests and consults Customers about how to secure their infrastructures. Her favorite saying is: "I have a tool for that!"