A Case Study in Attacking KeePass

Offensive Engineer
Apr. 1, 2017
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
1 of 50

More Related Content

What's hot

A story of the passive aggressive sysadmin of AEMA story of the passive aggressive sysadmin of AEM
A story of the passive aggressive sysadmin of AEMFrans Rosén
A Threat Hunter HimselfA Threat Hunter Himself
A Threat Hunter HimselfSergey Soldatov
Cloud adoption fails - 5 ways deployments go wrong and 5 solutionsCloud adoption fails - 5 ways deployments go wrong and 5 solutions
Cloud adoption fails - 5 ways deployments go wrong and 5 solutionsYevgeniy Brikman
All You Need is One -  A ClickOnce Love Story - Secure360 2015All You Need is One -  A ClickOnce Love Story - Secure360 2015
All You Need is One - A ClickOnce Love Story - Secure360 2015NetSPI
"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
"15 Technique to Exploit File Upload Pages", Ebrahim HegazyHackIT Ukraine
I hunt sys admins 2.0I hunt sys admins 2.0
I hunt sys admins 2.0Will Schroeder

Viewers also liked

Building Better Backdoors with WMI - DerbyCon 2017Building Better Backdoors with WMI - DerbyCon 2017
Building Better Backdoors with WMI - DerbyCon 2017Alexander Polce Leary
SANS DFIR Prague: PowerShell & WMISANS DFIR Prague: PowerShell & WMI
SANS DFIR Prague: PowerShell & WMIJoe Slowik
WMI for Penetration Testers - Arcticcon 2017WMI for Penetration Testers - Arcticcon 2017
WMI for Penetration Testers - Arcticcon 2017Alexander Polce Leary
BSides London 2017 - Hunt Or Be HuntedBSides London 2017 - Hunt Or Be Hunted
BSides London 2017 - Hunt Or Be HuntedAlex Davies
PuppetConf 2017: Inviting Windows to the Puppet Party- Chris Kittell & Derek ...PuppetConf 2017: Inviting Windows to the Puppet Party- Chris Kittell & Derek ...
PuppetConf 2017: Inviting Windows to the Puppet Party- Chris Kittell & Derek ...Puppet
Ace Up the SleeveAce Up the Sleeve
Ace Up the SleeveWill Schroeder

Similar to A Case Study in Attacking KeePass

Containers: The What, Why, and HowContainers: The What, Why, and How
Containers: The What, Why, and HowSneha Inguva
Lions, Tigers and Deers: What building zoos can teach us about securing micro...Lions, Tigers and Deers: What building zoos can teach us about securing micro...
Lions, Tigers and Deers: What building zoos can teach us about securing micro...Sysdig
WTF my container just spawned a shell!WTF my container just spawned a shell!
WTF my container just spawned a shell!Sysdig
Artem Zhurbila - docker clusters (solit 2015)Artem Zhurbila - docker clusters (solit 2015)
Artem Zhurbila - docker clusters (solit 2015)Artem Zhurbila
Pecl PicksPecl Picks
Pecl PicksElizabeth Smith
Road to Opscon (Pisa '15) - DevOoopsRoad to Opscon (Pisa '15) - DevOoops
Road to Opscon (Pisa '15) - DevOoopsGianluca Varisco

More from Will Schroeder

ReCertifying Active DirectoryReCertifying Active Directory
ReCertifying Active DirectoryWill Schroeder
Certified Pre-OwnedCertified Pre-Owned
Certified Pre-OwnedWill Schroeder
SpecterOps Webinar Week - Kerberoasting RevisistedSpecterOps Webinar Week - Kerberoasting Revisisted
SpecterOps Webinar Week - Kerberoasting RevisistedWill Schroeder
DerbyCon 2019 - Kerberoasting RevisitedDerbyCon 2019 - Kerberoasting Revisited
DerbyCon 2019 - Kerberoasting RevisitedWill Schroeder
Not a Security BoundaryNot a Security Boundary
Not a Security BoundaryWill Schroeder
Derbycon - The Unintended Risks of Trusting Active DirectoryDerbycon - The Unintended Risks of Trusting Active Directory
Derbycon - The Unintended Risks of Trusting Active DirectoryWill Schroeder

Recently uploaded

APrIGF 2023: Sustainability of Complementary Connectivity InitiativesAPrIGF 2023: Sustainability of Complementary Connectivity Initiatives
APrIGF 2023: Sustainability of Complementary Connectivity InitiativesAPNIC
380869421-final-ict-animation-grades-11-12.pdf380869421-final-ict-animation-grades-11-12.pdf
380869421-final-ict-animation-grades-11-12.pdfMarlRinaEsperanza
CASE STUDY.pdfCASE STUDY.pdf
CASE STUDY.pdfShivamYadav8517
i3.pdfi3.pdf
i3.pdfssusere51484
[FediForum] Reisman FairPay - Rethinking Revenue.pdf[FediForum] Reisman FairPay - Rethinking Revenue.pdf
[FediForum] Reisman FairPay - Rethinking Revenue.pdfTeleshuttle Corporation
Microsoft Blockchain Case Studies.pptxMicrosoft Blockchain Case Studies.pptx
Microsoft Blockchain Case Studies.pptxJoelJohn481077

A Case Study in Attacking KeePass