Arsenal Image Mounter - VM Launch with DPAPI Bypass and External Tool Attachment via RAM Disk
Demonstrating AIM v3.11.279 launching the BelkaSoft PartyGirl CTF forensic image into a virtual machine with Windows authentication and DPAPI bypasses, then the attachment of external tools (LaZagne and NirSoft's EdgeCookiesView) via an AIM-created RAM disk to find some interesting things.
Видео Arsenal Image Mounter - VM Launch with DPAPI Bypass and External Tool Attachment via RAM Disk канала Arsenal Recon
Видео Arsenal Image Mounter - VM Launch with DPAPI Bypass and External Tool Attachment via RAM Disk канала Arsenal Recon
Комментарии отсутствуют
Информация о видео
5 февраля 2024 г. 22:13:28
00:03:51
Другие видео канала