41 min

Securing the Past with Dustin Heywood The BlueHat Podcast

    • Technology

Dustin Heywood, Hacker, Researcher, and Senior Leader at IBM, joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Dustin provided a live demonstration of cracking NTLM version 1 during his BlueHat presentation, showcasing the process of responding to challenges, using coercion techniques, and ultimately extracting and cracking the NTLM hash. Dustin, Nic, and Wendy discuss checking group policies, auditing every object, ensuring relevant systems, and managing IT assets effectively. They emphasize the importance of IT asset management and recommend quarantining legacy systems with restricted access. 
  
 
In This Episode You Will Learn:    
 
Why security professionals need business skills for effective communication Advice for auditing legacy systems with vulnerable protocols  Extracting DPAPI keys and decrypting browser session history  
 
Some Questions We Ask:     
 
How do you manage risk for legacy systems deemed necessary for business? Can you discuss some of the outdated protocols in current IT environments? What guidance would you offer to IT professionals looking to audit their systems? 
 
Resources:  
View Dustin Heywood on LinkedIn 
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
 
 
Related Microsoft Podcasts:  
 
Microsoft Threat Intelligence Podcast  Afternoon Cyber Tea with Ann Johnson  Uncovering Hidden Risks   
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  

Hosted on Acast. See acast.com/privacy for more information.

Dustin Heywood, Hacker, Researcher, and Senior Leader at IBM, joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Dustin provided a live demonstration of cracking NTLM version 1 during his BlueHat presentation, showcasing the process of responding to challenges, using coercion techniques, and ultimately extracting and cracking the NTLM hash. Dustin, Nic, and Wendy discuss checking group policies, auditing every object, ensuring relevant systems, and managing IT assets effectively. They emphasize the importance of IT asset management and recommend quarantining legacy systems with restricted access. 
  
 
In This Episode You Will Learn:    
 
Why security professionals need business skills for effective communication Advice for auditing legacy systems with vulnerable protocols  Extracting DPAPI keys and decrypting browser session history  
 
Some Questions We Ask:     
 
How do you manage risk for legacy systems deemed necessary for business? Can you discuss some of the outdated protocols in current IT environments? What guidance would you offer to IT professionals looking to audit their systems? 
 
Resources:  
View Dustin Heywood on LinkedIn 
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
 
 
Related Microsoft Podcasts:  
 
Microsoft Threat Intelligence Podcast  Afternoon Cyber Tea with Ann Johnson  Uncovering Hidden Risks   
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  

Hosted on Acast. See acast.com/privacy for more information.

41 min

Top Podcasts In Technology

TED Tech
TED Tech
Darknet Diaries
Jack Rhysider
Modem Mischief
Keith Korneluk
"World of DaaS"
Word of DaaS with Auren Hoffman
The Tech Talks Daily Podcast
Neil C. Hughes
Apple Events (video)
Apple