SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsWith technologies like Credential Guard and LSA Protection becoming defaults in new versions of Windows, red teamers need to find new ways to loot credentials on compromised Windows systems, and it just so happens that one of the most practical alternatives to tradional lsass.exe dumping for passwords is looting credentials stored in web browsers I'll be breaking down how DPAPI works and its usage in securing browser secrets, how attackers have historically abused DPAPI for looting browsers, and how modern Chromium-based browsers introduced AppBound Encryption to mitigate such attacks. Then I'll also cover the techniques that have surfaced to bypass AppBound and continue to loot browser credentials despite these protections. The goal is to give a red team perspective on why browsers remain such a high-value target, how Windows internals can be turned against themselves, the evolving cat-and-mouse dynamic between mitigations and bypasses, and what the current attack surface of browser-stored secrets looks like in practice.


Melvin is a Senior Red Team Operator at Pentraze Cybersecurity, focused on red teaming and penetration testing, with vast hands-on expertise evaluating the security of enterprise networks, cloud services, and application stacks across both web and mobile.
Read more about Melvin Mejia
















