Video Contents

- Unsecurely configured Windows services [0:05]
- Searching for service misconfigurations with accesschk.exe [1:21]
- Exploiting the misconfiguration [3:08]
- Trojan service source code review [3:27]
- Code compilation and demo [6:12]