Search Results
Track 3 03 Detecting WMI exploitation Michael Gough
Windows Management Instrumentation (WMI) - defending against adversaries | Red Canary
Michael Gough - Searching Logs for Hackers. What you need to know and how to catch them
Track 3 06 VBA Stomping Advanced Malware Techniques Carrie Roberts Kirk Sayre Harold Ogden
Michael Gough (All or Nothing)
PowerShell post-exploitation, the Empire has fallen - Michael Gough
Unveiling the not-PowerShell cult (Mangatas Tondang)
Investigating WMI Attacks
Stable 26 RID Hijacking Maintaining Access on Windows Machines Sebastin Castro
Track 3 05 Instant Response Making IR faster than you thought possible Mick Douglas Josh Johnson
Track 3 17 Killsuit The Equation Groups Swiss Army knife for persistence evasion and data exfil Fran
Track 3 20 Hillbilly Storytime Pentest Fails Adam Compton