YoVDO

Desired State - Compromised

Offered By: BruCON Security Conference via YouTube

Tags

BruCON Courses Cybersecurity Courses Ethical Hacking Courses Offensive Security Courses

Course Description

Overview

Explore advanced techniques for compromising Windows environments in this conference talk from BruCON Security Conference. Delve into the world of offensive security as Ryan Kazanciyan and Matt Hastings demonstrate sophisticated methods for achieving persistence and evading detection in Windows systems. Learn about leveraging PowerShell, abusing Windows Management Instrumentation (WMI), and exploiting Group Policy Objects (GPOs) to maintain long-term access to compromised networks. Gain insights into the mindset of attackers and discover practical strategies for enhancing your organization's defensive capabilities against these advanced threats.

Syllabus

BruCON 0x07 -Desired state: compromised - Ryan Kazanciyan & Matt Hastings


Taught by

BruCON Security Conference

Related Courses

Being a Cyberdefender - Behind the Curtains
BruCON Security Conference via YouTube
Bypassing Microsoft Defender for Identity
BruCON Security Conference via YouTube
A Black-Box Security Evaluation of the SpaceX Starlink User Terminal
BruCON Security Conference via YouTube
Android Malware Targeting Belgian Financial Apps
BruCON Security Conference via YouTube
Chasing the White Whale of Malware
BruCON Security Conference via YouTube