Desired State - Compromised
Offered By: BruCON Security Conference via YouTube
Course Description
Overview
Explore advanced techniques for compromising Windows environments in this conference talk from BruCON Security Conference. Delve into the world of offensive security as Ryan Kazanciyan and Matt Hastings demonstrate sophisticated methods for achieving persistence and evading detection in Windows systems. Learn about leveraging PowerShell, abusing Windows Management Instrumentation (WMI), and exploiting Group Policy Objects (GPOs) to maintain long-term access to compromised networks. Gain insights into the mindset of attackers and discover practical strategies for enhancing your organization's defensive capabilities against these advanced threats.
Syllabus
BruCON 0x07 -Desired state: compromised - Ryan Kazanciyan & Matt Hastings
Taught by
BruCON Security Conference
Related Courses
Ethical HackingIndian Institute of Technology, Kharagpur via Swayam Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax MSc Cyber Security
Coventry University via FutureLearn Network Security - Introduction to Network Security
New York University (NYU) via edX Network Security - Advanced Topics
New York University (NYU) via edX