The Power of Coercion Techniques in Windows Environments
Offered By: WEareTROOPERS via YouTube
Course Description
Overview
Explore the intricacies of coercion techniques in Windows environments through this 47-minute conference talk delivered by Martin Grottenthaler at TROOPERS23, an IT security conference held in Heidelberg, Germany. Delve into the powerful methods used to manipulate Windows systems, gaining valuable insights into potential vulnerabilities and attack vectors. Learn how these techniques can be leveraged by both attackers and defenders in the realm of cybersecurity. Enhance your understanding of Windows security and discover strategies to protect against coercion-based threats in this informative presentation hosted by @ERNW_ITSec.
Syllabus
TROOPERS23: The Power of Coercion Techniques in Windows Environments
Taught by
WEareTROOPERS
Related Courses
Modmob Tools - Home Made Tools to Test Mobile Devices and Monitor NetworksWEareTROOPERS via YouTube Microsoft IT - Secure Journey to IPv6-Only
WEareTROOPERS via YouTube Introducing Faction - A Modern, Powerful, Multiplayer C2 Framework
WEareTROOPERS via YouTube A Diet of Poisoned Fruit - Designing Implants and OT Payloads for ICS Embedded Devices
WEareTROOPERS via YouTube Hardware Side Channel Attacks on the Cheapest
WEareTROOPERS via YouTube