Protect mission-critical assets from identity compromise with new Privilege Zones in BloodHound Enterprise. Learn More
aguy@specterops.io
See the latest by Aguy@specterops.io
Revisiting COM Hijacking
TL;DR: This post shows how COM hijacking can serve as a reliable persistence method while also...