How Graphs Changed The Way Hackers Attack
Building a Better Moat: Designing an Effective Covert Red Team Attack Infrastructure
Not a Security Boundary: Bypassing User Account Control
Here Be Dragons: The Unexplored Land of Active Directory ACLs
Subverting Trust in Windows – A Case Study of the “How” and “Why” of Engaging in Security Research
An ACE in the Hole: Stealthy Host Persistence via Security Descriptors
An ACE Up The Sleeve: Designing Active Directory DACL Backdoors
An ACE Up The Sleeve – Designing Active Directory DACL Backdoors
Doomsday Preppers: Fortifying Your Red Team Infrastructure