The Unintended Risks of Trusting Active Directory
A Process is No One: Hunting for Token Manipulation
When Macs Come Under ATTCK
ATT&Cking the Status Quo: Threat-Based Adversary Emulation with MITRE ATT&CK
Subverting Sysmon: Application of a Formalized Security Product Evasion Methodology
ATT&CKing with Threat Intelligence
Threat-based Purple Teaming with ATT&CK
Working with Binary Data: Writing your own parser
Apr 19, 2018
Auditing Domain Trust Relationships
Apr 19, 2018