events

Conferences, Trainings,
Black Hat Events,
Talks & Where to Find Us

Past

A Process is No One: Hunting for Token Manipulation

Past

Subverting & Restoring Trust in Windows

Past

_____ Is Not a Security Boundary: Things I Have Learned and Things That Have Gotten Better from Researching Microsoft Software

Past

Windows Operating System Archaeology

Past

How Graphs Changed The Way Hackers Attack

Past

Building a Better Moat: Designing an Effective Covert Red Team Attack Infrastructure

Past

Not a Security Boundary: Bypassing User Account Control

Past

Subverting Trust in Windows – A Case Study of the “How” and “Why” of Engaging in Security Research

Past

An ACE in the Hole: Stealthy Host Persistence via Security Descriptors

Past

Here Be Dragons: The Unexplored Land of Active Directory ACLs

Past

An ACE Up The Sleeve: Designing Active Directory DACL Backdoors

Past

An ACE Up The Sleeve – Designing Active Directory DACL Backdoors

Past

Doomsday Preppers: Fortifying Your Red Team Infrastructure

Past

Catch Me If You Can: PowerShell Red vs. Blue

Past

BloodHound 1.3 – The ACL Attack Paths Update

Up Next

In The Past

Past

How Graphs Changed The Way Hackers Attack

Oct 25, 2017
Past

Not a Security Boundary: Bypassing User Account Control

Sep 24, 2017
Past

Here Be Dragons: The Unexplored Land of Active Directory ACLs

Sep 22, 2017
Past

An ACE in the Hole: Stealthy Host Persistence via Security Descriptors

Sep 22, 2017
Past

Subverting Trust in Windows – A Case Study of the “How” and “Why” of Engaging in Security Research

Sep 22, 2017
Past

An ACE Up The Sleeve: Designing Active Directory DACL Backdoors

Jul 28, 2017
Past

An ACE Up The Sleeve – Designing Active Directory DACL Backdoors

Jul 26, 2017
Past

Doomsday Preppers: Fortifying Your Red Team Infrastructure

May 20, 2017
Past

Catch Me If You Can: PowerShell Red vs. Blue

May 18, 2017
get started

Secure Your Future
Against Modern Attacks

Talk to an Expert