events

Conferences, Trainings,
Black Hat Events,
Talks & Where to Find Us

Past

Subverting Trust in Windows – A Case Study of the “How” and “Why” of Engaging in Security Research

Past

An ACE in the Hole: Stealthy Host Persistence via Security Descriptors

Past

Here Be Dragons: The Unexplored Land of Active Directory ACLs

Past

Not a Security Boundary: Bypassing User Account Control

Past

How Graphs Changed The Way Hackers Attack

Past

Building a Better Moat: Designing an Effective Covert Red Team Attack Infrastructure

Past

Windows Operating System Archaeology

Past

Subverting & Restoring Trust in Windows

Past

_____ Is Not a Security Boundary: Things I Have Learned and Things That Have Gotten Better from Researching Microsoft Software

Past

A Process is No One: Hunting for Token Manipulation

Past

Hi, My Name is “CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US”

Past

Subverting Trust in Windows

Up Next

In The Past

Subverting Sysmon: Application of a Formalized Security Product Evasion Methodology

Aug 08, 2018

ATT&CKing with Threat Intelligence

Jul 20, 2018

Threat-based Purple Teaming with ATT&CK

May 07, 2018

Auditing Domain Trust Relationships

Apr 19, 2018

Working with Binary Data: Writing your own parser

Apr 19, 2018

PowerShell, Reflection, and the Windows API

Apr 18, 2018

The Power of the Dark Side: Offensive PowerShell Workshop

Apr 18, 2018

The Unintended Risks of Trusting Active Directory

Apr 07, 2018

Subverting Trust in Windows

Mar 15, 2018
get started

Secure Your Future
Against Modern Attacks

Talk to an Expert