events

Conferences, Trainings,
Black Hat Events,
Talks & Where to Find Us

Past

The Unintended Risks of Trusting Active Directory

Past

PowerShell, Reflection, and the Windows API

Past

The Power of the Dark Side: Offensive PowerShell Workshop

Past

Auditing Domain Trust Relationships

Past

Working with Binary Data: Writing your own parser

Past

Threat-based Purple Teaming with ATT&CK

Past

ATT&CKing with Threat Intelligence

Past

Subverting Sysmon: Application of a Formalized Security Product Evasion Methodology

Past

ATT&Cking the Status Quo: Threat-Based Adversary Emulation with MITRE ATT&CK

Past

When Macs Come Under ATTCK

Past

A Process is No One: Hunting for Token Manipulation

Past

The Unintended Risks of Trusting Active Directory

Up Next

In The Past

Hi, My Name is “CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US”

Jan 24, 2018

A Process is No One: Hunting for Token Manipulation

Dec 07, 2017

Subverting & Restoring Trust in Windows

Nov 07, 2017

_____ Is Not a Security Boundary: Things I Have Learned and Things That Have Gotten Better from Researching Microsoft Software

Nov 07, 2017

Windows Operating System Archaeology

Oct 27, 2017

Building a Better Moat: Designing an Effective Covert Red Team Attack Infrastructure

Oct 25, 2017

How Graphs Changed The Way Hackers Attack

Oct 25, 2017

Not a Security Boundary: Bypassing User Account Control

Sep 24, 2017

Subverting Trust in Windows – A Case Study of the “How” and “Why” of Engaging in Security Research

Sep 22, 2017
get started

Secure Your Future
Against Modern Attacks

Talk to an Expert