The endpoint is continuing to be a large focus for enterprises for most organizations due to the severe lack of visibility. An entire market has spawned with an attempt to understand how attackers are initially compromising an organization and performing further post exploitation scenarios. This talk goes through a number of techniques and tactics designed to evade endpoint detection and focus on more targeted attack vectors.