Operating in the Shadows

Operating in the Shadows

This talk will focus detecting and avoiding detection on Windows based environments. Many defenders don’t know what to look for and where to detect presence of an attacker in their network. Many pentesters do not even know what trail of cookie crumbs their action leave on a target network so as to recommend defenders how to better detect and mitigate. Also covered will be how to leave an even smaller footprint on the target network so as to minimize chance of detection on customer with proper security practices.

Presented by