Notes on redteam tactics
Thursday, March 11, 2021 9:30 AM to 10:20 AM · 50 min. (Africa/Abidjan)
DataStore Conference Room
Expert Tracks April 6
Cyber Security
Information
Notes taken as a preparation to pass an offensive certification.
COM: What it is and how to abuse it
WMI: What it is and how to abuse it
Privilege escalations techniques
Persistence techniques
Evasion techniques
Proxy all the hijacks:
- DLL proxying example