Hacking Windows with Windows
This session covers deep dive into the technique many advanced threat actors uses when attacks are performed. The trend has changed from uploading custom binary files to using Windows binaries to perform needed actions. We will look into how to use Windows binaries to do the heavy lifting under an attack and also look into other Windows features such as DCOM. The session will also cover how to mitigate/detect these attacks.