Presentations

Shmoocon Firetalks 2015 – Collaborative Scanning with Minions

CarolinaCon 11 2015 – Drilling Deeper with Veil’s PowerTools

BSides Chicago 2015 – The Trust You Might Have Missed

BSides Las Vegas 2015 – Building an Empire with PowerShell

BSidesDC 2016 – Adversarial Post Exploitation: Lessons from the Pros

HackMiami 2017 – Abusing “Accepted Risk” With 3rd Party Command and Control (C2)

BSidesMSP 2017 – Threat Hunting with Scored Network Features

BsidesLV 2017 – Network Forensic Analysis in an Encrypted World

BSidesDC 2017 – Threat Hunting with Scored Network Features

BSidesSF 2018 – Unraveling the Threat of Chrome Based Malware

Shakacon 2018 – Network Defender Archaeology – An NSM Case Study of Lateral Movement with DCOM

Write a Comment

Comment