Главная
Study mode:
on
1
Intro
2
Mona
3
Presentation Outline
4
Penetration Testing
5
Retaining Red Teaming
6
Mitre Framework
7
Scenario
8
Framework
9
Cyberkill Chain
10
Delivery
11
Mitigation
12
System Information Discovery
13
Test Procedure
14
System Info Discovery
15
Next Demo
16
Threat Simulator Terminology
17
Template Injection
18
Secure User Behavior
19
Microsoft Office
20
Nginx Container
21
Indicators
22
Calculated Process
23
Conclusions
24
Outro
Description:
Explore adversary emulation techniques on Windows systems in this 27-minute conference talk from DefCamp 2021. Delve into penetration testing, red teaming, and the MITRE Framework while examining a practical scenario. Learn about the Cyberkill Chain, delivery methods, and mitigation strategies. Discover system information gathering techniques and test procedures. Gain insights into threat simulator terminology, template injection, and secure user behavior. Analyze Microsoft Office vulnerabilities and Nginx container indicators. Conclude with a comprehensive understanding of calculated processes in adversary emulation for Windows environments.

Adversary Emulation on Windows - DefCamp - 2021

DefCamp
Add to list
0:00 / 0:00