Главная
Study mode:
on
1
Intro
2
What do you do next
3
Demo
4
Whats Next
5
Introduction
6
Good Content
7
Outline
8
Basics
9
PowerShell
10
Query Language
11
Instance Query
12
Register Events
13
Eventing
14
Intrinsic Events
15
extrinsic Events
16
Consumers
17
Attack History
18
Attack Surface
19
Reconnaissance
20
Code Execution
21
Persistence
22
WMI
23
WMI Providers
24
Investigating the Attacks
25
What to Expect
26
Reverse Engineering
27
Index BTR
28
AMI Warning
29
Detection
Description:
Explore advanced Windows Management Instrumentation (WMI) attacks, real-time defense strategies, and forensic analysis techniques in this comprehensive conference talk. Delve into PowerShell query language, instance queries, and event registration while learning about WMI's attack surface, reconnaissance methods, and code execution techniques. Gain insights into WMI providers, attack investigation, and reverse engineering processes. Discover effective detection mechanisms and understand the intricacies of Index BTRAMI warnings to enhance your cybersecurity skills and defend against sophisticated WMI-based threats.

WhyMI so Sexy - WMI Attacks, Real Time Defense, and Advanced Forensic Analysis

Add to list
0:00 / 0:00