- Bjoern TrappeSpecterOpsAdversary Tactics - Vulnerability Research for OperatorsCody NelsonAugust 8 - 9, 16 Credit Hours

Bjoern Trappe
SpecterOps
Adversary Tactics - Vulnerability Research for Operators
Cody Nelson
August 8 - 9, 16 Credit Hours
Bjoern Trappe
Relying on publicly available and stock tooling to leverage weaknesses in enterprise Windows environments to execute effective red team operations is becoming increasingly difficult. However, complex environments, with custom applications and configurations, often contain significant exploit potential attackers could utilize. Red team operators capable of taking advantage of these weaknesses can simulate more advanced adversaries, and help organizations remove difficult to identify attack chains. This course teaches the methodology and tools to find, triage, and utilize exploitable vulnerabilities on Windows systems in time-sensitive engagements. You will dive into the vulnerability classes that SpecterOps routinely finds in mature environments and practice methods of identification, triage, and exploitation
Skills / Knowledge
- PenTesting
- Malware
Issued on
August 9, 2022
Expires on
Does not expire