Core Impact empowers organizations to proactively minimize risk and protect critical assets by using the same techniques as today’s threat actors to assess their infrastructure’s
At BSides Las Vegas, I talked about Force Multipliers for Red Team Operations. In this talk, I shared several stories about how my evil bots stole passwords,
High latency communication allows you to conduct operations on your target’s network, without detection, for a long time. An example of high-latency communication is a
Currently, I’m debating a class of social engineering “packages” to force SMB requests against an attacker controlled system. Ideas include packages to generate LNK files,
DLL attacks (hijacking, proxying, etc) are a challenge defenders must face. They can be leveraged in a Red Team engagement to help measure these defenses.
CypherCon is Wisconsin’s premier hacker and technology gathering, bringing together cybersecurity professionals, tech hobbyists, and curious learners for two days packed with creativity, innovation, and