BlueHat Oct 23. S10: Exploring the Windows Registry as a Powerful LPE Attack Surface

BlueHat Oct 23. S10: Exploring the Windows Registry as a Powerful LPE Attack Surface

BlueHat Oct 23. S21: Building a Canarytoken to Monitor Windows Process ExecutionПодробнее

BlueHat Oct 23. S21: Building a Canarytoken to Monitor Windows Process Execution

BlueHat Oct 23. S05: Octo Tempest: A Year of ResponseПодробнее

BlueHat Oct 23. S05: Octo Tempest: A Year of Response

BlueHat Oct 23. S07: Signed, Sealed, Delivered: The Rise of Signed Malicious DriversПодробнее

BlueHat Oct 23. S07: Signed, Sealed, Delivered: The Rise of Signed Malicious Drivers

BlueHat Oct 23. S16: All Killer, No Filler: Exploring the Current State of EDR KillersПодробнее

BlueHat Oct 23. S16: All Killer, No Filler: Exploring the Current State of EDR Killers

BlueHat IL 2023 - David Weston - Default SecurityПодробнее

BlueHat IL 2023 - David Weston - Default Security

BlueHat Oct 23. S02: A Touch of Pwn: Attacking Windows Hello Fingerprint AuthenticationПодробнее

BlueHat Oct 23. S02: A Touch of Pwn: Attacking Windows Hello Fingerprint Authentication

BlueHat 2023: Why I Write My Own Security Tooling with James ForshawПодробнее

BlueHat 2023: Why I Write My Own Security Tooling with James Forshaw

BlueHat IL 2023 - James Forshaw - Windows AuthenticationПодробнее

BlueHat IL 2023 - James Forshaw - Windows Authentication

BlueHat 2023: David Weston KeynoteПодробнее

BlueHat 2023: David Weston Keynote