Next BHIS Webcast -- Getting Started in Covert .NET Tradecraft for Post-Exploitation w/ Kyle Avery

Next BHIS Webcast -- Getting Started in Covert .NET Tradecraft for Post-Exploitation w/ Kyle Avery

Are you tired of your PowerShell scripts getting caught by modern security products? Starting to notice execute-assembly doesn't fly every time?

There are many fantastic C# tools for Windows post-exploitation, but they're only helpful if you can execute them without being detected. After all the hard work getting your C2 implant to run, you shouldn't get caught at your first action in the network.

This Black Hills Information Security (BHIS) webcast will cover OPSEC safe fork-n-run execution with Cobalt Strike, .NET log sources available to network defenders and security vendors, and obfuscation of public C# tools to evade EDR products consistently.

If you're curious why penetration testers, red teamers, and even real threat actors prefer C# over PowerShell for post-exploitation, come find out how you can more effectively use these tools in secure environments.

Please register for?-- Getting Started in Covert .NET Tradecraft for Post-Exploitation w/ Kyle Avery (1-Hour)?-- on?Thursday, Jul 15, 2021 1:00 - 2:00 PM EDT?at:

https://attendee.gotowebinar.com/register/6252250142221209101?source=JohnLI

Join the BHIS Discord Server to participate in live discussion with the presenters and fellow attendees during the webcast -- https://discord.gg/bhis

要查看或添加评论,请登录

John Strand的更多文章

社区洞察

其他会员也浏览了