Red Teaming 11
- Bring Your Own Trusted Binary (BYOTB) – BSides Edition
- TokenSmith – Bypassing Intune Compliant Device Conditional Access
- Weaponize Your Word – Malicious Template Injection
- Breaking into Libraries – DLL Hijacking
- NTLM Relaying – Making the Old New Again
- Adversary at the Door – Initial Access and what’s currently on the menu
- SSH Tunnelling to Punch Through Corporate Firewalls – Updated take on one of the oldest LOLBINs
- How Cloud Migration is Affecting AppSec – A Red Teamer’s Perspective
- Putting the C2 in C2loudflare
- WASM Smuggling for Initial Access and W.A.L.K. Tool Release
- Obfuscating C2 During a Red Team Engagement