Explore advanced Windows post-exploitation techniques in this 47-minute conference talk from DerbyCon 3.0. Discover minimalist approaches to maintaining access and gathering information on compromised systems using built-in Windows tools and utilities. Learn how to effectively "live off the land" by leveraging native Windows functionality for stealthy post-exploitation activities, reducing the need for external tools and minimizing detection risk. Gain insights into practical strategies for information gathering, privilege escalation, and lateral movement within Windows environments using only native operating system capabilities.
Overview
Syllabus
DerbyCon 3 0 1209 Living Off The Land A Minimalist S Guide To Windows Post Exploitation Christopher