Atomic Spotlight With Carrie Roberts
18 videos • 390 views • by Black Hills Information Security
1
Atomic Spotlight: Persistence with Accessibility Features | Carrie Roberts
Black Hills Information Security
Download
2
Atomic Spotlight: Exploiting HiveNightmare/SeriousSAM for Priv Escalation
Black Hills Information Security
Download
3
Atomic Spotlight: Persistence with Command Process Auto Run Registry Key
Black Hills Information Security
Download
4
Atomic Spotlight: Dead Simple C2 Comms with OpenSSL
Black Hills Information Security
Download
5
Atomic Spotlight: Defense Evasion with PowerShell Encoded Command
Black Hills Information Security
Download
6
Atomic Spotlight: User Account Control Bypasses with UACME Project Executables
Black Hills Information Security
Download
7
Atomic Spotlight: PowerShell History Shenanigans
Black Hills Information Security
Download
8
Atomic Spotlight: Execute PowerShell Code From DNS Text Records
Black Hills Information Security
Download
9
Atomic Spotlight: Malware Blocking Execution with "DisallowRun" Registry Key
Black Hills Information Security
Download
10
Atomic Spotlight: Persistent Code Execution with Office Addins
Black Hills Information Security
Download
11
Atomic Spotlight: LSA Protection, Good ol' Mimikatz, and Wdigest
Black Hills Information Security
Download
12
Atomic Spotlight: Persistence with Netsh Helper DLL
Black Hills Information Security
Download
13
Atomic Spotlight: Registry dump of SAM, creds, and secrets | Carrie Roberts
Antisyphon Training
Download
14
Atomic Spotlight: Dump LSASS Memory using direct system calls and API unhooking | Carrie Roberts
Antisyphon Training
Download
15
Atomic Spotlight: esentutl.exe SAM copy | Carrie Roberts
Antisyphon Training
Download
16
Atomic Spotlight: Ingress Tool Transfer with LOLbins | Carrie Roberts
Antisyphon Training
Download
17
Atomic Spotlight: Proxy Execution Through rundll32
Antisyphon Training
Download
18
Atomic Spotlight: "Office Test" Registry Key for Persistence
Black Hills Information Security
Download