Beyond LSASS - Cutting Edge Techniques for Undetectable Threat Emulation
WEareTROOPERS via YouTube
-
13
-
- Write review
PowerBI Data Analyst - Create visualizations and dashboards from scratch
Give the Gift That Unlocks Potential
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore advanced threat emulation techniques that go beyond traditional LSASS (Local Security Authority Subsystem Service) methods in this 36-minute conference talk from TROOPERS25. Discover cutting-edge approaches for conducting undetectable security assessments and penetration testing while learning how modern attackers are evolving their tactics to bypass conventional detection mechanisms. Gain insights into sophisticated methods that security professionals can use to better understand and defend against advanced persistent threats, with practical demonstrations of techniques that remain under the radar of standard security monitoring tools.
Syllabus
TROOPERS25: Beyond LSASS - Cutting Edge Techniques for Undetectable Threat Emulation
Taught by
WEareTROOPERS