Demo 16 - WMI as a Persistence and C2 Mechanism
This video will demonstrate how WMI can be used as a mechanism to establish persistence on a system, as well as how to perform C2 and stealthy file transfers.
The files used in this video can be found here: https://drive.google.com/uc?export=download&id=1j-5uV2m-nno3Dxqgz73OmOPIb0NtDTuO
Видео Demo 16 - WMI as a Persistence and C2 Mechanism канала Ben Greenberg
The files used in this video can be found here: https://drive.google.com/uc?export=download&id=1j-5uV2m-nno3Dxqgz73OmOPIb0NtDTuO
Видео Demo 16 - WMI as a Persistence and C2 Mechanism канала Ben Greenberg
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Demo 17 - Fileless Malware Attack Chain - VBA, WMI, and PowerShell](https://i.ytimg.com/vi/-hhgiTP_fXQ/default.jpg)
![The ABCs of WMI - Finding Evil in Plain Sight](https://i.ytimg.com/vi/k-_O59BnsHg/default.jpg)
![Demo3 - Format String Vulnerability and Exploit](https://i.ytimg.com/vi/HyGDezTO4aM/default.jpg)
![Persistence - COM Hijacking](https://i.ytimg.com/vi/8NPdW8wBO_A/default.jpg)
![Demo13 - INetSim](https://i.ytimg.com/vi/znxqqRCFnbs/default.jpg)
![Demo2 - Stack-Based Buffer Overflow Exploit](https://i.ytimg.com/vi/Q5WSV5fbZ70/default.jpg)
![Inside a Google data center](https://i.ytimg.com/vi/XZmGGAbHqa0/default.jpg)
![Demo 15 - PowerShell Deobfuscation](https://i.ytimg.com/vi/xZHrVUh21NM/default.jpg)
![ATT&CK Deep Dive: Persistence](https://i.ytimg.com/vi/BhMurf3Ydvc/default.jpg)
![Demo9 - DLL Injection Example on Windows](https://i.ytimg.com/vi/z9ayytxsItU/default.jpg)
![Demo6A - Return-Oriented Programming Exploit with ROPgadget 64-bit Variant](https://i.ytimg.com/vi/aEcN7OQcFWY/default.jpg)
![20 WMI Event Subscription](https://i.ytimg.com/vi/lHRiYbf9D28/default.jpg)
![Demo8 - Heap Spray Example](https://i.ytimg.com/vi/MqDCn0HoTSw/default.jpg)
![10 Cool Command Prompt Tricks You Should Know](https://i.ytimg.com/vi/TdWPEN_57mI/default.jpg)
![Demo6 - Return-Oriented Programming Exploit with ROPgadget](https://i.ytimg.com/vi/MSy0rdi1vbo/default.jpg)
![14-Year-Old Prodigy Programmer Dreams In Code](https://i.ytimg.com/vi/DBXZWB_dNsw/default.jpg)
![Demo5 - Return-Into-Libc Exploit](https://i.ytimg.com/vi/NCLUm8geskU/default.jpg)
![Demo4 - Stack Overflow + Shellcode](https://i.ytimg.com/vi/Rg_h-XIJ1c4/default.jpg)
![TOP 20 SYSTEM ADMINISTRATOR INTERVIEW QUESTIONS AND ANSWERS MICROSOFT JOB PREPARATION VIDEO](https://i.ytimg.com/vi/BhazuP3ebw4/default.jpg)
![TCP vs UDP Comparison](https://i.ytimg.com/vi/uwoD5YsGACg/default.jpg)