Star 0

Abstract

What do you do when adversaries don't use any malware or exploits? This session will demonstrate cutting edge techniques that we've observed from the most recent intrusions that are super stealthy and don't leave any malware footprint in your environment. In the typical raw Hacking Exposed style, we demonstrate these attacks and provide relevant countermeasures for detection and response.