COM Hijacking (Persistence)
11:12
Stealing Passwords via Forced Authenticaton (Credential Access)
1:11:21
Dancing with COM - Deep dive into understanding Component Object Model
7:34
Desktop and RDP Session Hijacking (Lateral Movement)
21:02
When RESTful architecture isn't enough...
9:09
Abusing BITS Jobs (Persistence & Defence Evasion)
11:19
Windows PowerShell vs PowerShell Core - What Is It?
23:09
7 modèles de conception que tout développeur devrait connaître
20:23