Whether you are starting from scratch or have an established technical assessment program, we tailor our approach to meet your program to your objectives.
Utilize our knowledge of adversary tactics to understand your true risk from advanced threats and harden your organization’s security posture.
Keeping pace with the modern cyber adversary isn’t a one-time task. We will train your team in the current adversary mindset so you can harden and defend your network.
Replicate the entire attack chain of advanced adversaries to identify gap areas within defensive people, process and technology.
Understand how to identify unknown, advanced threat actors operating within your environment.
Not sure which Service you need? Talk with our experts to get some information.
PowerShell has become a favored tool for both adversaries and defenders due to its native support in most Microsoft Windows environments. Join us for our inaugural webinar as we discuss how PowerShell can be effectively utilized to both attack and defend your network environment.
Title: Catch Me If You Can - Red vs. Blue
Authors: Will Schroeder and Jared Atkinson
Date and Time: Thursday, August 10th at 1:00PM ET (10:00AM PT)
Description: Attackers’ love for PowerShell is now no longer a secret, with 2016 producing an explosion in offensive PowerShell toolsets. PowerShell is gaining respect in offensive circles as “Microsoft’s Post-Exploitation Language” and being integrated into many offensive toolkits. Unfortunately, the offensive community often fails to research or share relevant mitigations with their defensive counterparts. This leaves many defenders without the information they need to protect themselves and their networks from these attacks. In a quest to combat the perceived threat, many defenders attempt to disable PowerShell rather than realizing its defensive potential.
In this webinar, Will Schroeder (@harmj0y) and Jared Atkinson (@jaredcatkinson) will cover offensive and defensive PowerShell tools and techniques, including PowerPick, subversive PowerShell profiles, PowerForensics, and Get-InjectedThread. They will also cover mitigations and detections for popular offensive tools and techniques, demonstrating how to best handle the new offensive reality of widespread offensive PowerShell usage.