We help security teams around the globe strengthen operations by providing tactical guidance and insights to detect, investigate and respond against the latest threats.
Account Manipulation
System Binary Proxy Execution, Regsvcs/Regasm
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Remote Access Software
Disable or Modify Tools, Impair Defenses