Hi, My Name is “CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US”
A Process is No One: Hunting for Token Manipulation
_____ Is Not a Security Boundary: Things I Have Learned and Things That Have Gotten Better from Researching Microsoft Software
Subverting & Restoring Trust in Windows
Nov 07, 2017
Windows Operating System Archaeology
Building a Better Moat: Designing an Effective Covert Red Team Attack Infrastructure
How Graphs Changed The Way Hackers Attack
Not a Security Boundary: Bypassing User Account Control
An ACE in the Hole: Stealthy Host Persistence via Security Descriptors