Finding Evil in 30 Minutes or Less Part 4 – Windows Event Logs and the WMI Database
One of the other methods attackers are using to establish persistence is through Windows Management Instrumentation (WMI) This started to gain popularity around 2015 when Matt Graeber presented a talk at Blackhat. Shortly after that,… Read More »Finding Evil in 30 Minutes or Less Part 4 – Windows Event Logs and the WMI Database