tag:blogger.com,1999:blog-9518042.post5778535104224978234..comments2024-03-19T07:46:20.437-05:00Comments on Windows Incident Response: Using Intrusion IntelligenceUnknownnoreply@blogger.comBlogger3125tag:blogger.com,1999:blog-9518042.post-86591055897699643022020-02-16T11:47:33.131-05:002020-02-16T11:47:33.131-05:00> Do you have any additional postings around it...> Do you have any additional postings around it that I could check out?<br /><br />Well, there's my blog. ;-)<br /><br />Also, if what you're looking for is specifics, then "From enabling systems to store credentials in memory in plain text to disabling security tools, threat actors have been observed making significant modifications to the target environment."<br /><br />There's also: https://www.crowdstrike.com/blog/author/harlan-carvey/<br /><br />> Do you have any links to talks/write ups you have done previously...<br /><br />If you've ever seen my presentations, you'll know that my slides are just placeholders, and that having access to the slide deck doesn't mean that you have access to the content; I don't put everything I say in the slides. If I did, there would be no need for me to be there and give the presentation, would there? ;-)<br /><br />Most of the talks that I have given in the past year or so were while I was employed by CrowdStrike, and I do not believe that they were recorded.H. Carveyhttps://www.blogger.com/profile/08966595734678290320noreply@blogger.comtag:blogger.com,1999:blog-9518042.post-87189098044386785252020-02-16T09:47:42.493-05:002020-02-16T09:47:42.493-05:00Great post! I am checking out that book and articl...Great post! I am checking out that book and article now. Do you have any links to talks/write ups you have done previously around actors modifying the target environment to meet their needs? <br />Ancienthttps://www.blogger.com/profile/16799963875176719130noreply@blogger.comtag:blogger.com,1999:blog-9518042.post-32074657611604278042020-02-16T09:45:47.562-05:002020-02-16T09:45:47.562-05:00You noted you wrote and spoke around threat actors...You noted you wrote and spoke around threat actors modifying the target environment to meet their needs. Do you have any additional postings around it that I could check out? Great post, checking out that book and article now.Ancienthttps://www.blogger.com/profile/16799963875176719130noreply@blogger.com