You've Had the Power All Along: Process Forensics With Native Tools

Many organizations are interested in standing up threat response teams but are unable, or unwilling, to provide funding or approval for third-party tools. This lack of support requires threat response teams to utilize built-in, OS-specific tools, to investigate suspicious processes and files. These...
By
Trevor McAfee
August 27, 2020

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg