Catch Me If You Can. LOLBins and the Adversaries Who Abuse Them

Posted on in Presentations

What is this executable? Why is this binary showing up in logs? This talk will cover legitimate binaries and third-party tools threat actors leverage to target organizations today. Associated techniques will be mapped to real-world examples and threat hunting techniques will be discussed. Attendees will be equipped with tools that may save them from becoming the next victim.

Alfred Alvarado


Security Researcher, Trellix

Timothy Hux


Security Researcher, Trellix Inc.

Share With Your Community