Four Black Hat USA 2015 Briefings will teach you how to break Windows in fresh new ways. Windows 10 goes some way toward defeating client-originating Pass-the-Hash attacks, but legacy protocols like Kerberos and NTLM will be vulnerable for years to come. Abusing Windows Management Instrumentation to Build a Persistent Asynchronous and Fileless Backdoor will show how an attacker practicing a minimalist methodology can blend into their target environment without dropping a single utility to disk, and execute code asynchronously in response to OS events.”]
Source: https://www.darkreading.com/black-hat/black-hat-usa-2015-breaking-windows/d/d-id/1321487