{
  "version": "1.2.0",
  "chapters": [
    {
      "title": "The Soundboard Has Too Many Buttons",
      "startTime": 0,
      "endTime": 250
    },
    {
      "title": "FEATURE PRESENTATION: Malware Execution in the Agge of Advanced Defenses",
      "startTime": 250,
      "endTime": 336
    },
    {
      "title": "Attacker / Threat Actor Emulation",
      "startTime": 336,
      "endTime": 581
    },
    {
      "title": "That Matrix",
      "startTime": 581,
      "endTime": 634
    },
    {
      "title": "Endpoint Defense Maturity",
      "startTime": 634,
      "endTime": 805
    },
    {
      "title": "C2 Implant Execution",
      "startTime": 805,
      "endTime": 1181
    },
    {
      "title": "Metasploit: Why Is My Network Traffic Caught?",
      "startTime": 1181,
      "endTime": 1389
    },
    {
      "title": "C2 - Customize and LOL",
      "startTime": 1389,
      "endTime": 2473
    },
    {
      "title": "The More You Know...",
      "startTime": 2473,
      "endTime": 2651
    },
    {
      "title": "Recon/Discovery Artifacts",
      "startTime": 2651,
      "endTime": 2775
    },
    {
      "title": "Amusement with AMSI",
      "startTime": 2775,
      "endTime": 2853
    },
    {
      "title": "Simple!",
      "startTime": 2853,
      "endTime": 2890
    },
    {
      "title": "AMSI Bypass",
      "startTime": 2890,
      "endTime": 3027
    },
    {
      "title": "Event Tracing Bypass",
      "startTime": 3027,
      "endTime": 3094
    },
    {
      "title": "Attack Combo!",
      "startTime": 3094,
      "endTime": 3144
    },
    {
      "title": "Conclusion",
      "startTime": 3144,
      "endTime": 3910
    }
  ]
}