This document provides an outline and overview of a DEF CON 23 talk about WMI attacks, defense, and forensic analysis. It introduces the speakers and their backgrounds in reverse engineering. It then outlines the topics to be covered, including the history of WMI malware, the architecture and usage of WMI, WMI query language, events, remote access, and the lifecycle of WMI attacks from an attacker's perspective for tasks like reconnaissance, code execution, and persistence.