ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

#HITB2024BKK

Автор: Hack In The Box Security Conference

Загружено: 2024-10-28

Просмотров: 2185

Описание: RedTeamers often leverage shellcode loaders for initial access to deploy their C2 beacons. In this presentation, I will introduce my SuperMega shellcode loader laboratory, featuring a novel file injection technique called Cordyceps. Cordyceps reuses the Import Address Table (IAT) and data sections to deeply integrate into target executables, enabling it to operate under the radar. This technique allows for the deployment of unmodified Metasploit payloads on EDR-enabled endpoints without triggering alarms.

To provide a comprehensive understanding, I will begin with a brief overview of typical EDR architectures and their detection methodologies, particularly focusing on how they identify shellcode loaders. Key topics will include the AV, AV emulation, user-mode- and kernel-mode telemetry, and memory scanning. Instead of highlighting the latest anti-EDR implementations, the session will emphasize making practical design decisions to bypass detection mechanisms. We will critically analyze the current anti-EDR approaches, concluding that many of these efforts, while innovative, are often more “cool” than practically useful.

Key Takeaways:

The inner workings of EDR and common detection methods
Practical techniques for integrating shellcode loaders stealthily
Evaluating the effectiveness of anti-EDR measures in real-world scenarios

===

Dobin was a penetration tester for many years, and then switched to be a SOC analyst. Currently he is leading the RedTeam at Raiffeisen Schweiz. 2 Years Developer 8 Years of Penetration Testing 1 Year Developer 2 Year SOC Analyst 2 Years RedTeaming Talks at conferences: OWASP Switzerland: SSL/TLS Recommendations Bsides Vienna: Burp Sentinel – Web Scanner OWASP Switzerland Barcamp: Automated WAF Testing & XSS detection Area 41: Fuzzing For Worms – AFL for Network Servers Area 41: Develop your own RAT – AV & EDR Defense Teaching: OST: Initial Access BFH: Memory Corruption

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
#HITB2024BKK

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

#HITB2022SIN EDR Evasion Primer For Red Teamers - Jorge Gimenez & Karsten Nohl

#HITB2022SIN EDR Evasion Primer For Red Teamers - Jorge Gimenez & Karsten Nohl

#HITB2024BKK #COMMSEC D2: Detecting Botnets via DNS Traffic Analysis Using Machine Learning

#HITB2024BKK #COMMSEC D2: Detecting Botnets via DNS Traffic Analysis Using Machine Learning

Splunk 101 - Introduction to Splunk and Architecture

Splunk 101 - Introduction to Splunk and Architecture

#HITB2024BKK #COMMSEC D1: How a Combination of Bugs in KakaoTalk Compromises User Privacy

#HITB2024BKK #COMMSEC D1: How a Combination of Bugs in KakaoTalk Compromises User Privacy

#HITB2024BKK #COMMSEC D2: Breaking Fake Voice Detection with Speaker-Irrelative Features

#HITB2024BKK #COMMSEC D2: Breaking Fake Voice Detection with Speaker-Irrelative Features

BlackAlps 2025: Goodbye Purple Team, Hello Purple Bots - Ralph El Khoury & Patrick Mkhael

BlackAlps 2025: Goodbye Purple Team, Hello Purple Bots - Ralph El Khoury & Patrick Mkhael

КАК УСТРОЕН TCP/IP?

КАК УСТРОЕН TCP/IP?

C# payload mastery 01 - simple C# shellcode loader

C# payload mastery 01 - simple C# shellcode loader

Develop Your Own RAT: EDR + AV Defense by Dobin Rutishauser

Develop Your Own RAT: EDR + AV Defense by Dobin Rutishauser

Начинаем в багбаунти: File Upload атаки

Начинаем в багбаунти: File Upload атаки

Fun with Shellcode (Loaders)

Fun with Shellcode (Loaders)

#OOTB2025BKK - Cloud Edge Phishing: Breaking The Future Of Auth - Carlos Gómez Quintana

#OOTB2025BKK - Cloud Edge Phishing: Breaking The Future Of Auth - Carlos Gómez Quintana

#OOTB2025BKK - Build Your Own SOC - Kristen Huang

#OOTB2025BKK - Build Your Own SOC - Kristen Huang

#HITB2024BKK #COMMSEC D2: TPMs and the Linux Kernel: A Better Path to Hardware Security

#HITB2024BKK #COMMSEC D2: TPMs and the Linux Kernel: A Better Path to Hardware Security

Что не так с хакерами в кино? «Мистер Робот», «Пароль „Рыба-меч“» и «Киберсталкер»

Что не так с хакерами в кино? «Мистер Робот», «Пароль „Рыба-меч“» и «Киберсталкер»

Критическая база знаний LLM за ЧАС! Это должен знать каждый.

Критическая база знаний LLM за ЧАС! Это должен знать каждый.

#HITB2024BKK #COMMSEC D2: Leveraging LLMs to Enhance Insider Threat Investigation Capabilities

#HITB2024BKK #COMMSEC D2: Leveraging LLMs to Enhance Insider Threat Investigation Capabilities

#OOTB2025BKK #COMMSECLAB - Unpacking Real Malware With Their Runtime Protection - Huy Ngo

#OOTB2025BKK #COMMSECLAB - Unpacking Real Malware With Their Runtime Protection - Huy Ngo

#OOTB2025BKK Agentic ProbLLMs: Exploiting Al Computer-Use And Coding Agents - Johann Rehberger

#OOTB2025BKK Agentic ProbLLMs: Exploiting Al Computer-Use And Coding Agents - Johann Rehberger

13. Fun with Shellcode(loaders) by Jean Maes

13. Fun with Shellcode(loaders) by Jean Maes

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]