Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

#HITB2024BKK

Автор: Hack In The Box Security Conference

Загружено: 2024-10-28

Просмотров: 2046

Описание:

RedTeamers often leverage shellcode loaders for initial access to deploy their C2 beacons. In this presentation, I will introduce my SuperMega shellcode loader laboratory, featuring a novel file injection technique called Cordyceps. Cordyceps reuses the Import Address Table (IAT) and data sections to deeply integrate into target executables, enabling it to operate under the radar. This technique allows for the deployment of unmodified Metasploit payloads on EDR-enabled endpoints without triggering alarms.

To provide a comprehensive understanding, I will begin with a brief overview of typical EDR architectures and their detection methodologies, particularly focusing on how they identify shellcode loaders. Key topics will include the AV, AV emulation, user-mode- and kernel-mode telemetry, and memory scanning. Instead of highlighting the latest anti-EDR implementations, the session will emphasize making practical design decisions to bypass detection mechanisms. We will critically analyze the current anti-EDR approaches, concluding that many of these efforts, while innovative, are often more “cool” than practically useful.

Key Takeaways:

The inner workings of EDR and common detection methods
Practical techniques for integrating shellcode loaders stealthily
Evaluating the effectiveness of anti-EDR measures in real-world scenarios

===

Dobin was a penetration tester for many years, and then switched to be a SOC analyst. Currently he is leading the RedTeam at Raiffeisen Schweiz. 2 Years Developer 8 Years of Penetration Testing 1 Year Developer 2 Year SOC Analyst 2 Years RedTeaming Talks at conferences: OWASP Switzerland: SSL/TLS Recommendations Bsides Vienna: Burp Sentinel – Web Scanner OWASP Switzerland Barcamp: Automated WAF Testing & XSS detection Area 41: Fuzzing For Worms – AFL for Network Servers Area 41: Develop your own RAT – AV & EDR Defense Teaching: OST: Initial Access BFH: Memory Corruption

#HITB2024BKK

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

#HITB2022SIN EDR Evasion Primer For Red Teamers - Jorge Gimenez & Karsten Nohl

#HITB2022SIN EDR Evasion Primer For Red Teamers - Jorge Gimenez & Karsten Nohl

DEF CON 32 - HookChain A new perspective for Bypassing EDR Solutions -  Helvio Carvalho Junior

DEF CON 32 - HookChain A new perspective for Bypassing EDR Solutions - Helvio Carvalho Junior

13. Fun with Shellcode(loaders) by Jean Maes

13. Fun with Shellcode(loaders) by Jean Maes

C# payload mastery 01 - simple C# shellcode loader

C# payload mastery 01 - simple C# shellcode loader

Как устроен PHP 🐘: фундаментальное знание для инженеров

Как устроен PHP 🐘: фундаментальное знание для инженеров

#HITB2024BKK #COMMSEC D2: Breaking Fake Voice Detection with Speaker-Irrelative Features

#HITB2024BKK #COMMSEC D2: Breaking Fake Voice Detection with Speaker-Irrelative Features

#HITB2024BKK #COMMSEC D1: CoralRaider Targets Victims Data and Social Media Accounts

#HITB2024BKK #COMMSEC D1: CoralRaider Targets Victims Data and Social Media Accounts

Fun with Shellcode (Loaders)

Fun with Shellcode (Loaders)

Shellcode Loaders! (Windows Malware Development)

Shellcode Loaders! (Windows Malware Development)

Why did they make this?

Why did they make this?

Откуда берётся гудок в трубке телефона?

Откуда берётся гудок в трубке телефона?

Вулнлаб | Wutai: написание загрузчика и получение маяка

Вулнлаб | Wutai: написание загрузчика и получение маяка

Nullcon Goa 2025: The Hidden ART Of Rolling Shellcode Decryption - Tijme Gommers

Nullcon Goa 2025: The Hidden ART Of Rolling Shellcode Decryption - Tijme Gommers

В Интернет только по паспорту: Internet ID и реестр всех IMEI для ФСБ

В Интернет только по паспорту: Internet ID и реестр всех IMEI для ФСБ

Hiding in Plain Sight: Shellcode Obfuscation Techniques | Mike Saunders

Hiding in Plain Sight: Shellcode Obfuscation Techniques | Mike Saunders

Lost in the Loader: The Many Faces of the Windows PE File Format

Lost in the Loader: The Many Faces of the Windows PE File Format

How Did RAM Get So Expensive? And How it’s Going to Get Worse…

How Did RAM Get So Expensive? And How it’s Going to Get Worse…

Спасение Королёва, ракета

Спасение Королёва, ракета "Буря" и МиГ-21

#HITB2024BKK #COMMSEC D2: TPMs and the Linux Kernel: A Better Path to Hardware Security

#HITB2024BKK #COMMSEC D2: TPMs and the Linux Kernel: A Better Path to Hardware Security

BSidesCHS 2016:

BSidesCHS 2016: "Shellcoding basics" - Max Harley

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]