Главная
Study mode:
on
1
Intro
2
OUTLINE
3
EXAMPLES
4
GROUND RULES
5
SCOPE OF THE TEST
6
SCREENSHOT GRABBER
7
KEYLOGGER
8
RANSOMWARE
9
BOOTLOOP
10
PERSISTENCY
11
TEST SETUP
12
VENDORA
13
INTERESTING RESULTS
14
ANSWERS
Description:
Explore the intriguing world of malware creation without traditional coding in this 30-minute conference talk from BSidesLV 2017. Delve into Gal Bitensky's presentation on "Writing Malware Without Writing Code," which covers a range of topics including screenshot grabbers, keyloggers, ransomware, boot loops, and persistency techniques. Learn about the ground rules, scope of testing, and interesting results from vendor interactions. Gain insights into unconventional malware development methods and their potential implications for cybersecurity.

Writing Malware Without Writing Code

BSidesLV
Add to list
0:00 / 0:00