Главная
Study mode:
on
1
Intro
2
Introduction and Facts
3
Virus Detection Techniques
4
Bypassing Signature-Based Detection
5
Bypassing Heuristic-Based Detection
6
Bypassing Behavioral-Based Detection
7
Bypassing Sandbox-Based Detection
8
AES Encrypted Payload via Hyperion
9
Polymorphic Executable via Shellter
10
Crafting the Most Evasive Executables
Description:
Explore advanced techniques for crafting evasive malware in this 31-minute DefCamp 2016 conference talk. Delve into various virus detection methods and learn strategies to bypass signature-based, heuristic-based, behavioral-based, and sandbox-based detection systems. Discover how to implement AES encrypted payloads using Hyperion and create polymorphic executables with Shellter. Gain insights into crafting highly sophisticated and undetectable malicious executables, essential knowledge for cybersecurity professionals and ethical hackers staying ahead of evolving threats.

Crafting the Unavoidable - DefCamp - 2016

DefCamp
Add to list
0:00 / 0:00