Главная
Study mode:
on
1
Introduction
2
Overview
3
What is Fran
4
Killsuit
5
Expanding Puli
6
Squits
7
Terms
8
What is Killsuit
9
Persistence
10
Kernel Mode Orchestrator
11
Solar Time
12
How do they avoid defenders
13
Custom TCPIP stack
14
Redirect
15
Knocking
16
Strangelands
17
DarkSkyline
18
ODBC drivers
19
Canned query plans
20
Magic Bean
21
Data Exfiltration
22
Custom Network Protocol
23
somber nave
24
straight bizarre
25
how it works
26
how I found this
27
kisuh install type
28
double feature
29
implants
30
reverse
31
dimension wheel
32
goal
33
Exploitation
34
Review
35
Danish Boots
Description:
Explore the Equation Group's sophisticated persistence, evasion, and data exfiltration tool known as Killsuit in this 40-minute conference talk from Derbycon 2018. Delve into the intricacies of this advanced cyber weapon, including its kernel mode orchestrator, custom TCP/IP stack, and unique network protocols. Discover how Killsuit employs innovative techniques like Solar Time, Redirecting, Knocking, and Strangelands to evade detection. Examine its data exfiltration capabilities, including ODBC drivers, canned query plans, and the mysterious Magic Bean. Learn about the tool's installation types, implants, and the concept of the dimension wheel. Gain insights into how the speaker uncovered this powerful cyber espionage tool and understand its implications for modern cybersecurity landscapes.

Killsuit - The Equation Group's Swiss Army Knife for Persistence, Evasion, and Data Exfil

Add to list
0:00 / 0:00