Главная
Study mode:
on
1
Intro
2
meterpreter getuid
3
What is CCDC?
4
Win Conditions
5
Red Team Goals
6
Install
7
Empire
8
Impacket SMB Server
9
BAT Files/BASH Scripts
10
Build your own
11
What are my priorities?
12
How much?
13
Powershell Autoruns
14
Metasploit Binaries
15
Windows Password Persistence
16
DeSecurity
17
What protocol
18
Cobalt Strike
19
CANVAS / Innuendo
20
Mailslot!
21
What does the blue team do?
22
Noise building - CSC.exe
23
Noise building - lexpress.exe
Description:
Explore advanced malware writing techniques and red team strategies in this 38-minute conference talk from Derbycon 2016. Dive into topics such as CCDC, Empire installation, Impacket SMB Server, BAT and BASH scripting, Powershell Autoruns, Metasploit Binaries, and Windows Password Persistence. Learn about prioritization in red team operations, protocol considerations, and tools like Cobalt Strike, CANVAS, and Innuendo. Gain insights into blue team tactics and discover noise-building techniques using CSC.exe and lexpress.exe. Enhance your understanding of offensive security practices while considering defensive perspectives.

Writing Malware While the Blue Team Is Staring at You

Add to list