Главная
Study mode:
on
1
Intro
2
About the Speaker
3
Introduction
4
Technique #1
5
Explaining the Applet
6
Binary Dropper
7
Weak Sauce
8
Shellcodeexec
9
Easily detectable
10
PS ShellCode Injection
11
Method 3 - Powershell Injection
12
PE Crypters
13
Hyperion Encryption
14
Bumping the Firewall
15
Egress Busting
16
Egress Buster 0.2
17
Egress Buster Reverse Shell Usage
18
One of my PERSONAL Favorites
19
The Attack
20
Contents of File
21
Static Key for AES Anyone?
22
Python Code
23
Decrypted Password
24
Downloads
Description:
Discover cutting-edge pentesting techniques in this 41-minute conference talk. Explore advanced methods including binary droppers, shellcode execution, PowerShell injection, and PE crypters. Learn about Hyperion encryption, firewall bypassing, and egress busting. Gain insights into reverse shell usage and examine a personal favorite attack involving static AES keys. Delve into Python code examples and decrypted password analysis. Access all video content and download links for a comprehensive understanding of these secret pentesting strategies.

Secret Pentesting Techniques - 10 Advanced Methods

Add to list
0:00 / 0:00