Главная
Study mode:
on
1
Introduction
2
Agenda
3
About Us
4
What is packing
5
Why is packing useful
6
Portable executable file format
7
Program example
8
Reflective DLL Injection
9
Second Main Challenge
10
Section Tables
11
Pack Packing
12
Pack Packing Solution
13
Resource Packer
14
Interaction with Network
15
Interaction with Fault System
16
Instrumentation
17
Results
18
DT Hooking
19
Inline Hooking
Description:
Explore a comprehensive Black Hat conference talk on advanced malware packing techniques and anti-virus evasion strategies. Delve into the effectiveness of popular anti-virus solutions against unknown and obfuscated malware, with a focus on x86 and x64 architectures. Learn about the three main stages of malware detection: static, code emulation, and runtime. Discover new generic evasion techniques for each stage, implemented through an advanced packer. Examine two novel packing methods designed to render high-detection malware completely undetectable. Cover topics such as portable executable file format, reflective DLL injection, section tables, pack packing, resource packers, and various hooking techniques. Gain insights into the challenges faced by anti-virus solutions and the evolving landscape of malware development and detection.

One Packer to Rule Them All

Black Hat
Add to list