Главная
Study mode:
on
1
Intro
2
Who am I
3
Dooku
4
Hacking Team Dump
5
Persistent Survivability Rating
6
Standard Deviation
7
Demo
8
Network Leveraging
9
Deployment Method
10
WinSock
11
IPC Thread
12
Native
13
Reflective dll
14
Reflective Demo
15
Driver Loading
16
Driver Helper Capabilities
17
Full Pack Capture
18
SCDriver Methods
19
Building SCDriver
20
PCAP
21
dlls
22
Service Creation
23
Undocumented functionality
24
Code walkthrough
25
apt
26
What makes them special
27
Longterm Agent
28
Agent Code
29
Why Should I Care
30
Core Agent
31
Rule Creation
32
Process Creation
33
Agent Demo
34
Takeaways
35
Outro
Description:
Explore the intricacies of advanced persistent threats (APTs) and malware techniques in this 50-minute conference talk from BSides Augusta 2016. Delve into topics such as persistent survivability, network leveraging, and deployment methods including WinSock and IPC Thread. Learn about reflective DLL injection, driver loading techniques, and full packet capture capabilities. Examine undocumented functionality, code walkthroughs, and the characteristics of long-term agents. Gain insights into rule creation, process creation, and understand why these concepts are crucial for cybersecurity professionals. Conclude with key takeaways on reusing adversary tradecraft and enhancing your understanding of sophisticated cyber threats.

Super Bad RAT Reusing Adversary Tradecraft - Alexander Rymdeko Harvey

Add to list