Secret Pentesting Techniques - 10 Advanced Methods
Offered By: YouTube
Course Description
Overview
Discover cutting-edge pentesting techniques in this 41-minute conference talk. Explore advanced methods including binary droppers, shellcode execution, PowerShell injection, and PE crypters. Learn about Hyperion encryption, firewall bypassing, and egress busting. Gain insights into reverse shell usage and examine a personal favorite attack involving static AES keys. Delve into Python code examples and decrypted password analysis. Access all video content and download links for a comprehensive understanding of these secret pentesting strategies.
Syllabus
Intro
About the Speaker
Introduction
Technique #1
Explaining the Applet
Binary Dropper
Weak Sauce
Shellcodeexec
Easily detectable
PS ShellCode Injection
Method 3 - Powershell Injection
PE Crypters
Hyperion Encryption
Bumping the Firewall
Egress Busting
Egress Buster 0.2
Egress Buster Reverse Shell Usage
One of my PERSONAL Favorites
The Attack
Contents of File
Static Key for AES Anyone?
Python Code
Decrypted Password
Downloads
Related Courses
Rootkits and Stealth Apps: Creating & Revealing 2.0 HACKINGUdemy MacOS Dylib Injection through Mach-O Binary Manipulation
Malware Unicorn via Independent ChatGPT for Cybersecurity
HackerSploit via YouTube Browser Exploitation - Max Zinkus
White Hat Cal Poly via YouTube ARM Assembly and Shellcode Basics - Workshop
44CON Information Security Conference via YouTube