Secret Pentesting Techniques - 10 Advanced Methods
Offered By: YouTube
Course Description
Overview
Discover cutting-edge pentesting techniques in this 41-minute conference talk. Explore advanced methods including binary droppers, shellcode execution, PowerShell injection, and PE crypters. Learn about Hyperion encryption, firewall bypassing, and egress busting. Gain insights into reverse shell usage and examine a personal favorite attack involving static AES keys. Delve into Python code examples and decrypted password analysis. Access all video content and download links for a comprehensive understanding of these secret pentesting strategies.
Syllabus
Intro
About the Speaker
Introduction
Technique #1
Explaining the Applet
Binary Dropper
Weak Sauce
Shellcodeexec
Easily detectable
PS ShellCode Injection
Method 3 - Powershell Injection
PE Crypters
Hyperion Encryption
Bumping the Firewall
Egress Busting
Egress Buster 0.2
Egress Buster Reverse Shell Usage
One of my PERSONAL Favorites
The Attack
Contents of File
Static Key for AES Anyone?
Python Code
Decrypted Password
Downloads
Related Courses
Arm assembly for HackersUdemy Intro to Binary Exploitation
HTB Academy via Independent HackIM CTF - Do's and Don'ts
nullcon via YouTube File Structures - Another Binary Exploitation Technique
Hack In The Box Security Conference via YouTube ELFPack - ELF Binary Section Docking in Stageless Payload Delivery
Ekoparty Security Conference via YouTube