YoVDO

PIC Your Malware

Offered By: BruCON Security Conference via YouTube

Tags

BruCON Courses Cybersecurity Courses Malware Development Courses

Course Description

Overview

Explore advanced techniques for building and concealing custom offensive tools in this 45-minute conference talk from BruCON Security Conference. Delve into the world of operational security for red teamers and threat actors, learning how to stay ahead of blue team defenses. Examine popular PE loading techniques like Reflective DLLs and Donut/sRDI, and discover how position independent code (PIC) can be leveraged to avoid detectable memory artifacts. Gain insights into automated payload building and protection using a build server supporting multiple file formats and environmental crypting. Understand how defenders utilize exhaustive logging and Windows event correlation to identify malicious processes, and learn countermeasures such as handle duplication and custom PE loaders to evade Sysmon events. Enhance your knowledge of cutting-edge malware development and evasion strategies to improve your red teaming capabilities.

Syllabus

05 - BruCON 0x0D - PIC Your Malware! - Ben Heimerdinger and Sebastian Feldmann


Taught by

BruCON Security Conference

Related Courses

Build Undetectable Malware Using C Language: Ethical Hacking
Udemy
Máster en Hacking con Python - Vuélvase un Hacker Ético
Udemy
Writing Malware While the Blue Team Is Staring at You
YouTube
Splinter the RAT Attack: Creating Custom RATs to Exploit Networks
YouTube
Becoming a Dark Knight: Adversary Emulation Demonstration for ATT&CK Evaluations
Ekoparty Security Conference via YouTube