YoVDO

Writing Malware While the Blue Team Is Staring at You

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Malware Development Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore advanced malware writing techniques and red team strategies in this 38-minute conference talk from Derbycon 2016. Dive into topics such as CCDC, Empire installation, Impacket SMB Server, BAT and BASH scripting, Powershell Autoruns, Metasploit Binaries, and Windows Password Persistence. Learn about prioritization in red team operations, protocol considerations, and tools like Cobalt Strike, CANVAS, and Innuendo. Gain insights into blue team tactics and discover noise-building techniques using CSC.exe and lexpress.exe. Enhance your understanding of offensive security practices while considering defensive perspectives.

Syllabus

Intro
meterpreter getuid
What is CCDC?
Win Conditions
Red Team Goals
Install
Empire
Impacket SMB Server
BAT Files/BASH Scripts
Build your own
What are my priorities?
How much?
Powershell Autoruns
Metasploit Binaries
Windows Password Persistence
DeSecurity
What protocol
Cobalt Strike
CANVAS / Innuendo
Mailslot!
What does the blue team do?
Noise building - CSC.exe
Noise building - lexpress.exe


Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube