YoVDO

Utilizing Lol-Drivers in Post Exploitation Tradecraft

Offered By: Hack In The Box Security Conference via YouTube

Tags

Hack In The Box Security Conference Courses Process Injection Courses

Course Description

Overview

Explore advanced post-exploitation techniques using signed drivers for offensive purposes in this conference talk from the Hack In The Box Security Conference. Delve into methodologies that leverage legitimate drivers to simulate kernel-mode threats, bypassing Windows Driver Signature Enforcement and PatchGuard. Learn how red teams can upgrade their toolset with kernel-mode attack capabilities without developing custom rootkits. Discover practical approaches to combine user-mode and kernel-mode techniques for enhanced evasion and mitigation bypass. Watch live demonstrations showcasing the use of Process Hacker's signed driver for credential dumping, process injection, and C2 communication. Gain insights into implementing these advanced techniques in existing red team toolsets and understand how threat actors have utilized similar methods in the past.

Syllabus

#HITB2021AMS D1T1 - Utilizing Lol-Drivers In Post Exploitation Tradecraft - Bariş Akkaya


Taught by

Hack In The Box Security Conference

Related Courses

Browser Hacking With ANGLE
Hack In The Box Security Conference via YouTube
Can A Fuzzer Match A Human
Hack In The Box Security Conference via YouTube
Biometrics System Hacking in the Age of the Smart Vehicle
Hack In The Box Security Conference via YouTube
ICEFALL - Revisiting A Decade Of OT Insecure-By-Design Practices
Hack In The Box Security Conference via YouTube
Fuzzing the MCU of Connected Vehicles for Security and Safety
Hack In The Box Security Conference via YouTube