YoVDO

Introduction to Beacon Object Files in Red-Team Operations

Offered By: Ekoparty Security Conference via YouTube

Tags

Malware Development Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the world of Beacon Object Files (BOFs) and their applications in red-teaming operations through this informative conference talk. Delve into the Common Object File Format (COFF) and its role in compiler-generated files. Learn about beacon_inline_execute, a custom Windows COFF loader primarily used by Cobalt Strike, and its functionality in loading BOFs in-memory. Discover how BOFs can execute code on target machines without loading shellcode or injecting into remote processes, making them effective for bypassing AV/EDR protection and expanding C2 agent capabilities. Examine Coffee, a Rust-based COFF loader designed for BOFs, and understand its process of parsing object files, allocating memory, and executing code. Gain insights from speaker Rafael Felix, an experienced malware developer and researcher, on the inner workings of COFF format and BOFs in red-team operations.

Syllabus

Introduction to Beacon Object Files in the context of red-teaming operations - Rafael Felix -EKO2023


Taught by

Ekoparty Security Conference

Related Courses

Build Undetectable Malware Using C Language: Ethical Hacking
Udemy
Máster en Hacking con Python - Vuélvase un Hacker Ético
Udemy
Practical Techniques for AV Bypass
YouTube
Cyberespionage - Targeted Attacks Abusing Third-Party Cloud Services
RSA Conference via YouTube
PIC Your Malware
BruCON Security Conference via YouTube