Exploring How Memory-Mapped Files Hide From AV and Execute Malicious Code
Offered By: Black Hat via YouTube
Course Description
Overview
Explore advanced techniques for hiding malicious code from antivirus software using memory-mapped files in this 33-minute Black Hat conference talk. Discover how researchers have progressed beyond simply storing malicious payloads to repeatedly identifying and utilizing specific memory addresses in memory-mapped files for code execution. Learn from security experts Ben Holder and Parker Crook as they demonstrate their findings and methodologies, providing valuable insights for both offensive and defensive cybersecurity professionals. Gain a deeper understanding of this sophisticated evasion technique and its potential implications for malware detection and prevention.
Syllabus
MMFML: Exploring How Memory-Mapped Files Hide From AV and Execute Malicious Code
Taught by
Black Hat
Related Courses
Malicious Software and its Underground Economy: Two Sides to Every StoryUniversity of London International Programmes via Coursera Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera Introducción al Análisis del Malware en Windows
National Technological University – Buenos Aires Regional Faculty via Miríadax Android Malware Analysis - From Zero to Hero
Udemy How to Create and Embed Malware (2-in-1 Course)
Udemy