#Hacktivity2022
Vložit
- čas přidán 6. 09. 2024
- AV/EDR bypass is always a pain point but a must have of Red Team operations.
In this presentation we’ll try to understand how modern EDRs try to detect malicious activities, what are their common methodologies, and we’ll see how Red Teams (and Threat Actors) could bypass these.
I’ll show a couple of practical techniques working against current EDR softwares, and present how these techniques could be integrated into Red Teams’ favorite C2 framework (Cobalt Strike) for making operators’ life easier.
I’ll also present an attack chain from initial compromise (partly stolen from ongoing attacks in the wild) using a stealthy staging technique, this time with the new hotness: the open source C2 Sliver.
www.hacktivity...
The close captioning needs work mostly because the speaker has a significant accent, which makes the captioning process difficult. But it should have been checked.
Thank you for the feedback. We forwarded this issue to the online media team for review.
Great talk!
Thank you! :)
where can I get this slide?
Hi. We have contacted the presenter for the slides.
@@hacktivityconf Thanks! looking forward to it!
HAHAHAAHA POPUP WINDOW BYPASS CRACK 2022