www.x33fcon.com
Open in
urlscan Pro
149.56.46.234
Public Scan
Submitted URL: https://www.x33fcon.com/#!t/maldev.md
Effective URL: https://www.x33fcon.com/
Submission: On October 18 via manual from MX — Scanned from CA
Effective URL: https://www.x33fcon.com/
Submission: On October 18 via manual from MX — Scanned from CA
Form analysis
0 forms found in the DOMText Content
This website requires Javascript to be enabled. Please turn on Javascript and reload the page. Toggle navigation * * Conference * Current Edition * When * Venue * Agenda * Tickets * Conference Registration * Training * Available Training * When * Venue * Online Training * On Site Training * Training Registration * Partnership * Data & Statistics * Contact * Archive * x33fcon 2017 * x33fcon 2018 * x33fcon 2019 * x33fcon 2020 * x33fcon 2021 * About * About us * About x33fcon * Who Should Attend * Credits * Terms & Conditions * * Contact * CORONAVIRUS * FAQ * REGISTER * Online Training * * Modern Red Team Malware Development Strategies * Overview * Course Content * Target Audience * Prerequisites * Trainer's Bio MODERN RED TEAM MALWARE DEVELOPMENT STRATEGIES¶ [ ↑ ] DATES: JULY 18-20¶ DURATION: 3 DAYS¶ PRICE: CHECK HERE¶ AUDIENCE LEVEL: INTERMEDIATE¶ TAGS: MODERN, RED TEAM, MALWARE, DEVELOPMENT, EVASION¶ -------------------------------------------------------------------------------- OVERVIEW¶ [ ↑ ] This course dives deep into Modern Red Team Malware Development Strategies that were found effective on numerous engagements delivered in tightly monitored environments. Author will share his insights regarding tactics that made his malware acomplish engagement objectives, side by side with AVs&EDRs Designing modern Red Team malware carriers smuggled in scripts, executables and HTML websites are only some of the areas the course focuses on. Students will learn numerous technical concepts, craft their own malicious Office documents, shellcode loaders, smuggling payloads and other infected scripts to breach target systems running AVs and EDRs. By applying modern AV & EDR evasion techniques into custom crafted Red Team implants and documents, capable teams will be equipped with knowledge to succeed during adversary simulations even in the most tightly controlled environments. COURSE CONTENT¶ [ ↑ ] DAY 1¶ * Classic file infection vectors – VBS/HTA/SCT/WSF/XSL/WSC/VBE/LNK – structure examination & practical utilisation * Container files – ISO/IMG/VHD/7zip/PDF * Successful strategies for HTML Smuggling * Hosting Red Team malware in cloud resources for Initial Access purposes * Viable tactics for WSH scripts (VBScript/JScript/HTA) that evade specific detections * Advanced LNK infection techniques * LOLBINs, Windows Defender Attack Surface Reduction rules bypasses, trusted paths DAY 2¶ * VBA Macros in 2022 - successful strategies * Exotic VBA Macro carriers * „Lures” – how to entice user into enabling macros * Various means to execute implant in VBA - .NET Reflection, XSL Deserialization, XLAM Droppers, and more * Evading ASR rules in VBA * Hiding payloads in Office file structures * Alternative Macro autorun techniques * VBA Purging, VBA Stomping, VBAProject.bin manipulation * Obfuscation techniques, Office files encryption, anonymization, lowering detection rate DAY 3¶ * Useful PE Executables: EXE, XLL, CPL, others * Which language to choose for your loader? – Rust, Go, C++, Python, C#, Nim, F#, how about Pascal? * Shellcode Loaders - the ultimate weapon * Overview on executable protection & obfuscation techniques * Hiding payloads in PE sections & overlay * Shellcode Fluctuation, Thread Stack Spoofing * To Process Inject or Not? * Dynamic API Unhooking, Direct Syscalls * Execution Guardrails – Sensing sandboxes and untrusted execution environments * Other exotic evasion strategies TARGET AUDIENCE¶ [ ↑ ] This training is designed to supply with practical knowledge variety of IT specialists, including: * Penetration Testers * Red Team operators * SOC analysts * Security Professionals * IT Support, administrative and network personnel PREREQUISITES¶ [ ↑ ] PREREQUISITE KNOWLEDGE¶ * A firm familiarity of Windows and Linux command line syntax * Understanding of networking concepts * Previous pentesting and/or SOC experience is advantageous, but not required HARDWARE / SOFTWARE REQUIREMENTS¶ * Students will need to bring a laptop to which they have administrative/root access, running either Windows, Linux or Mac operating systems * Students will need to have access to VNC, SSH and OpenVPN clients on their laptops (these can be installed at the start of the training) TRAINER'S BIO¶ [ ↑ ] | MARIUSZ BANACH¶ > Mariusz is an active security researcher, pentester and red team operator > currently involved in advanced adversary simulations for an international > Bank. With the 8+ years long experience gained as a malware analyst and AV > engine developer, penetration tester who performed tens of assessments of > egzotic networks and systems and finally as a red team operator - he now > teaches, helps analyze and devises new Threat Tactics, Techniques and > Procedures (TTPs). > > > > > > He is best known for his researches on malware development and frequent > releases of offensive tools that help red teams bolster their game against > cybersecurity criminals. Most of his work is published on github.com/mgeeky . > > > > > > Passionately provides his Partners unique advisory, learning and detection > opportunities by sharing security expertise ranging from applications, through > corporate infrastructures, domain environments, clouds - ending on Windows > low-level. Over the years, he has acquired a number of certifications. -------------------------------------------------------------------------------- Copyright © 2022 x33fcon. All rights reserved. Website generated with MDwiki © Timo Dörr and contributors.