#Hacktivity2022 // Practical EDR Bypass Methods in 2022 by István Tóth

preview_player
Показать описание
AV/EDR bypass is always a pain point but a must have of Red Team operations.

In this presentation we’ll try to understand how modern EDRs try to detect malicious activities, what are their common methodologies, and we’ll see how Red Teams (and Threat Actors) could bypass these.

I’ll show a couple of practical techniques working against current EDR softwares, and present how these techniques could be integrated into Red Teams’ favorite C2 framework (Cobalt Strike) for making operators’ life easier.

I’ll also present an attack chain from initial compromise (partly stolen from ongoing attacks in the wild) using a stealthy staging technique, this time with the new hotness: the open source C2 Sliver.

Рекомендации по теме
Комментарии
Автор

The close captioning needs work mostly because the speaker has a significant accent, which makes the captioning process difficult. But it should have been checked.

Photoemulator
Автор

HAHAHAAHA POPUP WINDOW BYPASS CRACK 2022

AlexPund
welcome to shbcf.ru