Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a Black Hat conference talk that delves into the creation of a next-generation wiper capable of running with unprivileged user permissions while possessing the ability to delete any file on a system, including those critical to Windows OS bootability. Learn about the evolution of wipers as tools for nation-state cyber warfare, their usage by various APTs, and the speaker's innovative approach to leveraging EDR vulnerabilities. Discover how this research uncovered multiple 0-day exploits in leading EDR products, potentially turning them into powerful wipers. Gain insights into the implications of these findings for cybersecurity and the importance of addressing vulnerabilities in security software.
Syllabus
Aikido: Turning EDRs to Malicious Wipers Using 0-day Exploits
Taught by
Black Hat