Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Kill Chain Reloaded - Abuse Legacy Paths for Stealth Persistence

DEFCONConference via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore advanced Red Team techniques for achieving stealthy persistence through physical memory access and kernel-mode execution in this 43-minute conference talk from DEF CON 33. Learn cutting-edge methodologies for bypassing modern EDR solutions using physical memory access primitives and discover how overlooked low-level access vectors can enable persistent, undetectable control over targeted Windows systems. Delve into sophisticated post-exploitation techniques that leverage direct physical memory access to maintain the highest system privileges while evading detection. Examine practical approaches to physical access techniques and witness live demonstrations of tools and methodologies applicable across multiple attack scenarios. Gain insights into real-world tradecraft and threat modeling that goes beyond traditional offensive security practices, with a focus on hardware and software threats that cybersecurity professionals need to understand. Master advanced techniques for maintaining stealth persistence through legacy system paths and understand how attackers can exploit these often-overlooked vectors for long-term system compromise.

Syllabus

DEF CON 33 - Kill Chain Reloaded: Abuse legacy paths fr stealth persistence - A Hernando, B Martinez

Taught by

DEFCONConference

Reviews

Start your review of Kill Chain Reloaded - Abuse Legacy Paths for Stealth Persistence

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.