Launch a New Career with Certificates from Google, IBM & Microsoft
Become an AI & ML Engineer with Cal Poly EPaCE — IBM-Certified Training
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore the fascinating parallels between game hacking techniques and offensive security methodologies in this 30-minute conference talk from DEF CON 33. Discover how game cheats and malware share identical stealthy characteristics and learn from the sophisticated evasion techniques employed by game hackers. Examine cheat loaders in detail and understand how anti-cheat countermeasures mirror enterprise EDR (Endpoint Detection and Response) techniques. Gain insights into how the gaming underground's approach to bypassing detection systems can inform and enhance red teaming strategies and offensive security practices. Learn from the creative solutions game hackers develop to evade increasingly sophisticated detection mechanisms and apply these lessons to improve your understanding of modern cybersecurity challenges.
Syllabus
DEF CON 33 - What Game Hackers teach us about Offensive Security & Red Teaming - Joe 'Juno' Aurelio
Taught by
DEFCONConference