Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Flying Under the Radar - From Low Visibility to No Visibility

HackMiami via YouTube

Overview

Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore advanced evasion techniques used by modern threat actors in this 57-minute conference talk from HackMiami XII. Delve into the sophisticated methods cybercriminals employ to bypass the 20-30 security tools typically deployed in mid-sized organizations, examining how attackers have evolved their tactics over the past two decades to maintain stealth throughout their entire attack chain. Learn about cutting-edge obfuscation techniques including code obfuscation, HTML smuggling, resource concealment, and anti-bot protections such as sandbox evasion, while discovering how threat actors exploit legitimate cloud services and leverage service-based offerings within the cybercrime underground. Gain insights through accessible code reviews of real malware and phishing campaigns, designed for participants without programming expertise, and understand how attackers reverse-engineer security solutions to make subtle yet impactful modifications that render their malware, phishing schemes, and automated tools completely undetectable by existing defense mechanisms.

Syllabus

HackMiami XII -Flying under the radar from low visibility to no visibility. Danna Peller & Itay Maor

Taught by

HackMiami

Reviews

Start your review of Flying Under the Radar - From Low Visibility to No Visibility

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.