Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

How Hackers Hide - Introduction to Beacon Object Files with Empire C2

John Hammond via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn how hackers utilize Beacon Object Files (BOFs) to maintain stealth during penetration testing and red team operations through this comprehensive cybersecurity tutorial. Explore the fundamental concepts of BOFs, which are small, position-independent code modules that execute within a beacon's process space without creating new processes or loading additional DLLs, making them harder to detect by security solutions. Discover how these lightweight executables integrate with command and control frameworks like Cobalt Strike and Empire C2 to perform reconnaissance, privilege escalation, and lateral movement while minimizing forensic artifacts. Examine the technical architecture behind BOFs, including their compilation process, memory execution model, and interaction with Windows APIs through the beacon's existing process context. Walk through practical demonstrations of developing custom BOFs, implementing common post-exploitation tasks, and integrating them into the Empire C2 framework for real-world scenarios. Understand the defensive implications of BOF usage and learn detection strategies that security professionals can employ to identify these stealthy attack techniques in enterprise environments.

Syllabus

how hackers hide (Intro to Beacon Object Files - with Empire C2!)

Taught by

John Hammond

Reviews

Start your review of How Hackers Hide - Introduction to Beacon Object Files with Empire C2

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.