Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore Windows rootkit development techniques in this 47-minute conference talk from Derbycon 7. Dive into the challenges faced by attackers and learn how to navigate through rough seas. Discover methods for plundering in plain sight and controlling network traffic using kernel-mode drivers. Gain insights into user and kernel modes, as well as techniques for handling TCP connections manually. Examine goal-oriented diversion tactics and proxy traffic manipulation strategies. Delve into weaponization techniques and deployment strategies for rootkits. Conclude with a discussion on defense and detection methods, followed by a Q&A session.