Overview
Discover cutting-edge pentesting techniques in this 41-minute conference talk. Explore advanced methods including binary droppers, shellcode execution, PowerShell injection, and PE crypters. Learn about Hyperion encryption, firewall bypassing, and egress busting. Gain insights into reverse shell usage and examine a personal favorite attack involving static AES keys. Delve into Python code examples and decrypted password analysis. Access all video content and download links for a comprehensive understanding of these secret pentesting strategies.
Syllabus
Intro
About the Speaker
Introduction
Technique #1
Explaining the Applet
Binary Dropper
Weak Sauce
Shellcodeexec
Easily detectable
PS ShellCode Injection
Method 3 - Powershell Injection
PE Crypters
Hyperion Encryption
Bumping the Firewall
Egress Busting
Egress Buster 0.2
Egress Buster Reverse Shell Usage
One of my PERSONAL Favorites
The Attack
Contents of File
Static Key for AES Anyone?
Python Code
Decrypted Password
Downloads