Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Close Encounters of the Advanced Persistent Kind - Leveraging Rootkits for Post-Exploitation

Black Hat via YouTube

Overview

Explore a full-chain Windows kernel post-exploitation scenario in this 38-minute Black Hat conference talk. Discover how a Windows 0-day vulnerability can be weaponized to load a kernel rootkit, and learn about leveraging Direct Kernel Object Manipulation (DKOM) to dynamically alter OS telemetry and sensor visibility, rendering endpoint security solutions ineffective. Delve into advanced attacks, including the use of Network Driver Interface Specification (NDIS) modules to disrupt EDR cloud telemetry, establish covert persistence channels, and directly read memory-resident keyboard states in the Kernel for high-performance global keylogging. Presented by Ruben Boonen and Valentina Palmiotti, this talk offers valuable insights into advanced persistent threats and post-exploitation techniques.

Syllabus

Close Encounters of the Advanced Persistent Kind: Leveraging Rootkits for Post-Exploitation

Taught by

Black Hat

Reviews

Start your review of Close Encounters of the Advanced Persistent Kind - Leveraging Rootkits for Post-Exploitation

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.