Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Malware Design: Abusing Legacy Microsoft Transports and Session Architecture

DEFCONConference via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a DEF CON 31 conference talk that delves into advanced malware design techniques focusing on Legacy Microsoft Transports and Session Architecture. Learn about maintaining persistent command and control (C2) access during red team operations through the demonstration of Obligato, a covert implant tasking and communications framework. Discover methodologies for breaking process chaining events, disassociating network communication from implants, and implementing evasion techniques against dynamic analysis. Gain insights into maintaining and regaining access to compromised endpoints while minimizing detection risks. While basic understanding of Windows architecture, networking, and programming concepts is beneficial, the presentation covers both high-level concepts and technical details suitable for various expertise levels.

Syllabus

DEF CON 31 - Malware design Abusing Legacy Microsoft Transports and Session Architecture 0 RJ McDown

Taught by

DEFCONConference

Reviews

Start your review of Malware Design: Abusing Legacy Microsoft Transports and Session Architecture

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.