Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore advanced hacking techniques using Microsoft signed binaries in this eye-opening conference talk. Delve into the world of stealthy attacks that leverage legitimate software tools, evading detection by conventional defender systems. Learn how malicious actors can execute sophisticated attacks by manipulating memory and utilizing seemingly innocuous commands. Discover the potential dangers of attacks that are nearly impossible to detect, such as those using specific byte manipulations. Witness demonstrations of various attack scenarios, including password retrieval from userland memory, shellcode execution through dynamic PE parsing, and kernel-level attacks for advanced persistence. Gain insights into the power of PowerShell combined with a Microsoft Signed Debugger in achieving these complex exploits, and understand the implications for cybersecurity professionals and defenders.