The Great Sandbox Escape
Overview
Syllabus
Intro
MegaCortex
Snatch From Breach to Encryption . Brute-forced credentials on a Windows Server in Microsoft Azure • Initial access via RDP • Lateral movement to Active Directory domain controller • Surveillance via WMI (for several weeks)
Snatch The Ransomware * Ransomware binary is registered as a service in the Windows Registry (the service is not immediately started)
Robbin Hood Destroying endpoint protection with RE Kill file in 7 ways and kill process - from ring 0; tamper protection is ineffective
Ragnar Locker Preparing the Physical Machine
Ragnar Locker Virtual Machine
Five signs you're about to be attacked 1. You find a network scanner like AngryIP or Advanced Port Scanner
Taught by
nullcon