Zero 2 Emulated Criminal: Intro to Windows Malware Dev (Tuesday)

Presented at DEF CON 30 (2022), Aug. 16, 2022, 8 a.m. (540 minutes)

Latest details, requirements, description, cost: https://defcontrainings.myshopify.com/products/dahvid-schloss-zero-2-emulated-criminal-intro-to-windows-malware-dev-1 Training description: Step up your emulated criminal game with a practical, hands-on introduction to malware development. Join a prior US Special Operations Cyber Operator to learn the building blocks and techniques used in real-world malware variants. You don’t need fancy, expensive tools to get a C2 implant executed while evading antivirus. You need basic knowledge, ingenuity, and elbow grease. In this course, we don’t cut corners. You will learn by doing, not by copying and pasting with modules and labs that will give you the ability to deviate and improvise on your very first malware variants in C++, even if you have no prior C++ experience. Where this course differs from others is its reduced need for prior knowledge, and enhanced emphasis on hands-on learning. By the end of the course, you will understand and be able to implement: - Techniques to use the native Win32 API for adversarial tactics, enhancing stealth and offensive efficiency - Maintaining data/shellcode integrity while using multiple ciphers for obfuscation and encryption - Modular antivirus evasion techniques that will remain useful through your pen testing career

Presenters:

  • Dahvid Schloss
    Dahvid is the Offensive Security Lead at Echelon Risk + Cyber. As an experienced professional with over 12 years of cyber-attack and defense experience, Dahvid has previously worked as a Red Team Operator with a Big 4 consulting firm leading and conducting Adversarial Emulation exercises. He also served in the military, leading, conducting, and advising on special operations offensive cyber operations. He has a wide background in cyber security including logical, social, and physical exploitation as well as leading malware development enabling c2 execution while evading endpoint detection solutions.

Similar Presentations: