DARK SIDE OPS 1
Dive deep into source code to gain a strong understanding of execution vectors, payload generation, automation, staging, command and control, and exfiltration. Intensive, hands-on labs provides even intermediate participants with a structured and challenging approach to write custom code and bypass the very latest in offensive countermeasures.
Threat Intel reports are constantly being released which document the
novel techniques and custom tooling that support real world operations.
However, despite access to this information, the industry still lacks
many of the fundamentals required to emulate nation state threats,
opting instead for “off the shelf” tooling and click-once solutions.
These tools abstract the true work required to compromise, engage, and
exfiltrate a target network, leaving an operator scrambling when the
going gets tough.
“Dark Side Ops: Malware Dev” focuses on the goals, challenges,
architecture, and operations of advanced persistent threat (APT)
tooling. Participants will dive deep into source code to gain a strong
understanding of execution vectors, payload generation, automation,
staging, command and control, and exfiltration. In addition,
participants are given hands-on experience with black hat techniques
currently used by hackers to bypass NIDS and HIPS systems, layer 7 web
proxies, “next-gen” antivirus, and DLP solutions.
This is a completely rebuilt version of our previous “Custom
Penetration Testing” course
and modify custom payload droppers, beaconing backdoors, and interactive shells
defensive host and network countermeasures
stealthy command and control methods
custom, stealthy persistence in a target network
and automate the creation of sophisticated client-side attacks
and deploy an advanced custom toolkit for exploration, understanding, and real “Red Side” operations
laterally between workstations for large-scale network compromise
Participants will receive source code to a variety of offensive tools, including custom shells, backdoors, C2 listening posts, and client-side exploitation techniques. To reinforce the knowledge provided through instruction, the modification and creation of the code is the focal point of every lab, allowing participants to take materials home for continued use.