This course teaches learners how to build customized offensive tools and evade detection by security products and analysts. The goal is to stay under the radar of the blue team while deploying payloads efficiently. The course covers techniques such as Reflective DLLs, Donut/sRDI, and position independent code (PIC) to avoid detection. The teaching method involves outlining approaches, demonstrating tool building and protection, and sharing information on defenders' strategies. The intended audience includes red teamers, threat actors, and individuals interested in cybersecurity operations.
Overview
Syllabus
05 - BruCON 0x0D - PIC Your Malware! - Ben Heimerdinger and Sebastian Feldmann
Taught by
BruCON Security Conference