Explore advanced attack patterns that mimic legitimate behavior in this conference talk by Dave Kennedy at GrrCON 2017. Delve into the concept of "Ghast07 Morphing," a sophisticated technique used by attackers to evade detection by blending malicious activities with normal system operations. Learn how these attack patterns work, their potential impact on cybersecurity, and strategies to identify and mitigate such threats. Gain valuable insights into the evolving landscape of cyber attacks and enhance your ability to protect against these stealthy intrusion methods.
Overview
Syllabus
Ghast07 Morphing to Legitimate Behavior Attack Patterns Dave Kennedy