Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Hello 1994

Recon Conference via YouTube

Overview

Limited-Time Offer: Up to 75% Off Coursera Plus!
7000+ certificate courses from Google, Microsoft, IBM, and many more.
The course aims to educate participants on the advanced techniques used by threat actors to evade security measures and remain undetected on victim machines. Participants will learn about the utilization of older, lesser-known Windows APIs via Component Object Model (COM) for staging and concealment by malware. The course will cover how threat actors leverage COM to create folders that the Operating System cannot render or access, thus evading security scans. Additionally, participants will understand how this wormable malware spreads across networks via USB air-gap jumping. The teaching method involves a presentation describing the use of COM to instantiate Windows APIs and exploit Windows Explorer. This course is intended for cybersecurity professionals, researchers, and individuals interested in understanding and combating advanced cyber threats.

Syllabus

Recon2023 Michael Harbison Hello 1994

Taught by

Recon Conference

Reviews

Start your review of Hello 1994

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.