Stealth persistence strategies | SANS@MIC Talk

Subscribers:
64,200
Published on ● Video Link: https://www.youtube.com/watch?v=yecohKHoh6g



Duration: 1:05:38
1,286 views
33


This talk will introduce some more interesting stealth techniques! We'll include fancy new techniques and techniques that have been around for a while, yet remain super-effective. Some examples we'll discuss:

-Application shimming
-COM object hijacking
-Office persistence
-AppCert, AppInit and Netsh helper DLLs

WARNING: We will do live demos, so get ready. We'll cover how they can be implemented, but also how they can be detected and possibly prevented

Speaker Bio
Erik Van Buggenhout is the lead author of SEC599 - Defeating Advanced Adversaries. In addition to SEC599, Erik teaches SEC560 - Network Penetration Testing & Ethical Hacking and SEC542 - Web Application Penetration Testing & Ethical Hacking. He has been involved with SANS since 2009, first as a Mentor, working his way to Community Instructor in 2012 and finally becoming a Certified Instructor in 2016.

Erik loves explaining deeply technical concepts by using war stories, adding a few funny anecdotes here and there. As a testimony of his technical expertise, he has obtained the GSE, GCIA, GNFA, GPEN, GWAPT, GCIH, and GSEC certifications.

In addition to his work with SANS, Erik is the co-founder of Belgian cyber security firm NVISO, which focuses on high-end cyber security services, specializing in government, defense and the financial sector. Together with his team of 20+ technical experts, Erik delivers a wide array of technical security services, including penetration testing, security monitoring & incident response.







Tags:
sans institute
information security
cyber security
cybersecurity
information security training
cybersecurity training
cyber security training
erik van buggenhout
sans@mic
stealth persistence strategies
stealth techniques