Abstract

REFERENCES:

http://lallouslab.net/2017/05/15/7-dll-injection-techniques-in-the-microsoft-windows/
https://attack.mitre.org/techniques/T1055/
https://oddvar.moe/2018/09/06/persistence-using-universal-windows-platform-apps-appx/
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&uact=8&ved=2ahUKEwibkvnl27XfAhUCbn0KHUNwDcUQFjAAegQIAxAC&url=https%3A%2F%2Fwww.exploit-db.com%2Fdocs%2Fenglish%2F45898-flying-under-the-radar.pdf&usg=AOvVaw3UyR-dLlal-3HzmCMX5OkY
Tools:
https://github.com/mdsecactivebreach/SharpShooter
https://github.com/maldevel/gdog

Speaker

Harsh Thakur

Tech-savvy and would love to geek about:
- Windows endpoint security
- Developing /Deploying microservices
- Kubernetes / CNCF projects
- Web and android app security
- AI/ML
- Telecom security

Timing

Starts at Saturday December 22 2018, 09:30 AM. The sessions runs for about 6 hours.

Resources