A6091dbd89eac91f370ec2e89cfe4088

Abstract

The session is completely focused on how the various malware manages to gain the persistent one the system.
Here, we will deal with various persistence techniques like process injection, search order hijacking , mutex and many more.

Speaker

lakshyadubey

Timing

Starts at Sunday September 15 2019, 10:30 AM. The sessions runs for about 1 hour.

Resources