BSides DC 2019 - Hands-on Writing Malware in Go
Go has turned out to be an excellent language for all sorts of things, notably writing malware. In this talk we'll look at the more devious side of programming. We'll see how writing malware is a little different than writing normal programs and we'll look into writing code to perform a handful of techniques relevant to sneaking comms out of a network. By the end of the talk, we'll have a fully-working, (nearly) weapons-grade tool which pushes the bounds of what common defenses will detect. All presented source code will be made available. This talk assumes some familiarity with Go, though any programming background is probably sufficient.
Stuart McMurray
(IronNet)
Stuart is a Red Teamer at IronNet, where he focuses on tool development, Unix, and general Swiss Army knifery. He's been on the offensive side of public and private sector security for six years, during which time he's been an operator and trainer and developed a small arsenal of public and private offensive tools. Stuart's been a speaker at BSides and CarolinaCon and has red teamed for Quantum Dawn and the Collegiate Cyber Defense Competition.
Carson Seese
Carson is an Information Assurance and Cybersecurity student at Pennsylvania College of Technology where he's a member of the Information Security Association. He is currently an intern at IronNet developing network auditing tools in Go, deploying and testing the IronDefense stack in AWS GovCloud, and developing layered physical and logical diagrams of both on-prem and cloud variants of IronDefense. In his spare time, Carson maintains an enterprise-grade homelab where he experiments with new software, network, and security technologies.
Видео BSides DC 2019 - Hands-on Writing Malware in Go канала BSides DC
Stuart McMurray
(IronNet)
Stuart is a Red Teamer at IronNet, where he focuses on tool development, Unix, and general Swiss Army knifery. He's been on the offensive side of public and private sector security for six years, during which time he's been an operator and trainer and developed a small arsenal of public and private offensive tools. Stuart's been a speaker at BSides and CarolinaCon and has red teamed for Quantum Dawn and the Collegiate Cyber Defense Competition.
Carson Seese
Carson is an Information Assurance and Cybersecurity student at Pennsylvania College of Technology where he's a member of the Information Security Association. He is currently an intern at IronNet developing network auditing tools in Go, deploying and testing the IronDefense stack in AWS GovCloud, and developing layered physical and logical diagrams of both on-prem and cloud variants of IronDefense. In his spare time, Carson maintains an enterprise-grade homelab where he experiments with new software, network, and security technologies.
Видео BSides DC 2019 - Hands-on Writing Malware in Go канала BSides DC
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Writing Viruses for Fun, not ProfitBSides DC 2019 - Preparing for Offensive Security Penetration Testing - Kali (PWK) course - OSCPWriting Bad @$$ Malware For OS XClutch, How does it work ?The Best Coding Languages for Hackers - [On Python, Golang, Bash]BSides DC 2019 - We Do In The Shadows: "Going Dark" With Consumer ElectronicsDefcon 21 - How my Botnet Purchased Millions of Dollars in Cars and Defeated the Russian HackersSUNBURST SolarWinds Malware - Tools, Tactics and Methods to get you started with Reverse EngineeringGolang Tutorial 3 - Golang pointers explained, once and for allYou Should Learn How to Hack | Ymir Vigfusson | TEDxReykjavikCQTools: The New Ultimate Hacking ToolkitDEFCON 17: Stealing Profits from Spammers or: How I learned to Stop Worrying and Love the Spam2000% Increase in Go Malware [20210630011215]Anatomy of a Gopher: Binary Analysis of Go Binaries w/ Alex Useche - SANS HackFest Summit 2020Oldest Technologies Scientists Still Can't ExplainSANS DFIR WEBCAST - 50 Shades of Hidden - Diving deep into code injection -INSIGHT | High-performance messaging with Go and Redis - Chris Goddard (Charge Communications)Ghidra - Journey from Classified NSA Tool to Open Source開発ライブ実況 #1 Vim編 (メルペイ Architectチーム Backendエンジニア)BSides DC 2014 - Diamond Model for Intrusion Analysis: What You Need to Know