Hacking Exposed: Learning from the Adversaries- An Interactive Session
In his demonstration, Blackberry Chief Evangelist Brian Robison illuminates: The techniques of current real-world adversaries; How attackers exfiltrate sensitive data and easily get around traditional AV and through human defenses; How you can better evaluate if your business is properly protected
Fileless attacks and fileless malware have grown in sophistication, especially in their ability to obfuscate and hide from both traditional and next-generation anti-virus. Join us to discover the techniques being used by APT32/OceanLotus to attack their victims and learn how to replicate them to better test your defenses.
In this very short demonstration, learn techniques to make a weaponized document that is designed to not just bypass AV but also human threat hunters through a sophisticated method of obfuscation and the use of built-in trusted tools. The document is capable of allowing the attacker to gain remote access to the victim system and exfiltrate sensitive data. See, firsthand, the attack compromise both a Windows PC as well as a MacOS.
In his hands-on demonstration, Blackberry Chief Evangelist Brian Robison walks you through:
- The techniques of current real-world adversaries
- How attackers can exfiltrate sensitive data and easily get around traditional AV and through human defenses
- How you can better evaluate if your business is properly protected