All times are in Pacific Daylight Time (UTC-0700).
There are far too many pieces to the information security puzzle for one person to know them all. That’s OK, but there are still quite a few topics which warrant at least some basic level of understanding. One such topic is the typical malware kill chain. Those interested in different aspects of security may find they know nothing about this. They may also find the desire to learn.
If the best way to learn is by doing then let’s “do” some malware.
Students of this workshop will learn how to:
Please note we will not cover evasive or persistence techniques. The instructor is not a malware expert and has no intentions (yet) of arming the populace.
This workshop aims to provide a bit of fun and understanding around botnets and the kill chains used to build them. Students will take away a basic but (hopefully) new perspective on something they may have only read about in passing, but more importantly a spark to encourage continued research and experimentation at home.
Students are expected to meet the following requirements before attending the workshop.
Technical requirements for the workshop are as follows. Please note that in all cases students’ preferred technology may be substituted (Atom in place of VSCode, Python in place of Go, etc…), however no support or accommodation for any alternative choices will be provided. Students deviating from the prescribed requirements will be auditing the workshop, rather than actively participating. Students are strongly encouraged to match the instructors’ choices for simplicity. Students are advised to use HashiCorp Vagrant with VirtualBox to set up the environment. A Vagrantfile will be provided with workshop materials.
StudlyBeefyMcBeefyStudly is many things — DEF CON Goon, Chaotic Neutral Troublemaking Aficionado, Fornax Coversapien, Principal Systems Engineer, Raging Alcoholic, Firestarter… The list goes on. They have spent nearly 20 years bringing the fruits of their exploits to the techomancing world. Originally starting out with desktop software and then web application...
Read More© 2021 ShellCon