What happens when a malware infects a machine? How good does a malware developer need to be in order to bypass an antivirus? How well can an EDR spot new malware threats? How can I get started experimenting with self-developed (safe?) malware? If you have ever asked any of these questions, I have answers for you.
This presentation walks you through the process of script kiddie malware development, DLL sideloading malware technique and explains how the malware could be used against a victim. After the theory part I will share the results I have gotten from my testing with different AV and EDR systems. There is no one system that can save you, no matter the hype.
Anne Hautakangas (Annenaattori)
Anne works for Insta as an Account Director, but don't let that title fool you. She started her cyber security career in a team of pentesters and the experience fueled her fire to dive even deeper to the darker corners of the field on her freetime. Anne is driven by curiosity and is a firm believer of learning by doing. She also likes swords. Make of that what you will.