Watch the stream
An important part of red teaming is developing custom payloads, since using anything public without in-depth customization will get your operation burned in a second. After spending countless hours crafting those precious master pieces, one of the main priorities of the red team and threat actors is to protect them from prying eyes (SOC analysts, forensic investigators or security researchers)
This talk will go over established techniques used to prevent analysis. In addition, three anti-copy techniques used by OKIOK’s red team in real engagement will be covered with proof-of-concept releases and detection opportunities. These techniques propose new ways of circumventing the weaknesses of the established ones.
Guillaume Caillé Team Lead - Penetration Testing, OKIOK
Guillaume Caillé is leading the penetration testing team at OKIOK. He also holds a bachelor's degree in Information Technology Engineering from the École de Technologie Supérieure (ÉTS) with a specialization in security. A true passionate of offensive security, Guillaume specializes in malware development, red teaming and incident response. This experience has enabled him to develop and maintain bleeding edge techniques and tools to stay ahead of all aspects of a company's defense mechanisms.