- This event has passed.
Anti-Cast | Re-encoding Python Shellcode Execution w/ Joff Thyer
March 27 @ 12:00 pm – 1:00 pm EDT
Imagine, if you will, you’re a pen tester, and you’ve gained access to a Windows application server.
Your discovery includes a deployed application allow listing, and a strong defensive solution stack.
Your excitement increases as you find an installed Python interpreter.
Wouldn’t it be fantastic if you could use that Python interpreter to execute your favorite C2 framework shellcode, allowing you to utilize your normal hacking toolset?
You’ve tried all your normal Python tricks, however barriers persist.
Lets re-encode our shellcode for better success, in this free one-hour Antisyphon Anti-Cast, Re-encoding Python Shellcode Execution with Joff Thyer.
Chat with your fellow attendees in the Antisyphon Discord server here: Join the Antisyphon Training Discord Server! — in the #🍿anticasts-chat channel
Clicking on this button will take you to a registration form on Zoom.
Join us for PreShow Banter™ at 11:30 a.m. ET
You can also livestream the event on YouTube.
Pricing:
Joff Thyer has been a penetration tester and security analyst with Black Hills Information Security since 2013. Prior to joining the InfoSec world, he had a long career in the IT industry as a systems administrator and an enterprise network architect. He has an Associate’s in Computer Science, a B.S. in Mathematics, and an M.S. in Computer Science, as well as several certifications. The best part of a penetration test for Joff is developing sophisticated malware that tackles defensive solutions, ultimately delivering exciting wins for company engagements. He has extensive experience covering intrusion prevention/detection systems, infrastructure defense, vulnerability analysis, defense bypass, source code analysis, and exploit research. When Joff isn’t working or co-hosting the Security Weekly podcast, he enjoys making music and woodworking.