BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Antisyphon Training - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://www.antisyphontraining.com
X-WR-CALDESC:Events for Antisyphon Training
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240327T120000
DTEND;TZID=America/New_York:20240327T130000
DTSTAMP:20260504T002942
CREATED:20240904T153310Z
LAST-MODIFIED:20240904T153310Z
UID:10000612-1711540800-1711544400@www.antisyphontraining.com
SUMMARY:Anti-Cast: Re-encoding Python Shellcode Execution with Joff Thyer
DESCRIPTION:Imagine\, if you will\, you’re a pen tester\, and you’ve gained access to a Windows application server. \n\n\n\nYour discovery includes a deployed application allow listing\, and a strong defensive solution stack. \n\n\n\nYour excitement increases as you find an installed Python interpreter. \n\n\n\nWouldn’t it be fantastic if you could use that Python interpreter to execute your favorite C2 framework shellcode\, allowing you to utilize your normal hacking toolset? \n\n\n\nYou’ve tried all your normal Python tricks\, however barriers persist. \n\n\n\nLet’s re-encode our shellcode for better success\, in this free one-hour Antisyphon Anti-Cast\, Re-encoding Python Shellcode Execution with Joff Thyer. \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nRe-encoding Python Shellcode Execution with Joff ThyerDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-re-encoding-python-shellcode-execution-with-joff-thyer/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Re-encoding-Python-Shellcode-Execution_Joff-Thyer.png
END:VEVENT
END:VCALENDAR