Star 0

Abstract

Stealth and persistency are invaluable assets to an intruder. You cannot defend against what you cannot see. Will share techniques to counter attempts at subverting modern security features, and regain control of compromised machines by drilling down deep into internal structures of the operating system to analyze anomalies within the boot sectors.