I am proud to announce that I will be presenting at @nola_con next week! I hope to see you all there!
The Ghost in the Keyboard
As advances in endpoint protection, AI/machine learning, and attack detection continue to bolster defenses, today’s red teamers need to adapt. Instead of compromising an increasingly hardened endpoint, why not focus on a commonly ignored but instrumental component that exists between the user and computer, the keyboard? Imagine an environment where every keyboard is working together covertly for the benefit of the red team! That was the inspiration behind our covert platform, HIDe & SEEK. Topics covered in this talk include the scaling of implants for enterprise takeover, creating and utilizing a custom C2 server, a persistent reverse shell over covert channels, leveraging field swappable components to evade detection, Flipper Zero implementation, and using custom implants in red team ops.