The Ghost in the Keyboard

As advances in endpoint protection, AI/machine learning, and attack detection continue to bolster defenses, today’s red teamers need to adapt. Instead of compromising an increasingly hardened endpoint, why not focus on a commonly ignored but instrumental component that exists between the user and computer, the keyboard?

Imagine an environment where every keyboard is working together covertly for the benefit of the red team! That was the inspiration behind our covert platform, HIDe & SEEK. Topics covered in this talk include the scaling of implants for enterprise takeover, creating and utilizing a custom C2 server, a persistent reverse shell over covert channels, leveraging field swappable components to evade detection, Flipper Zero implementation, and using custom implants in red team ops.

Attendees how to implement our open-source custom implant platform and leverage current functionality for immediate engagements. They will also leave with a new platform from which to innovate custom implants. Live demos will be used to show these new tactics against real world infrastructure.

Audience participation is required!

Register Today!