CarolinaCon Online 4

CarolinaCon Online 4

Aryan Jogia

Aryan is a security researcher with over 3+ years of experience. He’s a full time malware developer and loves to evade AV and EDRs. His research interests are not just limited to Windows, but he even develops low level code for *nix systems. Even though his expertise lies in the domain of malware developer and reversing, he also dabbles in the domain of red teaming. With his experience in low level programming, he also curates and develops toolkits extensively used for red team engagements. With his CRTO certification in tow, he has led and participated in numerous red team engagements with strong defense mechanisms.


Session

11-02
15:00
45min
Playing the game of tag with modern day AV and EDRs: A guide to evading the watchdogs.
Chetanya Kunndra, Aryan Jogia

The infosec ecosystem revolves around the perpetual process of detection and evasion. AV and endpoint protection products employ multitudes of detection techniques to thwart malware execution. For once, let’s step into the shoes of a malware developer and let’s understand why certain detection techniques work and how they can be evaded. For by learning the offensive can one effectively defend. This talk focuses on the various techniques employed by malware developers to evade modern day AV and EDRs. Participants will learn about various techniques employed by AV and EDRs and the techniques by which a malware developer evades those detections.

Conference