Artwork

Kyser Clark - Cybersecurity에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Kyser Clark - Cybersecurity 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.
Player FM -팟 캐스트 앱
Player FM 앱으로 오프라인으로 전환하세요!

#60 Shellcode Evasion in 2025: What Still Works (and What Doesn’t) ft. Robert O’Connor

39:55
 
공유
 

Manage episode 502731701 series 3583577
Kyser Clark - Cybersecurity에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Kyser Clark - Cybersecurity 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.

In this episode of The Hacker’s Cache, Kyser Clark sits down with Red Team Consultant Robert O’Connor to unpack the realities of shellcode evasion in 2025. They dive into how antivirus and EDR solutions actually detect malicious payloads, the rise of fileless malware, and why network-level detection is still overlooked. Robert shares his hands-on experience building custom evasion techniques, his transition from pentesting to red teaming, and how certifications like CRTO and OSED fit into the bigger picture. Whether you’re a pentester, red teamer, or just curious about modern adversary simulation, this conversation reveals what still works, what doesn’t, and where the field is heading.

Connect with Robert O’Connor on LinkedIn: https://www.linkedin.com/in/robert-o-connor-16634a164/

Follow Robert on Twitter: https://x.com/Eternal_NOP

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY
Music by Karl Casey @ White Bat Audio
Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.
Opinions are my own and may not represent the positions of my employer.

  continue reading

챕터

1. Introduction (00:00:00)

2. Web App Pentesting (00:05:47)

3. Will Internal Pentesting Become a Niche Specialty? (00:07:48)

4. Security Mad Libs (00:11:24)

5. False Job Descriptions? (00:16:47)

6. CRTO Relevance (00:18:06)

7. Why Get OSED? (00:21:57)

8. Avoiding Detection: EDR vs. AV (00:26:15)

9. Most Interesting Ways to Compromise AD (00:31:40)

10. Bold Prediction for the Future of the Field (00:35:24)

72 에피소드

Artwork
icon공유
 
Manage episode 502731701 series 3583577
Kyser Clark - Cybersecurity에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Kyser Clark - Cybersecurity 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.

In this episode of The Hacker’s Cache, Kyser Clark sits down with Red Team Consultant Robert O’Connor to unpack the realities of shellcode evasion in 2025. They dive into how antivirus and EDR solutions actually detect malicious payloads, the rise of fileless malware, and why network-level detection is still overlooked. Robert shares his hands-on experience building custom evasion techniques, his transition from pentesting to red teaming, and how certifications like CRTO and OSED fit into the bigger picture. Whether you’re a pentester, red teamer, or just curious about modern adversary simulation, this conversation reveals what still works, what doesn’t, and where the field is heading.

Connect with Robert O’Connor on LinkedIn: https://www.linkedin.com/in/robert-o-connor-16634a164/

Follow Robert on Twitter: https://x.com/Eternal_NOP

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY
Music by Karl Casey @ White Bat Audio
Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.
Opinions are my own and may not represent the positions of my employer.

  continue reading

챕터

1. Introduction (00:00:00)

2. Web App Pentesting (00:05:47)

3. Will Internal Pentesting Become a Niche Specialty? (00:07:48)

4. Security Mad Libs (00:11:24)

5. False Job Descriptions? (00:16:47)

6. CRTO Relevance (00:18:06)

7. Why Get OSED? (00:21:57)

8. Avoiding Detection: EDR vs. AV (00:26:15)

9. Most Interesting Ways to Compromise AD (00:31:40)

10. Bold Prediction for the Future of the Field (00:35:24)

72 에피소드

모든 에피소드

×
 
Loading …

플레이어 FM에 오신것을 환영합니다!

플레이어 FM은 웹에서 고품질 팟캐스트를 검색하여 지금 바로 즐길 수 있도록 합니다. 최고의 팟캐스트 앱이며 Android, iPhone 및 웹에서도 작동합니다. 장치 간 구독 동기화를 위해 가입하세요.

 

빠른 참조 가이드

탐색하는 동안 이 프로그램을 들어보세요.
재생