Instructors: Kai (Kbsec)
Dates: June 23 to 26 2025
Capacity: 25
This course introduces students to modular implant design. While it focuses on the Windows operating system, many of the topics are applicable to other systems with slight modifications. This course takes an opinionated approach to implant development that asserts payloads should be as complex as they need to be and no more. In particular, it should be easy to extend implant functionality, selectively compile in features and adjust to the quirks of the environment they are deployed in. Lectures cover strategies for designing flexible implants and labs will center around developing a command and control server, with an implant derived from sHELL (hell shell).
sHELL (Hell shell): a hellish way to develop a shell. sHELL is a teaching shell that demonstrates one strategy for building modular implants: custom dynamic linking. In particular, each command that the shell supports is implemented in a separate binary file refereed to as a module. At runtime, the main program can load a module and extend runtime functionality. To start with, sHELL supports loading DLL modules from disk. As the course progresses, students will work to add functionality, implement loaders for other types of modules, and improve opsec.
Folks who are interested in demystifying Windows malware.
Kai (kbsec) is a seasoned security researcher and reverse engineer with over a decade of experience in offensive security. Currently pursuing a PhD at Northeastern University (NEU), Kai spends his idle time teaching students how to develop implants to better understand the systems they target-- or as he puts it "Trojan horsing systems security via malware development."
Click here to register.