Bypassing Anti-Virus using BadUSB
02-11, 15:10–15:55 (UTC), Track 1- Dragon Suite

Agenda for the presentation:
- AMSI Bypass Development
- Execution Policy Bypass
- Payload Runner Development
- Deploying Attack using BadUSB
- Post-Exploitation Persistence
- Prevention

During this presentation, we will take a look over how we can bypass most Anti-Virus detection using a payload embedded on a BadUSB device, resulting in a silver bullet for gaining initial access inside a victim network. Demo will be also included during the presentation.

  • OSEP | OSWE | OSCP | CEH | CPTC | PenTest+ | eWPT | ECIH | CREST
  • Founder of Zerotak Security | Co-Founder of Cyber Union
  • Providing pentesting & security consultation for clients all over the world: Australia, U.S., U.K., Middle East, Singapore, India, Central Africa, Europe.
  • Trainer for U.S. Department of Defense, Slovenian National Bureau of Investigation, Polish Military CERT
  • Speaker @ Defcamp, HEK.SI, RST Con, HackTheZone, Unbreakable
  • EC-Council Certified Ethical Hacker (CEH) Scheme Committee Member
  • InfoSec Writer on Medium