You Can Run, but You Can't Hide - Finding the Footprints of Hidden Shellcode

  Рет қаралды 6,774

Black Hat

Black Hat

Жыл бұрын

Memory scanning is a defensive necessity on Windows systems. Microsoft has not provided executable memory manager kernel callbacks and user-mode hooks are fragile, so defenders have deployed periodic memory scanning to compensate. Attackers have responded by obfuscating their code during periods of inactivity to avoid these scanners. Gargoyle was the first public example, but many toolkits have implemented variations since.
In this talk, we describe three approaches to uncovering such hidden shellcode.....
By: John Uhlmann
Full Abstract and Presentation Materials:
www.blackhat.c...

Пікірлер
How do Cats Eat Watermelon? 🍉
00:21
One More
Рет қаралды 9 МЛН
Новый уровень твоей сосиски
00:33
Кушать Хочу
Рет қаралды 4,8 МЛН
Three New Attacks Against JSON Web Tokens
40:18
Black Hat
Рет қаралды 6 М.
BSidesBoulder 2024  - Whodunnit - git repository mysteries
49:43
Black Hat USA 2013 - OPSEC failures of spies
25:11
Black Hat
Рет қаралды 50 М.
Alice in Kernel Land: Lessons Learned From the eBPF Rabbit Hole
37:59
OSPF Deep Dive
2:26:28
Kevin Wallace Training, LLC
Рет қаралды 215 М.
Swift Programming Tutorial for Beginners (Full Tutorial)
3:22:45
CodeWithChris
Рет қаралды 7 МЛН
How do Cats Eat Watermelon? 🍉
00:21
One More
Рет қаралды 9 МЛН