No video

You Can Run, but You Can't Hide - Finding the Footprints of Hidden Shellcode

  Рет қаралды 6,525

Black Hat

Black Hat

10 ай бұрын

Memory scanning is a defensive necessity on Windows systems. Microsoft has not provided executable memory manager kernel callbacks and user-mode hooks are fragile, so defenders have deployed periodic memory scanning to compensate. Attackers have responded by obfuscating their code during periods of inactivity to avoid these scanners. Gargoyle was the first public example, but many toolkits have implemented variations since.
In this talk, we describe three approaches to uncovering such hidden shellcode.....
By: John Uhlmann
Full Abstract and Presentation Materials:
www.blackhat.c...

Пікірлер
SPONGEBOB POWER-UPS IN BRAWL STARS!!!
08:35
Brawl Stars
Рет қаралды 22 МЛН
wow so cute 🥰
00:20
dednahype
Рет қаралды 31 МЛН
а ты любишь париться?
00:41
KATYA KLON LIFE
Рет қаралды 3,6 МЛН
Alice in Kernel Land: Lessons Learned From the eBPF Rabbit Hole
37:59
Three New Attacks Against JSON Web Tokens
40:18
Black Hat
Рет қаралды 6 М.
Secure Web Gateways Have Failed Us - Vivek Ramachandran - BH24 #1
16:56
Black Hat USA 2013 - OPSEC failures of spies
25:11
Black Hat
Рет қаралды 50 М.
Blackhat - Official Trailer 2 (HD)
2:46
Legendary
Рет қаралды 4,7 МЛН
MalDev and Syscalls and BOFs, Oh My!
31:02
SANS Offensive Operations
Рет қаралды 4,5 М.
SPONGEBOB POWER-UPS IN BRAWL STARS!!!
08:35
Brawl Stars
Рет қаралды 22 МЛН