You Can Run, but You Can't Hide - Finding the Footprints of Hidden Shellcode

  Рет қаралды 6,021

Black Hat

Black Hat

7 ай бұрын

Memory scanning is a defensive necessity on Windows systems. Microsoft has not provided executable memory manager kernel callbacks and user-mode hooks are fragile, so defenders have deployed periodic memory scanning to compensate. Attackers have responded by obfuscating their code during periods of inactivity to avoid these scanners. Gargoyle was the first public example, but many toolkits have implemented variations since.
In this talk, we describe three approaches to uncovering such hidden shellcode.....
By: John Uhlmann
Full Abstract and Presentation Materials:
www.blackhat.com/asia-23/brie...

Пікірлер
Three New Attacks Against JSON Web Tokens
40:18
Black Hat
Рет қаралды 5 М.
Be kind🤝
00:22
ISSEI / いっせい
Рет қаралды 16 МЛН
Pokey pokey 🤣🥰❤️ #demariki
00:26
Demariki
Рет қаралды 4,2 МЛН
Маленькая и средняя фанта
00:56
Multi DO Smile Russian
Рет қаралды 5 МЛН
Joven bailarín noquea a ladrón de un golpe #nmas #shorts
00:17
Joscha at Microsoft
48:46
Simuli
Рет қаралды 1,2 М.
Why 3D Printing Buildings Leads to Problems
15:44
Stewart Hicks
Рет қаралды 7 М.
A Hacker Shares His Biggest Fears | Informer
6:19
VICE
Рет қаралды 3,1 МЛН
What Does a Former Black Hat Hacker Carry Everyday?
27:05
Shawn Ryan Show
Рет қаралды 386 М.
Be kind🤝
00:22
ISSEI / いっせい
Рет қаралды 16 МЛН