Jamie Butler & Kris Kendall: Blackout: What Really Happened...
Manage episode 152211972 series 1053194
Black Hat Briefings, USA 2007 [Video] Presentations from the security conference.에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Black Hat Briefings, USA 2007 [Video] Presentations from the security conference. 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.
Malicious software authors use code injection techniques to avoid detection, bypass host-level security controls, thwart the efforts of human analysts, and make traditional memory forensics ineffective. Often a forensic examiner or incident response analyst may not know the weaknesses of the tools they are using or the advantage the attacker has over those tools by hiding in certain locations.
This session provides a detailed exploration of code injection attacks and novel countermeasures, including:
1. The technical details of code injection starting with basic user land techniques and continuing through to the most advanced kernel injection techniques faced today.
2. Case study of captured malware that reveals how these techniques are used in real world situations.
3. Discussion of current memory forensic strengths and weaknesses.
4. New memory forensic analysis techniques for determining if a potential victim machine has been infected via code injection.
5. Post acquisition analysis.
…
continue reading
This session provides a detailed exploration of code injection attacks and novel countermeasures, including:
1. The technical details of code injection starting with basic user land techniques and continuing through to the most advanced kernel injection techniques faced today.
2. Case study of captured malware that reveals how these techniques are used in real world situations.
3. Discussion of current memory forensic strengths and weaknesses.
4. New memory forensic analysis techniques for determining if a potential victim machine has been infected via code injection.
5. Post acquisition analysis.
89 에피소드