| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
The technique which we will describe in great technical detail, targets a vulnerability within EMET which allows our exploit to trigger it's protections without being stopped. This technique is unique in that it does not attempt to skip over or avoid EMETs protections, instead it corrupts critical components of EMET at runtime making it unnecessary for the rest of the attack to be aware of it's existence. We'll discuss the internal workings of EMET and what happens under the hood when a protection is triggered. This talk will also discuss the currently known EMET bypasses and which ones are still relevant.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast