| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Windows APIs are often a blackbox with poor documentation,
taking input and spewing output with little visibility on what
actually happens in the background. By reverse engineering
(and abusing) some of these seemingly benign APIs, we can
effectively manipulate Windows into performing stealthy custom attacks using previously unknown persistent and injection
techniques. In this talk, we’ll get Windows to play with itself
nonstop while revealing 0day persistence, previously unknown
DLL injection techniques, and Windows API tips and tricks.
To top it all off, a custom HTTP beaconing backdoor will be
released leveraging the newly released persistence and injection techniques. So much Windows abuse, so little time.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast