YoVDO

Malicious File for Exploiting Forensic Software

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Exploit Development Courses Arbitrary Code Execution Courses

Course Description

Overview

Explore anti-forensic techniques that exploit vulnerabilities in commercial forensic software components. Learn how a single malicious file can trigger arbitrary code execution across multiple forensic software products, posing significant risks to investigators. Dive into the process of fuzzing file viewer components using custom scripts, MiniFuzz, and kernel drivers for anti-debugging. Examine two specific vulnerabilities - heap overflow and infinite loop DoS - and witness demonstrations of arbitrary code execution and software hang-ups using crafted malicious files. Gain insights into advanced exploitation techniques, including overwriting function pointers and optimizing heap spraying with bitmap images. Conclude with a discussion on potential countermeasures to mitigate these security risks in forensic software.

Syllabus

Black Hat USA 2013 - Malicious File for Exploiting Forensic Software


Taught by

Black Hat

Related Courses

CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent
Reverse Engineering and Exploit Development
Udemy
Penetration Testing: Advanced Kali Linux
LinkedIn Learning
Linux x86 Assembly and Shellcoding
Udemy
Python : Sıfırdan İleri Seviyeye - Etik Hacker Örnekleriyle
Udemy