YoVDO

Malicious File for Exploiting Forensic Software

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Exploit Development Courses Arbitrary Code Execution Courses

Course Description

Overview

Explore anti-forensic techniques that exploit vulnerabilities in commercial forensic software components. Learn how a single malicious file can trigger arbitrary code execution across multiple forensic software products, posing significant risks to investigators. Dive into the process of fuzzing file viewer components using custom scripts, MiniFuzz, and kernel drivers for anti-debugging. Examine two specific vulnerabilities - heap overflow and infinite loop DoS - and witness demonstrations of arbitrary code execution and software hang-ups using crafted malicious files. Gain insights into advanced exploitation techniques, including overwriting function pointers and optimizing heap spraying with bitmap images. Conclude with a discussion on potential countermeasures to mitigate these security risks in forensic software.

Syllabus

Black Hat USA 2013 - Malicious File for Exploiting Forensic Software


Taught by

Black Hat

Related Courses

Breaking VSM by Attacking SecureKernel
Black Hat via YouTube
Kernel Exploitation with a File System Fuzzer
Hack In The Box Security Conference via YouTube
The Road to iOS Sandbox Escape
Hack In The Box Security Conference via YouTube
The Great Escape of ESXi
media.ccc.de via YouTube
Exploiting QSEE, The Raelize Way
Hack In The Box Security Conference via YouTube