YoVDO

Bypassing Control Flow Guard in Windows 10

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Windows 10 Security Courses Security Research Courses Control-Flow Integrity Courses Memory Corruption Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore advanced techniques for bypassing Control Flow Guard in Windows 10 through this conference talk from Louisville Infosec 2015. Delve into memory corruption, attack prevention strategies, and the intricacies of Control Flow Integrity. Learn about the need for relaxed control flow, performance impacts, and sample programs demonstrating guard checks. Discover security research methodologies, bypass techniques, and the role of Windows operations in coarse-grain protection. Examine virtual protect mechanisms, Flash vulnerabilities, and generic bypass methods. Investigate stack desynchronization, the "Jackpot Pattern," and censored slides revealing critical insights. Gain valuable recommendations for enhancing system security and participate in a Q&A session to deepen your understanding of these complex cybersecurity concepts.

Syllabus

Intro
Who are we
Motivation
Limitations
Summary
Memory Corruption
Stop Attacks
Conclusion
Control Flow Integrity
Need for Relaxed Control Flow
Should you use it
What it does
Impact on performance
Sample program
Guard check
Program crash
What does CFG allow
How to do security research
Whats the key
How do we bypass
Does it take time
Windows Ops
Coarse Grain
Virtual Protect
Flash
Black Hat
Generic Bypass
Stack Do Sink
How Did We Get The Tip
The Problem
Desynchronization
Stack Dsync
Research
Stack Sinking
Jackpot Pattern
More censored slides
Whats interesting
In summary
Recommendations
Questions


Related Courses

Binder - The Bridge To Root - Hongli Han and Mingjian Zhou
Hack In The Box Security Conference via YouTube
JARVIS Never Saw It Coming - Hacking Machine Learning in Speech, Text and Face Recognition
44CON Information Security Conference via YouTube
SyScan360'16 Singapore - Memory Corruption Is For Wussies
SyScan360 via YouTube
Select Code Execution From Using SQLite
media.ccc.de via YouTube
BLEEDINGBIT - Your APs Belong to Us
Black Hat via YouTube