Shims For The Win - Case Study and Investigative Techniques for Hijacked Application Compatibility Infrastructure
Offered By: BruCON Security Conference via YouTube
Course Description
Overview
Explore a comprehensive case study and investigative techniques for hijacked Application Compatibility Infrastructure in this 57-minute conference talk from BruCON Security Conference. Delve into the world of shims and their potential for both legitimate use and malicious exploitation. Learn how attackers can leverage the Application Compatibility Infrastructure to maintain persistence and evade detection. Gain insights into effective methods for identifying and analyzing suspicious shim usage, equipping yourself with valuable knowledge to enhance your cybersecurity defenses. Join security experts Willi Ballenthin and Jon Tomczak as they share their expertise on this critical topic, providing practical examples and actionable strategies for protecting against shim-based attacks.
Syllabus
BruCON 0x07 - Shims For The Win - Willi Ballenthin & Jon Tomczak
Taught by
BruCON Security Conference
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network