YoVDO

Shims For The Win - Case Study and Investigative Techniques for Hijacked Application Compatibility Infrastructure

Offered By: BruCON Security Conference via YouTube

Tags

BruCON Courses Cybersecurity Courses Security Vulnerabilities Courses

Course Description

Overview

Explore a comprehensive case study and investigative techniques for hijacked Application Compatibility Infrastructure in this 57-minute conference talk from BruCON Security Conference. Delve into the world of shims and their potential for both legitimate use and malicious exploitation. Learn how attackers can leverage the Application Compatibility Infrastructure to maintain persistence and evade detection. Gain insights into effective methods for identifying and analyzing suspicious shim usage, equipping yourself with valuable knowledge to enhance your cybersecurity defenses. Join security experts Willi Ballenthin and Jon Tomczak as they share their expertise on this critical topic, providing practical examples and actionable strategies for protecting against shim-based attacks.

Syllabus

BruCON 0x07 - Shims For The Win - Willi Ballenthin & Jon Tomczak


Taught by

BruCON Security Conference

Related Courses

Being a Cyberdefender - Behind the Curtains
BruCON Security Conference via YouTube
Bypassing Microsoft Defender for Identity
BruCON Security Conference via YouTube
A Black-Box Security Evaluation of the SpaceX Starlink User Terminal
BruCON Security Conference via YouTube
Android Malware Targeting Belgian Financial Apps
BruCON Security Conference via YouTube
Chasing the White Whale of Malware
BruCON Security Conference via YouTube