YoVDO

Shims For The Win - Case Study and Investigative Techniques for Hijacked Application Compatibility Infrastructure

Offered By: BruCON Security Conference via YouTube

Tags

BruCON Courses Cybersecurity Courses Security Vulnerabilities Courses

Course Description

Overview

Explore a comprehensive case study and investigative techniques for hijacked Application Compatibility Infrastructure in this 57-minute conference talk from BruCON Security Conference. Delve into the world of shims and their potential for both legitimate use and malicious exploitation. Learn how attackers can leverage the Application Compatibility Infrastructure to maintain persistence and evade detection. Gain insights into effective methods for identifying and analyzing suspicious shim usage, equipping yourself with valuable knowledge to enhance your cybersecurity defenses. Join security experts Willi Ballenthin and Jon Tomczak as they share their expertise on this critical topic, providing practical examples and actionable strategies for protecting against shim-based attacks.

Syllabus

BruCON 0x07 - Shims For The Win - Willi Ballenthin & Jon Tomczak


Taught by

BruCON Security Conference

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network