Hack Microsoft Using Microsoft Signed Binaries
Offered By: Black Hat via YouTube
Course Description
Overview
Explore advanced hacking techniques using Microsoft-signed binaries in this 55-minute Black Hat conference talk. Learn how to leverage PowerShell and a Microsoft-signed debugger to perform various attacks, including password retrieval from userland memory, shellcode execution through dynamic PE parsing, and kernel-level attacks for advanced system persistence. Discover methods to bypass User Account Control (UAC), exploit McAfee password vulnerabilities, and utilize Microsoft debugging tools for malicious purposes. Gain insights into live kernel debugging, Hyper-V operator exploitation, and Empire framework integration. Witness practical demonstrations and understand the implications for red team operations and cybersecurity professionals.
Syllabus
Introduction
Who am I
Why did I do that
Agenda
Per Memory
Pure Shell
Partial
Per Shell
Windbg
How does it work
antivirus will detect it
Microsoft tools
Proof of concept
Other tools
Bypass UAC
McAfee Password
Microsoft debugger
Key
Authentication Provider
HyperV Operator
LiveKDAXZ
Demo
Empire
Pull Request
Demonstration
Basic Theme
Minesweepers
Thank you
Red Team
Debug Mode
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube