YoVDO

The Unseen Dangers of Bloatware

Offered By: Recon Conference via YouTube

Tags

REcon Conference Courses Cybersecurity Courses Risk Mitigation Courses Vulnerability Analysis Courses

Course Description

Overview

Explore the hidden security risks of pre-installed software in a 34-minute conference talk from Recon 2019. Delve into the world of "bloatware" and its potential for Remote Code Execution and Local Privilege Escalation vulnerabilities. Examine specific cases involving Dell's "SupportAssist" and Lenovo's "Service Bridge" driver update tool, uncovering critical security flaws that affected millions of users. Analyze the delicate balance between user convenience and system security, gaining insights into the often-overlooked dangers lurking in third-party software that comes bundled with new PCs. Learn about the discovery process and implications of these vulnerabilities, expanding your understanding of potential attack vectors beyond just operating system weaknesses.

Syllabus

Recon 2019 - The Unseen Dangers of Bloatware by Bill DemirKapi


Taught by

Recon Conference

Related Courses

Harnessing Intel Processor Trace on Windows for Fuzz
Recon Conference via YouTube
Reverse Engineering Satellite Based IP Content Distribution
Recon Conference via YouTube
Reverse Engineering Windows Defender's JavaScript Engine
Recon Conference via YouTube
DIY ARM Debugger for Wi-Fi Chips
Recon Conference via YouTube
Subverting Your Server Through Its BMC - The HPE iLO4 Case
Recon Conference via YouTube