YoVDO

Bypassing Application Whitelisting in Critical Infrastructures

Offered By: NorthSec via YouTube

Tags

NorthSec Courses Critical Infrastructure Security Courses

Course Description

Overview

Explore application whitelisting in critical infrastructures and learn techniques to bypass security measures in this 50-minute conference talk from NorthSec. Delve into the concept of application whitelisting for hardening critical systems like SCADA environments and high-security administrative workstations. Examine the effectiveness of this approach in preventing malware execution and protecting against advanced persistent threat (APT) attacks. Discover general bypass techniques and see practical demonstrations using McAfee's application control. Learn methods to achieve code execution, bypass read and write protections, and understand user account control (UAC) bypasses on protected systems. Analyze the security of memory corruption protections and explore product-related design flaws and vulnerabilities in application whitelisting implementations.

Syllabus

René Freingruber - Bypassing Application Whitelisting in Critical Infrastructures


Taught by

NorthSec

Related Courses

I Am Become Loadbalancer, Owner of Your Network
NorthSec via YouTube
The Risks of RDP and How to Mitigate Them
NorthSec via YouTube
Authentication Challenges in SaaS Integration and Cloud Transformation
NorthSec via YouTube
Building CANtact Pro - An Open Source CAN Bus Tool
NorthSec via YouTube
Unmasking the Chameleons of the Criminal Underground
NorthSec via YouTube