YoVDO

Subverting Trust in Windows - A Case Study of the How and Why of Engaging in Security Research

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Cryptography Courses Ethical Hacking Courses Digital Forensics Courses PowerShell Courses Windows Security Courses Dynamic Analysis Courses

Course Description

Overview

Explore the intricacies of Windows security research in this 49-minute conference talk from Derbycon 7. Delve into the speaker's journey of subverting trust in Windows, examining the how and why of engaging in security research. Learn about dynamic analysis, signature validation, and cryptographic guarantees for code. Discover insights on PowerShell, SIP, and Device Guard, as well as techniques for bypassing security measures. Gain valuable lessons from the speaker's experiences, including the importance of embracing distractions and shiny objects in security research. Follow the thought process behind investigating Windows registry, implementing code, and validating trust. Ideal for cybersecurity professionals and enthusiasts interested in Windows security vulnerabilities and research methodologies.

Syllabus

Introduction
What is a typical hacker talk
What this video is about
About me
Technical Meet
Dynamic Analysis
Frustration
Slow Down
signature validation
additional tools
cryptographic guarantees
digital signatures for code
who should I trust
trust no one
lesson
Demo
My Thought Process
PowerShell
SIP
Investigating
Registry
Windows SDK
Implementation
Get Authentic Code Signature
Maybe not
Digital signatures
DB GUI
Device Guard Bypass
More Information
More Tools
My Expected Reaction
How to Validate Trust
Background
Questions
My Approach
My History with PowerShell
Meeting SubT
Meeting Device Guard
Next Steps
Distractions
Embracing shiny objects
Lessons from security research
Thank you


Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube