YoVDO

The Next Generation of Windows Exploitation - Attacking the Common Log File System

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Vulnerability Analysis Courses Fuzz Testing Courses

Course Description

Overview

Explore the vulnerabilities of Windows' Common Log File System (CLFS) in this 30-minute Black Hat conference talk. Dive into the research process behind analyzing CLFS attack surfaces and designing targeted fuzz techniques to uncover vulnerabilities. Learn about a specific vulnerability prepared for Tianfu Cup and its exploitation methods. Examine historically common exploit techniques, their limitations, and discover a new universal exploit method for CLFS. Gain insights from security researchers Shijie Xu, Jianyang Song, and Linshuang Li as they unveil their findings on this high-performance logging mechanism introduced in Windows Vista.

Syllabus

The Next Generation of Windows Exploitation: Attacking the Common Log File System


Taught by

Black Hat

Related Courses

Unlocking Information Security II: An Internet Perspective
Tel Aviv University via edX
Cybersecurity Capstone: Breach Response Case Studies
IBM via Coursera
Complete Ethical Hacking Bootcamp
Udemy
Cyber Security Advanced Persistent Threat Defender Preview
Udemy
Performing Threat Modeling with the PASTA Methodology
Pluralsight