The Next Generation of Windows Exploitation - Attacking the Common Log File System
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the vulnerabilities of Windows' Common Log File System (CLFS) in this 30-minute Black Hat conference talk. Dive into the research process behind analyzing CLFS attack surfaces and designing targeted fuzz techniques to uncover vulnerabilities. Learn about a specific vulnerability prepared for Tianfu Cup and its exploitation methods. Examine historically common exploit techniques, their limitations, and discover a new universal exploit method for CLFS. Gain insights from security researchers Shijie Xu, Jianyang Song, and Linshuang Li as they unveil their findings on this high-performance logging mechanism introduced in Windows Vista.
Syllabus
The Next Generation of Windows Exploitation: Attacking the Common Log File System
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube