Главная
Study mode:
on
1
Intro
2
DOCUMENT EXPLOIT KITS
3
THREADKIT AND VENOMKIT
4
THREADKIT CAMPAIGN EXAMPLE
5
OLE OVERVIEW
6
THREADKIT INFECTION CHAIN EXAMPLE
7
VENOMKIT INFECTION CHAIN EXAMPLE
8
COMPOUND MONIKER LOGIC EXPLOIT
9
COMPOSITE MONKER OLE OBJECT
10
SCRIPTLET EXAMPLE
11
EQUATION EDITOR BUFFER OVERFLOW EXPLOITS
12
FONT RECORD BUFFER OVERFLOW
13
LOGFONT BUFFER OVERFLOW
14
ADOBE FLASH UAF - UAF TRIGGER
15
RED TEAM TECHNIQUE ADOPTION
16
CONCLUSION & TAKEAWAYS
17
ACKNOWLEDGEMENTS
Description:
Explore the evolution and inner workings of modern document exploit kits in this 40-minute conference talk from BSidesLV 2019. Delve into an in-depth analysis of ThreadKit and VenomKit, examining their infection chains and campaign examples. Gain insights into various exploitation techniques, including compound moniker logic exploits, composite moniker OLE objects, and scriptlet examples. Investigate buffer overflow exploits in Equation Editor and font records, as well as Adobe Flash use-after-free vulnerabilities. Learn about the adoption of red team techniques and understand the key takeaways for defending against these sophisticated threats.

From EK to DEK - An Analysis of Modern Document Exploit Kits

BSidesLV
Add to list
0:00 / 0:00