Главная
Study mode:
on
1
Introduction
2
What is a typical hacker talk
3
What this video is about
4
About me
5
Technical Meet
6
Dynamic Analysis
7
Frustration
8
Slow Down
9
signature validation
10
additional tools
11
cryptographic guarantees
12
digital signatures for code
13
who should I trust
14
trust no one
15
lesson
16
Demo
17
My Thought Process
18
PowerShell
19
SIP
20
Investigating
21
Registry
22
Windows SDK
23
Implementation
24
Get Authentic Code Signature
25
Maybe not
26
Digital signatures
27
DB GUI
28
Device Guard Bypass
29
More Information
30
More Tools
31
My Expected Reaction
32
How to Validate Trust
33
Background
34
Questions
35
My Approach
36
My History with PowerShell
37
Meeting SubT
38
Meeting Device Guard
39
Next Steps
40
Distractions
41
Embracing shiny objects
42
Lessons from security research
43
Thank you
Description:
Explore the intricacies of Windows security research in this 49-minute conference talk from Derbycon 7. Delve into the speaker's journey of subverting trust in Windows, examining the how and why of engaging in security research. Learn about dynamic analysis, signature validation, and cryptographic guarantees for code. Discover insights on PowerShell, SIP, and Device Guard, as well as techniques for bypassing security measures. Gain valuable lessons from the speaker's experiences, including the importance of embracing distractions and shiny objects in security research. Follow the thought process behind investigating Windows registry, implementing code, and validating trust. Ideal for cybersecurity professionals and enthusiasts interested in Windows security vulnerabilities and research methodologies.

Subverting Trust in Windows - A Case Study of the How and Why of Engaging in Security Research

Add to list
0:00 / 0:00