How to stop people from accessing the machine config
8
Config files
9
Block access to directory
10
IIS configuration file
11
Warning
12
Conflict File
13
Password Encryption
14
App Command
15
App Pool
16
Shared Configuration
17
How to Prevent
18
Protip
19
Assemblies
20
Test Program
21
What do we do
22
Where is it
23
Preemptive solutions
24
Going after memory
25
How to hack memory
26
Tips for creating crashes
27
Accessing dump files
28
Stealing strings
29
Rewriting code
Description:
Explore IIS and .NET hacking techniques in this 54-minute conference talk from Circle City Con 2015. Dive into topics such as machine configuration files, preventing unauthorized access, password encryption, and app command vulnerabilities. Learn about shared configurations, assembly manipulation, and memory exploitation. Discover preemptive solutions, tips for creating crashes, and methods for accessing dump files. Gain insights into stealing strings and rewriting code to enhance your understanding of IIS and .NET security vulnerabilities and countermeasures.