Главная
Study mode:
on
1
Intro
2
Intro to LD_PRELOAD
3
Make It Persistent
4
It Can Be Good!
5
Evil Use Cases
6
Hooking Functions
7
Hooking Example
8
Execution on Load
9
Execution Example
10
The rtld-audit Subsystem
11
Lots of functions
12
At First, I Wanted to Log
13
Intercept Before Load
14
Let's Block Some Preloads!
15
Unauthorized Preloads
16
Monitor & Block Preloads
17
Enter Libpreloadvaccine!
18
Simple Logic
19
Simple Authorized List
20
Simple Deployment
21
Catch it in Action!
22
And Bypass it After!
23
Keep Security Close to Code
Description:
Explore the intricacies of LD_PRELOAD process injection and whitelisting solutions in this Shmoocon 2020 conference talk. Delve into how adversaries exploit LD_PRELOAD, understand its built-in audit system, and learn how to leverage it for whitelisting. Examine design and implementation considerations for whitelisting, and discover why built-in checks in the dynamic linker are more effective than bolt-on solutions. Follow along as the speaker demonstrates the creation and subsequent bypassing of a whitelisting solution, emphasizing the importance of integrating security measures closely with code.

Whitelisting LD PRELOAD for Fun and No Profit

0xdade
Add to list