Главная
Study mode:
on
1
Introduction
2
Welcome
3
Objectives
4
Resources
5
Win32 payloads
6
Reverse command shell
7
Decoupled attack process
8
Buffer overflow
9
Reverse shell
10
User mode
11
Next wave of exploits
12
Subtle but malicious changes
13
What has been done already
14
Kernel Mode Injection Techniques
Description:
Dive into advanced Windows NT/2K security concepts in this Black Hat USA 2000 conference talk. Explore Win32 payloads, reverse command shells, and decoupled attack processes. Learn about buffer overflow techniques and reverse shells in user mode. Examine the next wave of exploits and subtle but malicious changes in Windows systems. Discover what security measures have already been implemented and gain insights into kernel mode injection techniques. Enhance your understanding of Windows security vulnerabilities and defense strategies in this comprehensive presentation by Joey.

Advanced Windows NT - 2K Security

Black Hat
Add to list
0:00 / 0:00