Главная
Study mode:
on
1
Intro
2
What is Serialization?
3
Why Serialization?
4
NET Serialization Support
5
Binary Serialization
6
What does it look like?
7
Badly Written Applications
8
ISerializable Interface
9
ISerializable Deserializing
10
Just Being Malicious
11
Demonstration
12
NET Remoting Architecture
13
Marshal By Reference
14
Marshal By Value
15
More Active Attacks
16
Path Normalization
17
Bypassing Type Filtering
18
How to protect against this?
19
Partial Trust Sandboxes
20
Code Access Security
21
XBAP Exception Handling AppDomain Boundary
22
ISerializable Redux
23
Type Conversion AppDomain Boundary
24
EvidenceBase.Clone
25
Exploiting It!
26
Delegate Multicasting
27
Serialized Delegate
28
Type Confusion
29
Reflection Attack
30
Hashtable Serialization
31
Hashtable Exploit AppDomain Boundary
32
Review
Description:
Explore a comprehensive analysis of .NET serialization vulnerabilities and their exploitation in this Black Hat USA 2012 conference talk. Delve into the process of identifying security issues that led to Microsoft's largest .NET update, and learn how these vulnerabilities can be used to attack .NET applications both locally and remotely. Discover techniques for breaking out of partial trust sandboxes used in technologies like ClickOnce and XAML Browser Applications. Gain insights into various aspects of serialization, including binary serialization, the ISerializable interface, and NET Remoting Architecture. Examine active attack methods, such as path normalization and bypassing type filtering, while understanding protective measures. Investigate partial trust sandboxes, code access security, and XBAP exception handling. Uncover advanced exploitation techniques involving delegate multicasting, type confusion, reflection attacks, and hashtable serialization. Enhance your understanding of .NET security vulnerabilities and their potential impact on application integrity. Read more

Are You My Type? Breaking .NET Sandboxes Through Serialization

Black Hat
Add to list