Главная
Study mode:
on
1
Intro
2
Outline
3
What is AFD.sys?
4
Goals • Project Zero's goal
5
First Glance
6
Registry
7
Inputs
8
Immediate Call Dispatch
9
Static Bug Hunting
10
Fuzzing • Preference for static / dynamic analysis Better understanding of target
11
Future Work
12
Questions
Description:
Explore Windows AFD.sys reverse engineering techniques in this 42-minute conference talk from Circle City Con 2015. Delve into the intricacies of AFD.sys, understanding Project Zero's goals and the speaker's approach to bug hunting. Learn about registry inputs, immediate call dispatch, and the balance between static and dynamic analysis. Gain insights into fuzzing techniques and their application in better understanding the target system. Conclude with a discussion on future work and an opportunity for questions, enhancing your knowledge of Windows system internals and reverse engineering methodologies.

Reverse Engineering Windows AFD.sys

Add to list
0:00 / 0:00