Explore the intricacies of Microsoft's Fix It patches in this Black Hat Asia 2014 conference talk. Delve into the analysis of in-memory patches and their role in preventing exploitation. Learn how to extract valuable information from these patches to gain insights into vulnerabilities Microsoft aims to address. Discover techniques for reverse engineering patches and leveraging this knowledge to maintain system persistence. Examine real-world cases, such as the XML Core Services bug, and understand the structure of Application Compatibility Databases. Gain hands-on experience with tools like the Application Compatibility Toolkit and custom utilities for patch installation. Follow along as the speaker demonstrates the process of creating and configuring sample targets, debugging, and manipulating the shim engine. Enhance your understanding of Microsoft's security measures and potential vulnerabilities in this comprehensive exploration of Fix It patches.
Persist It - Using and Abusing Microsoft's Fix It Patches