Главная
Study mode:
on
1
Introduction
2
Relevance
3
attribution
4
about me
5
Agenda
6
What is Process Reimaging
7
AV Scanners
8
Process Reimaging
9
Mitre Attack Framework
10
Game of Thrones
11
Process Doppelganger
12
AP
13
Process Re Imaging
14
Weaponized Process Re Imaging
15
Summary
16
Image File Pointer Field
17
Summary Table
18
Attack vectors
19
Get process image
20
Run process
21
Rename process
22
Demo
23
Recap
24
Pros and Cons
25
Impact
26
Endpoint Security Solution
27
Protection Recommendations
28
Microsoft Update
29
Conclusion
Description:
Explore a conference talk that delves into a newly discovered defense evasion technique called Process Reimaging. Learn how this technique exploits inconsistencies in the Windows operating system to impersonate process executable binaries, potentially bypassing endpoint security solutions like Microsoft Defender. Discover the attack vectors, prerequisites, and weaponization of Process Reimaging, and understand its impact on the Mitre Att&ck framework's defense evasion category. Gain insights into reversing vulnerable Windows Kernel APIs, and witness a demonstration of bypassing Windows Defender detection. Acquire key takeaways on understanding Windows Kernel API limitations, assessing risks, and implementing mitigation strategies to correctly identify process image binaries. Conclude with recommendations for protecting endpoint products against this new threat and understanding its potential impact on your systems.

In NTDLL I Trust - Process Reimaging and Endpoint Security Solution Bypass - E. Carroll - Hack in Paris - 2019

Hack in Paris
Add to list