Главная
Study mode:
on
1
Intro
2
About Yarden
3
Windows Exploitation
4
Intel CT
5
Windows CT
6
Bypass
7
HVCI
8
EDRS
9
Disable Drivers
10
Example
11
File Name
12
drivers
13
WDFilter
14
FSctl Handler
15
Debugger
16
Demo
17
Summary
Description:
Explore Windows exploitation techniques and bypass strategies in this 50-minute conference talk from OffensiveCon. Delve into topics such as Intel CT, Windows CT, HVCI bypass, EDR evasion, and driver disabling. Learn about practical examples, including the WDFilter FSctl Handler, and witness a live debugger demonstration. Gain valuable insights into offensive security approaches and understand how attackers can leverage existing mitigations as opportunities for exploitation.

Your Mitigations Are My Opportunities - Windows Exploitation and Bypass Techniques

OffensiveCon
Add to list