Главная
Study mode:
on
1
Intro
2
blackhat Overview
3
blackhat Script Based Threats
4
blackhat Obfuscation
5
black hat The Cat and Mouse Game
6
black hat Encryption
7
black hat Detect the Obfuscators
8
black hat AMSI - Supported Vendors
9
black hat AMSI - Enumerations
10
black hat AMSI - Functions
11
black hat AMSI - Architecture
12
black hat Building a Provider
13
blackhat Scan Dispatching
14
black hat Bypassing AMSI
15
blackhat Implementation Flaws
16
black hat COM Server Hijacking
17
blackhat Missing DLL
18
black hat AmsiEnable Bypass
19
blackhat Implementation Issues
20
black hat Fundamental Issues
21
blackhat One Liner
Description:
Explore XOM-switch, a security tool enabling Execute-Only Memory (XOM) on deployed Linux applications using Protection Key Unit (PKU) technology, in this Black Hat conference talk. Learn how to implement end-to-end protection for Linux applications without source code or heavyweight binary rewriting. Discover the tool's approach to hiding code from advanced code reuse attacks, its implementation in the PC market, and potential implications for cybersecurity. Delve into topics such as script-based threats, obfuscation techniques, encryption methods, and ways to detect obfuscators. Examine the Architecture and Memory Scanning Interface (AMSI), its supported vendors, enumerations, functions, and architecture. Gain insights into building a provider, scan dispatching, and methods for bypassing AMSI. Explore implementation flaws, COM server hijacking, missing DLL issues, and fundamental challenges in cybersecurity. Conclude with a discussion on one-liner solutions and their impact on application security. Read more

XOM-Switch - Hiding Your Code from Advanced Code Reuse Attacks in One Shot

Black Hat
Add to list