Sneaking Past Device Guard

Sneaking Past Device Guard

Hack In The Box Security Conference via YouTube Direct link

THE LATERAL MOVEMENTO COM APPROACH

5 of 17

5 of 17

THE LATERAL MOVEMENTO COM APPROACH

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Sneaking Past Device Guard

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 OUTLINE
  3. 3 WHAT DOES ARBITRARY CODE REALLY MEANT
  4. 4 DEVICE GUARD - IN PRACTICE
  5. 5 THE LATERAL MOVEMENTO COM APPROACH
  6. 6 WHEN DOES OFFICE FORSAKE PROTECTED MODE?
  7. 7 TRUSTED LOCATIONS
  8. 8 BENEFITS OF EXCEL MACROS
  9. 9 ACTIVESCRIPT BYPASSES
  10. 10 THE MAIN COMPONENTS OF ACTIVESCRIPT
  11. 11 COMMON HOSTS AND ENGINES
  12. 12 DEVICE GUARD IN ACTIVESCRIPT
  13. 13 ACTIVESCRIPTCONSUMER
  14. 14 DIFFERENT IMPLEMENTATIONS IN ACTIVESCRIPT
  15. 15 THE SCOPE OF THE PROBLEM
  16. 16 STICKING TECHNIQUES TOGETHER
  17. 17 HOW I THINK THE FEATURE SHOULD DEVELOP

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.