Subverting Trust in Windows - A Case Study of the How and Why of Engaging in Security Research

Subverting Trust in Windows - A Case Study of the How and Why of Engaging in Security Research

via YouTube Direct link

Dynamic Analysis

6 of 43

6 of 43

Dynamic Analysis

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Subverting Trust in Windows - A Case Study of the How and Why of Engaging in Security Research

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 What is a typical hacker talk
  3. 3 What this video is about
  4. 4 About me
  5. 5 Technical Meet
  6. 6 Dynamic Analysis
  7. 7 Frustration
  8. 8 Slow Down
  9. 9 signature validation
  10. 10 additional tools
  11. 11 cryptographic guarantees
  12. 12 digital signatures for code
  13. 13 who should I trust
  14. 14 trust no one
  15. 15 lesson
  16. 16 Demo
  17. 17 My Thought Process
  18. 18 PowerShell
  19. 19 SIP
  20. 20 Investigating
  21. 21 Registry
  22. 22 Windows SDK
  23. 23 Implementation
  24. 24 Get Authentic Code Signature
  25. 25 Maybe not
  26. 26 Digital signatures
  27. 27 DB GUI
  28. 28 Device Guard Bypass
  29. 29 More Information
  30. 30 More Tools
  31. 31 My Expected Reaction
  32. 32 How to Validate Trust
  33. 33 Background
  34. 34 Questions
  35. 35 My Approach
  36. 36 My History with PowerShell
  37. 37 Meeting SubT
  38. 38 Meeting Device Guard
  39. 39 Next Steps
  40. 40 Distractions
  41. 41 Embracing shiny objects
  42. 42 Lessons from security research
  43. 43 Thank you

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.