Completed
Lessons from security research
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Subverting Trust in Windows - A Case Study of the How and Why of Engaging in Security Research
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 What is a typical hacker talk
- 3 What this video is about
- 4 About me
- 5 Technical Meet
- 6 Dynamic Analysis
- 7 Frustration
- 8 Slow Down
- 9 signature validation
- 10 additional tools
- 11 cryptographic guarantees
- 12 digital signatures for code
- 13 who should I trust
- 14 trust no one
- 15 lesson
- 16 Demo
- 17 My Thought Process
- 18 PowerShell
- 19 SIP
- 20 Investigating
- 21 Registry
- 22 Windows SDK
- 23 Implementation
- 24 Get Authentic Code Signature
- 25 Maybe not
- 26 Digital signatures
- 27 DB GUI
- 28 Device Guard Bypass
- 29 More Information
- 30 More Tools
- 31 My Expected Reaction
- 32 How to Validate Trust
- 33 Background
- 34 Questions
- 35 My Approach
- 36 My History with PowerShell
- 37 Meeting SubT
- 38 Meeting Device Guard
- 39 Next Steps
- 40 Distractions
- 41 Embracing shiny objects
- 42 Lessons from security research
- 43 Thank you