Compromising the Windows Enterprise Via Windows Update

Compromising the Windows Enterprise Via Windows Update

Black Hat via YouTube Direct link

DEFCON

15 of 43

15 of 43

DEFCON

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Compromising the Windows Enterprise Via Windows Update

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Why hardware drivers
  3. 3 Vendor code quality
  4. 4 Process overview
  5. 5 Finding drivers
  6. 6 Automating drivers
  7. 7 Search Windows Update
  8. 8 Catalog Updates on Microsoftcom
  9. 9 Accessing the Catalog
  10. 10 Plan
  11. 11 Devices
  12. 12 Files
  13. 13 Windows Device Consult
  14. 14 VirtualBox VM
  15. 15 DEFCON
  16. 16 Device Simulation Framework
  17. 17 USB Filters
  18. 18 What is WSU
  19. 19 Security of WSU
  20. 20 Possible attacks
  21. 21 Proxy settings
  22. 22 State pools
  23. 23 Sync updates
  24. 24 Hardware updates
  25. 25 Metadata
  26. 26 XML
  27. 27 Update IDs
  28. 28 Update Metadata
  29. 29 Extended Update Info
  30. 30 Update XML
  31. 31 Update Handlers
  32. 32 Program Attributes
  33. 33 Installation
  34. 34 The Plan
  35. 35 Setup
  36. 36 Modify Proxy Settings
  37. 37 BGInfo
  38. 38 Demo
  39. 39 Check for SSL
  40. 40 Summary
  41. 41 Textmate
  42. 42 Why is Update so slow
  43. 43 Whitepaper

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.