Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore Windows AFD.sys reverse engineering techniques in this 42-minute conference talk from Circle City Con 2015. Delve into the intricacies of AFD.sys, understanding Project Zero's goals and the speaker's approach to bug hunting. Learn about registry inputs, immediate call dispatch, and the balance between static and dynamic analysis. Gain insights into fuzzing techniques and their application in better understanding the target system. Conclude with a discussion on future work and an opportunity for questions, enhancing your knowledge of Windows system internals and reverse engineering methodologies.
Syllabus
Intro
Outline
What is AFD.sys?
Goals • Project Zero's goal
First Glance
Registry
Inputs
Immediate Call Dispatch
Static Bug Hunting
Fuzzing • Preference for static / dynamic analysis Better understanding of target
Future Work
Questions