Overview
Dive into advanced Windows NT/2K security concepts in this Black Hat USA 2000 conference talk. Explore Win32 payloads, reverse command shells, and decoupled attack processes. Learn about buffer overflow techniques and reverse shells in user mode. Examine the next wave of exploits and subtle but malicious changes in Windows systems. Discover what security measures have already been implemented and gain insights into kernel mode injection techniques. Enhance your understanding of Windows security vulnerabilities and defense strategies in this comprehensive presentation by Joey.
Syllabus
Introduction
Welcome
Objectives
Resources
Win32 payloads
Reverse command shell
Decoupled attack process
Buffer overflow
Reverse shell
User mode
Next wave of exploits
Subtle but malicious changes
What has been done already
Kernel Mode Injection Techniques
Taught by
Black Hat