Overview
Syllabus
Intro
BIACK HAT
DCOM runtime
Windows Built-in DCOM Apps
Demonstration environment
Exploit code
Stealing IE's data
Activate ShellWindows
Get IDispatch
Get browsing URL strings
Incoming data
Navigation events
Change browsing pages
Create new windows
Component activation procedure 1. NEGOTIATE
Two steps of authentication
Logon audit 1/2
Logon audit 2/2 Remote PC
DCOM authentication Remote PC
Default setting of DCOM authentication
Event handling model
Reverse authentication Local PC
1. Set account on local PC
Use classic security model 1/2
Use classic security model 2/2
Trojan Office
DCOM exploit prevention
Conclusion
Taught by
Black Hat