Explore a comprehensive case study and investigative techniques for hijacked Application Compatibility Infrastructure in this 57-minute conference talk from BruCON Security Conference. Delve into the world of shims and their potential for both legitimate use and malicious exploitation. Learn how attackers can leverage the Application Compatibility Infrastructure to maintain persistence and evade detection. Gain insights into effective methods for identifying and analyzing suspicious shim usage, equipping yourself with valuable knowledge to enhance your cybersecurity defenses. Join security experts Willi Ballenthin and Jon Tomczak as they share their expertise on this critical topic, providing practical examples and actionable strategies for protecting against shim-based attacks.
Shims For The Win - Case Study and Investigative Techniques for Hijacked Application Compatibility Infrastructure
BruCON Security Conference via YouTube
Overview
Syllabus
BruCON 0x07 - Shims For The Win - Willi Ballenthin & Jon Tomczak
Taught by
BruCON Security Conference