Explore offensive security techniques and bypass methods for Enhanced Mitigation Experience Toolkit (EMET) in this 33-minute conference talk from BSides Cleveland 2014. Delve into topics such as offensive protections, application profiles, and configuration options. Learn about vulnerability selection, disassembly techniques, and the concept of rock chain. Gain insights into why two pointers are used and witness a demonstration on disabling encode pointer. Conclude with closing thoughts and valuable references to enhance your understanding of EMET and its vulnerabilities.
Overview
Syllabus
Introduction
What is EMM
Offensive Protections
Application Profiles
Configuration Options
Bypass Techniques
The Technique
Vulnerability Selection
Protections
Access
Disassembly
Rock Chain
Why two pointers
Demo
Disable Encode Pointer
Closing Thoughts
References