Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Hunting File System Redirection Bugs Through Instrumentation

HackMiami via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical role of instrumentation in identifying file system redirection vulnerabilities during this 27-minute conference talk by Asher Davila at HackMiami. Delve into the challenges posed by symlinks, hard links, and reparse points in Windows systems, and understand why traditional static testing falls short in detecting these complex issues. Learn how dynamic testing, particularly through binary instrumentation using Microsoft's Detours, can effectively uncover security vulnerabilities in privileged file system operations. Gain insights into a systematic approach for hunting file redirection bugs, and discover the limitations of static analysis compared to the power of instrumentation. Benefit from the expertise of Asher Davila, a Mexican vulnerability researcher specializing in binary analysis, exploitation, reverse engineering, and hardware hacking, as he shares his knowledge on IoT and OT vulnerability hunting and security strategies.

Syllabus

Hunting File System Redirection Bugs Through Instrumentation. Asher Davila

Taught by

HackMiami

Reviews

Start your review of Hunting File System Redirection Bugs Through Instrumentation

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.