Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Discover the hidden vulnerabilities in Windows' backwards compatibility through this intriguing Black Hat conference talk. Explore how ending file names with dots or spaces can lead to unexpected behavior, allowing for file manipulation, process hiding, and even remote code execution. Learn about unprivileged rootkit techniques that exploit these quirks, including ways to affect prefetch file analysis and deceive task managers. Delve into the speaker's journey of uncovering these issues, from initial observations to crafting a full attack chain. Gain insights into Windows' path conversion process and how it can be leveraged for various "magic tricks." Understand the potential security implications of these findings and the importance of proper file naming conventions. This 37-minute presentation offers a fascinating look at how seemingly minor compatibility features can have significant security ramifications in modern operating systems.