Overview
Syllabus
Intro
Las Vegas
Security conferences
Introduction
Agenda
About Me
Windows Calculator
What Happened
Why Reflected File Download
How Do We Trust Downloads
Conclusion
What is RFD
Download Reflected File
Final Result
Warning
Windows Security Feature Bypass
Batch File Bypass
Final Link
Example
Requirements
Where can we find it
Which exploit to use
Why work hard
Whitepaper
Advanced exploitation
PowerShell
Commandline Options
Chrome Setup
Build Exploit
Demo
Gmail
Verify download
Read emails
Cross social network warm
Cross social network warm demo
Googlecom warm demo
Use exact URL mappings
Whitelist callbacks
Remove support for path parameters
Summary
Quote
Questions
Taught by
Black Hat