A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


COM Under The Radar: Circumventing Application Control Solutions - Jimmy Bayne (BSidesCharm 2019) (Hacking Illustrated Series InfoSec Tutorial Videos)

COM Under The Radar: Circumventing Application Control Solutions

Jimmy Bayne

BSidesCharm 2019
http://www.bsidescharm.com

Application Control is the practice of restricting unauthorized code execution. Application Whitelisting (AWL) is the most popular approach, which permits code execution from trusted applications based on managed policies and rules. This talk will highlight several ways to bypass AWL policies using the Component Object Model (COM) and provide recommendations to defend against such techniques.

Jimmy Bayne is a Security Assessor and Researcher at By Light. Prior to joining By Light, Jimmy has worked as a Penetration Tester, Red Team Operator, Security Analyst, and System Administrator in the public and private sectors_.

Back to BSidesCharm 2019 list

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast