- Jake Williams
- Wednesday, March 5th, 7:15pm - 8:15pm
The technological prowess of attackers has increased dramatically over the last several years. Gone are the days when you could hope to discover malware.exe running in the process list. Attackers are migrating to code injection as a method to remain hidden from prying eyes examining process list entries.
Sure, we've all heard the term code injection or DLL injection, but what does it really mean? How does it really work? Hint: it isn't magic. However, many explanations are bereft with hand waving and pressing the "I believe" button. During this presenation, we'll talk about how code injection really works at a more technical level. We'll take a quick look at some malware that's performing code injection and discuss detection strategies for when your antivirus fails to detect it. Code injection is a huge topic and we can't cover every aspect in an hour, but the goal is for you to walk away understanding the basics of what's happening under the hood so you can speak intelligently to the topic.
The following bonus sessions are open to all paid attendees at no additional cost. There are many different types of events that fall into these categories:
- SANS@Night: Evening presentations given after day courses have ended. This category includes Keynotes.
- Special Events: SANS-hosted events and other non-technical recreational offerings. This category includes, but is not limited to, Receptions and Information Tables.
Monday, March 3
Tuesday, March 4
|GIAC Program Overview||Eric Conrad||Tuesday, March 4th, 7:15pm - 7:45pm||Special Events|
|SANS Technology Institute Open House||Eric Conrad||Tuesday, March 4th, 7:45pm - 8:15pm||Special Events|
|Continuous Ownage: Why you Need Continuous Monitoring||Eric Conrad||Tuesday, March 4th, 8:15pm - 9:15pm||SANS@Night|
Wednesday, March 5
|Code Injection||Jake Williams||Wednesday, March 5th, 7:15pm - 8:15pm||SANS@Night|
Thursday, March 6
|How the West was Pwned||G. Mark Hardy||Thursday, March 6th, 7:15pm - 8:15pm||SANS@Night|