DIY vulnerability discovery with DLL Side Loading
- Jake Williams
- Tuesday, October 6th, 7:15pm - 8:15pm
In this talk, Jake (contributing author on FOR526, FOR610, and SEC760) will teach you how to discover vulnerabilities like a rock star using DLL side loading. This technique (ab)uses the way Windows searches for DLLs to load into a program. The behavior is nearly laughable and introduces serious risks, especially when developers don't understand filesystem permissions. Attackers know this and use it for privilege escalation and stealthy persistence.
Once you understand how DLL side loading works, you'll be able to find it in your next investigation. Plus you'll look like a infosec rock star when you find vulnerabilities in your organization's custom software.
The following bonus sessions are open to all paid attendees at no additional cost. There are many different types of events that fall into these categories:
- SANS@Night: Evening presentations given after day courses have ended. This category includes Keynotes.
- Special Events: SANS-hosted events and other non-technical recreational offerings. This category includes, but is not limited to, Receptions and Information Tables.
- Lunch & Learn: Short presentations given during the lunch break.
Monday, October 5
|General Session - Welcome to SANS||Jason Fossen||Monday, October 5th, 8:15am - 8:45am||Special Events|
|What's New for Security in Windows 10 and Server 2016?||Jason Fossen||Monday, October 5th, 7:15pm - 9:15pm||Keynote|
Tuesday, October 6
|DIY vulnerability discovery with DLL Side Loading||Jake Williams||Tuesday, October 6th, 7:15pm - 8:15pm||SANS@Night|
Wednesday, October 7
Thursday, October 8
|How to bring some Advanced Persistent Trickery to your fight against Advanced Persistent Threats...||Bryce Galbraith||Thursday, October 8th, 7:15pm - 8:15pm||SANS@Night|