- Jake Williams
- Tuesday, August 20th, 8:15pm - 9:15pm
The technological prowess of attackers has increased dramatically over the last several years. Gone are the days when you could hope to discover malware.exe running in the process list. Attackers are migrating to code injection as a method to remain hidden from prying eyes examining process list entries.
Sure, we've all heard the term code injection or DLL injection, but what does it really mean? How does it really work? Hint: it isn't magic. However, many explanations are bereft, with hand waving and pressing the "I believe" button. In this presentation, we'll talk about how code injection really works at a more technical level. We'll take a quick look at some malware that's performing code injection and discuss detection strategies for when your antivirus fails to detect it. Code injection is a huge topic and we can't cover every aspect in an hour, but the goal is for you to walk away understanding the basics of what's happening under the hood so you can speak intelligently to the topic.
The following bonus sessions are open to all paid attendees at no additional cost. There are many different types of events that fall into these categories:
- SANS@Night: Evening presentations given after day courses have ended. This category includes Keynotes.
- Special Events: SANS-hosted events and other non-technical recreational offerings. This category includes, but is not limited to, Receptions and Information Tables.
- Vendor: Events hosted by external vendor exhibitors.
Tuesday, August 20
||Tuesday, August 20th, 10:30am - 10:50am
||Tuesday, August 20th, 3:00pm - 3:20pm
|Evolving VoIP Threats
||Tuesday, August 20th, 7:15pm - 8:15pm
||Tuesday, August 20th, 8:15pm - 9:15pm