Patch Pwnage: Ripping Apart Microsoft Patches to Build Exploits
- Wednesday, October 8, 2014 Sydney 5 pm / Singapore 2 pm
- Stephen Sims
You can now attend the webcast using your mobile device!
In this presentation Stephen will briefly cover the methodology and tools used to perform Microsoft patch analysis before jumping into live demonstrations. We will take a real-world Microsoft patch from 2014 and analyze it to determine the location of the vulnerability. The majority of patched vulnerabilities are privately disclosed to Microsoft. Being able to reverse engineer them with the goal of writing a working exploit can be almost as valuable as a 0-day due to the time it takes organizations to patch their systems.
Stephen Sims is an industry expert with over 15 years of experience in information technology and security. Stephen currently works out of San Francisco as a consultant. He has spent many years performing security architecture, exploit development, reverse engineering, and penetration testing. Stephen has an MS in information assurance from Norwich University and is a course author and senior instructor for the SANS Institute. He is the author of SANS' only 700-level course, SEC710: Advanced Exploit Development, which concentrates on complex heap overflows, patch diffing, and client-side exploits. Stephen is also the lead author on SEC660: Advanced Penetration Testing, Exploits, and Ethical Hacking. He holds the GIAC Security Expert (GSE) certification as well as the CISSP, CISA, Immunity NOP, and many other certifications. In his spare time Stephen enjoys snowboarding and writing music.