This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP AppSec DC 2012/Hacking NETC Applications The Black Arts"
Dallendoug (talk | contribs) (updated w/ picture, bio and link to website) |
Dallendoug (talk | contribs) |
||
Line 2: | Line 2: | ||
__NOTOC__ | __NOTOC__ | ||
== The Presentation == | == The Presentation == | ||
− | This talk will focus on attacking .NET Desktop Applications(EXE/DLL/Live Memory)<br>Both WhiteHat and BlackHat hacking will be shown on common security concerns such as intellectual property protection systems and licensing systems.<br>This presentation will have a New Drop of forensic info on what can be accessed about a .NET application, with basic info targeted at Malware Analysis and Live/Dead System Forensics. <br>Last year I showed how to bend .NET applications and the Runtime, This year I will show how to break the rules. I will break rules like executing ASM and injecting compiled IL (byte code) into signed and protected EXE/DLLs. I will show some Black Arts like making Malware/Key-Gens/Cracks.<br> | + | This talk will focus on attacking .NET Desktop Applications(EXE/DLL/Live Memory)<br>Both WhiteHat and BlackHat hacking will be shown on common security concerns such as intellectual property protection systems and licensing systems.<br>This presentation will have a New Drop of forensic info on what can be accessed about a .NET application, with basic info targeted at Malware Analysis and Live/Dead System Forensics. <br>Last year I showed how to bend .NET applications and the Runtime, This year I will show how to break the rules. I will break rules like executing ASM and injecting compiled IL (byte code) into signed and protected EXE/DLLs. I will show some Black Arts like making Malware/Key-Gens/Cracks.<br>The tools shown will be available from [[http://digitalbodyguard.com DigitalBodyGuard.com]]. |
== The Speakers == | == The Speakers == | ||
<table> | <table> |
Latest revision as of 02:05, 28 March 2012
Registration Now OPEN! | Hotel | Schedule | Convention Center | AppSecDC.org
The Presentation
This talk will focus on attacking .NET Desktop Applications(EXE/DLL/Live Memory)
Both WhiteHat and BlackHat hacking will be shown on common security concerns such as intellectual property protection systems and licensing systems.
This presentation will have a New Drop of forensic info on what can be accessed about a .NET application, with basic info targeted at Malware Analysis and Live/Dead System Forensics.
Last year I showed how to bend .NET applications and the Runtime, This year I will show how to break the rules. I will break rules like executing ASM and injecting compiled IL (byte code) into signed and protected EXE/DLLs. I will show some Black Arts like making Malware/Key-Gens/Cracks.
The tools shown will be available from [DigitalBodyGuard.com].
The Speakers
Jon McCoyJon McCoy is a .NET Software Engineer that focuses on security and forensics and the founder of [DigitalBodyGuard.com]. He has worked on a number of Open Source projects ranging from hacking tools to software for paralyzed people. With a deep knowledge of programming under the .NET Framework he has released new attacks on live applications and the .NET Framework itself. He provides consulting to protect .NET applications. |
Gold Sponsors |
||||
Silver Sponsors |
||||
Small Business |
||||
Exhibitors |