Hijacking Arbitrary .NET Application Control Flow

SecTor 2015

Presented by: Topher Timzen
Date: Wednesday October 21, 2015
Time: 10:15 - 11:15
Location: 801B
Track: Tech

This session will demonstrate attacking .NET applications at runtime. I will show how to modify running applications with advanced .NET and assembly level attacks that will give the ability to alter the control flow of any .NET application. New attack techniques and tools will be released to allow penetration testers to carry out advanced post exploitation attacks. This presentation should give a solid view into the .NET hacker space.

Links

Topher Timzen

Topher Timzen is a recent graduate of Southern Oregon University’s Computer Science Security and Information Assurance program. He has focused on research in reverse engineering malware, incident response and exploitation development. In the Spring of 2015 he taught a course on Windows Memory Forensics and introduced students to Windows Kernel structures while using the Volatility framework.


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats