Hacking.NET Applications: The Black Arts - Def Con
Recommend Documents
... possessed! ▫ DNS redirection allowed for malicious code insertion on
legitimate webpages. 2. 2009 DefCon 17 - Con Kung-Fu : Defending Yourself @
DefCon ...
Aug 21, 2009 - âMalicious activity from your accountâ ..... Free! â Capacity for DoS outweighs home user. â How
Types of Intelligence Gathering. ♢ Competitive Intelligence. ♢ Corporate
Espionage. ♢ Information Warfare. ♢ Personal Investigation. (*This talk is NOT
about ...
Access. Granted. ⢠Now we have access. ⢠FTP Script. Account. ⢠Ettercap. Now what? ... Login with a SPECIAL accou
Hands up if you run Android. Keep 'em ... topic or a cover. Th correspon. Agenda t beginning presentat. BORING KIT. The
Enhancements (SE) for Android. Pau Oliva Fora. DefConZl August 2013 ... the upcoming "Andllgmd, . 30 61' S. Android Hack
Aug 21, 2009 - your OS, you trust Amazon not to screw you ..... Free! â Capacity for DoS outweighs home user. â How
Get access to a new set of tools that automates all the attacks for you. How. Explore a âFunctionality. Issueâ disco
WEAKNESSES. Needs to be enhanced: Secure Boot + runtime integrity check. Page 16. WEAKNESSES. Multiple workarounds in co
Feb 6, 2006 ... PRIVATE INVESTIGATORS NOW! OR ... Michigan passed the “Professional
Investigator ..... You are correct, there is no official study guide.
memory will corrupt the DNS name. â« Registering those mangled domains. â« Rapture ... Google domain for serving stati
ââ¦the recovery and investigation of material found in digital devicesâ. ⢠Related tools ... (Saved form data). â
â¦manually starts his scan and waits⦠.... We decided to give something back because we use a lot of open source tool
Aug 2, 2009 - Screen Scraper Tricks: Difficult cases [email protected]. My book ... Download a web page .... VERSION BUIL
Using Security-focused Apache Modules ... We harden recent releases of
Apache entirely ...... Mod_security info comes from Ivan Ristic's OnLamp article:.
Consulting. ⢠(Net | App | Web | Mobile) pen tester type ... ARM firmware developer (???) ... Remote/AP does not use a
Mar 14, 2008 ... the years, conduct the comparison of Portable Executable (PE) file infection on
the Windows platform and Executable and Linking Format (ELF) ...
How-To Attack .NET Applications. Tools and Methodology of Attacking.
Overcome “secure” .NET Applications. Building KeyGen/Crack/Hacks/Malware.
Reverse ...
Hacking .NET Applications:
The Black Arts
Jon McCoy www.DigitalBodyGuard.com
BACKGROUND Why .NET Countermeasures Skill Level Needed Will this work on every .NET application
THIS WILL COVER How-To Attack .NET Applications Tools and Methodology of Attacking Overcome “secure” .NET Applications Building KeyGen/Crack/Hacks/Malware Reverse Engenerring for Protection
Attacking/Cracking IN MEM ||| ON DISK
ATTACK OVERVIEW Attack on Disk Access Logic Infect Logic Hook Logic
Decompile Recompile Debug
Attack in Memory/Runtime Inject Target App Navigate Structure Edit/Control Structure
Attack The Source In Memory
OR
On Disk
Do your Reconnaissance Find the weak spot Subvert the Logic/State Control what you need
ATTACKING ON DISK
101 - DECOMPILERS
DEMO GrayWolf – IL_Spy – Reflector
101 - ATTACK ON DISK Connect/Open - Access Code Decompile - Get code/tech Infect - Change the target's code Exploit - Take advantage
Remold Application - WIN
THE WEAK SPOTS Flip The Check Set Value is “True” Cut The Logic Return True
NATIVE IMAGE(NI) VER 1.1 - is dead GAC VER 3.0 - is dead VER 2.0 & 3.5 \NativeImages_v2.0.50727_32 \NativeImages_v2.0.50727_64 VER 4.0 \NativeImages_v4.0.30319_32 \NativeImages_v4.0.30319_64
Don’t use one area for your Vars Access the normal program
Use Timers Link to Events Spread out your Vars and Code
Protect Me! 2010
Androsa FileProtector
Protect Me! 2010
Androsa FileProtector
Password SHA512 Custom Crypto LIB’s Possible Back Door
Protect Me! 2010 Good Crypto
0b$cur17y
Salt & VI Androsa Encrypted Pass B
FileProtector
DEMO
PROTECTION FOR WHO?
Infect Obfuscated App
0bfu$ca73
WHAT M$ DID RIGHT Un-obfuscated Code ∑ Good for user security ∑ User can see what they are running .NET Framework Security ∑ Targeted Security Access ∑ Protect the Computer from the app Giving Reduced Rights Inside Code ∑ Put venerable code in a box ∑ Mitigate & Segment Risk
WHAT M$ DID WRONG RIGHT MixModeCode – Bad for security ∑ This allows ASM\C++\C code ∑ This breaks out of .NET security GAC & Native Image Override ∑ Removes ability to secure code Not Hash Checking Code ∑ Good for hackers
ATTACKING APPS Read my papers: Reflections Hidden Power & Attacking .NET at Runtime Watch 2010 Presentations on Attacking .NET DefCon 18, AppSec-DC, DojoCon Look up Presentations and Research from Andrew Willson, Erez Ezule, Arndet Mandent Use tools: Visual Studio/MonoDev Reflector/GrayWolf/ILspy/…/ILASM/ILDASM