Difference between revisions of "OWASP AppSec DC 2012/Hacking NETC Applications The Black Arts"

From OWASP
Jump to: navigation, search
(Created page with "<noinclude>{{:OWASP AppSec DC 2012 Header}}</noinclude> __NOTOC__ == The Presentation == rightThis talk will focus on attacking .NET Desktop A...")
 
Line 2: Line 2:
 
__NOTOC__
 
__NOTOC__
 
== The Presentation  ==
 
== The Presentation  ==
[[Image:Owasp_logo_normal.jpg|right]]This talk will focus on attacking .NET Desktop Applications(EXE/DLL/Live Memory)<br>Both WhiteHat and BlackHat hacking will be shown on common security concerns such as intellectual property protection systems and licensing systems.<br>This presentation will have a New Drop of forensic info on what can be accessed about a .NET application, with basic info targeted at Malware Analysis and Live/Dead System Forensics. <br>Last year I showed how to bend .NET applications and the Runtime, This year I will show how to break the rules. I will break rules like executing ASM and injecting compiled IL (byte code) into signed and protected EXE/DLLs. I will show some Black Arts like making Malware/Key-Gens/Cracks.<br>This speech will have a second follow-up speech protection systems. Hacking .NET(C#) Applications: Protection Systems
+
This talk will focus on attacking .NET Desktop Applications(EXE/DLL/Live Memory)<br>Both WhiteHat and BlackHat hacking will be shown on common security concerns such as intellectual property protection systems and licensing systems.<br>This presentation will have a New Drop of forensic info on what can be accessed about a .NET application, with basic info targeted at Malware Analysis and Live/Dead System Forensics. <br>Last year I showed how to bend .NET applications and the Runtime, This year I will show how to break the rules. I will break rules like executing ASM and injecting compiled IL (byte code) into signed and protected EXE/DLLs. I will show some Black Arts like making Malware/Key-Gens/Cracks.<br>This speech will have a second follow-up speech protection systems. Hacking .NET(C#) Applications: Protection Systems
 
== The Speakers  ==
 
== The Speakers  ==
Jon McCoy
+
<table>
 +
<tr>
 +
<td>
 +
===Jon McCoy===
 +
[[Image:Owasp_logo_normal.jpg|left]]Bio TBA
 +
</td>
 +
</tr>
 +
</table>
 
<noinclude>{{:OWASP AppSec DC 2012 Footer}}</noinclude>
 
<noinclude>{{:OWASP AppSec DC 2012 Footer}}</noinclude>

Revision as of 19:52, 11 March 2012

AppSecDC-468x60-banner-2012.jpg

Registration Now OPEN! | Hotel | Schedule | Convention Center | AppSecDC.org

The Presentation

This talk will focus on attacking .NET Desktop Applications(EXE/DLL/Live Memory)
Both WhiteHat and BlackHat hacking will be shown on common security concerns such as intellectual property protection systems and licensing systems.
This presentation will have a New Drop of forensic info on what can be accessed about a .NET application, with basic info targeted at Malware Analysis and Live/Dead System Forensics.
Last year I showed how to bend .NET applications and the Runtime, This year I will show how to break the rules. I will break rules like executing ASM and injecting compiled IL (byte code) into signed and protected EXE/DLLs. I will show some Black Arts like making Malware/Key-Gens/Cracks.
This speech will have a second follow-up speech protection systems. Hacking .NET(C#) Applications: Protection Systems

The Speakers

Jon McCoy

Owasp logo normal.jpg
Bio TBA

Gold Sponsors

Aspect logo owasp.jpg AppSecDC2009-Sponsor-securicon.gif AppSecDC2009-Sponsor-mandiant.gif AppSecDC2012-ISC2.gif

Silver Sponsors

SPL-LOGO-MED.png

Small Business

AppSecDC2012-Sponsor-sideas.gif BayShoreNetworks.png

Exhibitors

link=http://www.codenomicon.com/ Codenomicon WhiteHat Logo.png AppSecDC2012-HP.jpg WSI - Logo.jpg