Finance Certifications Goldman Sachs & Amazon Teams Trust
The Fastest Way to Become a Backend Developer Online
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore advanced techniques for auditing closed-source software and identifying security vulnerabilities in Windows binaries in this comprehensive Black Hat conference talk. Delve into legal considerations, stress testing methodologies, manual audit approaches, and strategies for detecting suspicious constructs. Gain insights into essential auditor skills and tools, refresh C/C++ code auditing knowledge, and learn to navigate disassembly for effective vulnerability detection. Examine a real-world example using iWS 4.1 SHTML, and discover advanced automation topics to enhance your binary auditing capabilities.
Syllabus
Intro
Auditing Closed-Source Software
Legal considerations (EU)
Why audit binaries?
Approach A: Stress Testing
Approach B: Manual Audit
Approach C. Looking for suspicious constructs
Skills the auditor needs
Tools the auditor needs
C/C++ code auditing recap
Finding it in the disassembly
An Example: iWS 4.1 SHTML
Advanced topics: Automation
Taught by
Black Hat