Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

The Ghost of Internet Explorer in Windows

DEFCONConference via YouTube

Overview

Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore a comprehensive security research presentation examining critical vulnerabilities in Windows' MapUrlToZone API discovered by Microsoft Security Response Center researchers. Learn how nation-state actors exploited zero-click remote code execution vulnerabilities in Outlook through malicious emails, and discover the systematic investigation that uncovered how attackers can trick Windows into treating remote untrusted files as local machine resources. Understand the research methodology used to identify discrepancies between MapUrlToZone and Windows filesystem path parsing, which led to the discovery of a dozen CVEs across multiple vulnerability types. Examine the security implications for critical Windows components including Outlook, Office applications, Windows Shell, and sandboxes that rely on MapUrlToZone for trust decisions. Gain insights into the comprehensive mitigation strategies developed by MSRC in collaboration with internal Microsoft teams, and understand how this research addresses systemic security issues that had received limited attention despite their critical importance to Windows security architecture.

Syllabus

DEF CON 33 - The Ghost of Internet Explorer in Windows - George Hughey, Rohit Mothe

Taught by

DEFCONConference

Reviews

Start your review of The Ghost of Internet Explorer in Windows

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.