This working area will check out latest methods to utilize little-known or undocumented development approaches to a screens program
Chuck Easttom
The focus will likely be on strategies that can be used to subvert the protection in the program. For example api calls which you can use in manipulating the system if not in generating spyware. There is going to be plans of vital SQL put processes which you can use in the same manner, eg there clearly was an undocumented stored treatment which will blank the device Administrator code.
Stuff: Bring a computer with a few type of house windows (even on a VM is ok). A c++ compiler and or a copy of graphic C#
Chuck Easttom Chuck has been doing the IT business for over 25 years, he has authored 21 products, like many on pc protection, forensics, and cryptography. Chuck in addition has written some research posts regarding cyber safety like some on spyware production methods. Mr Easttom is a regular audio speaker at many safety occasions including presenting a workshop at DefCon 2016 and: SecureWorld Dallas, SecureWorld Houston,ISC2 safety Congress, HakonIndia, protected Jordan, and many more. ‘” 2_Monday,,,Workshops,”Octavius 5″,”‘Subverting Confidentiality Exploitation Using HTTP'”,’Eijah’,”‘
Eijah President, Demonsaw
Worldwide is becoming tremendously harmful location. Governments and businesses invest hundreds of millions of cash every year to produce brand new and up-to-date tech made for one factor: the exploitation of our own private communications. Read more “This working area will check out latest methods to utilize little-known or undocumented development approaches to a screens program”