Home Contacts Programs Speeches
 

Page.List

 

 

 

 

 

 

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. This is free to use and deploy, but not for commercial use.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Think.dynamic

 
 

We will find a soultion

 

Speech.Page

Hacking .NET Applications: God Mode

This presentation will show how Reverse Engineering can be quickly done with a minimal amount of skills. The focus will be on tools and techniques to edit and compromise .NET applications both on disk & in memory.

BlackHat 2011 - Hacking .NET Applications: The Black Arts

This presentation will cover the Black Arts of Cracks, KeyGens, Malware on .NET Framework applications. The information in this presentation will show how a .NET programmer can do unspeakable things to .NET applications. I will cover the life cycle of developing such attacks and overcoming common countermeasures.

-

This presentation will focus on C# but applies to any application based on the .NET framework.

-

DefCon 19 - Hacking .Net Applications: The Black Arts

This presentation will cover the Black Arts of making Cracks, KeyGens, Malware, and more. The information in this presentation will allow a .NET programmer to do unspeakable things to .NET applications. I will cover the life cycle of developing such attacks and over coming common countermeasures to stop such attacks. New tools to assist in the attacks will be supplied. This presentation will focus on C# but applies to any application based on the .NET framework.

-

AppSec USA 2011 - Hacking .NET Applications: The Black Arts

This talk will focus on attacking the .NET Runtime, Framework DLLs, Security of .NET applications and Security inside of a running .NET application./nBoth white hat and black hat hacking will be shown on common security concerns such as intellectual property protection and licensing systems.

-

This presentation will focus on C# but applies to any application based on the .NET framework.

-

AppSec-DC 2010 - Hacking .Net Applications at Runtime: A Dynamic Attack<

Increasingly desktop applications are created in .NET with C#, VB.NET, MC++, F#... by both small and large scale businesses. Securing these applications is becoming increasingly important as they hold critical security features and intellectual property.

This presentation will cover techniques designed to penetrate and subvert protected .NET Applications at Runtime. Such techniques will access running .NET programs to takeover the Live Object Structure and allow it to be directly traversed, modified, and subverted. This in turn makes the core logic malleable. I will demonstrate infecting software and implement changes to facilitate reverse engineering, software analysis, malware research, third-party patches, and much more.

This vector of attack is for the most part completely unstoppable on owned systems. Compiled program protections such as Wrappers, Encryption Shells, Obfuscation, Anti-Debugging... all do nothing to stop this type of attack, they can only slow it.

These techniques are carried out using core features in the .NET Framework, so no crazy ASM magic or obscure soon to be fixed API is used. If you are a .NET programmer and did not think you would make hacks under a managed world, this is your chance to brake-out and learn how to produce hard core attacks.

-

DefCon 18 - Hacking .Net Applications at Runtime: A Dynamic Attack

What do you do when you get inside of a .Net program? This presentation will demonstrate taking full advantage of the .Net world from the inside. Once inside of a program don't just put in a key-logger, remold it! I will presentation a how to infiltrate, evaluate, subvert, combine, and edit .Net applications at Runtime. The techniques demonstrated will focus on the modification of core logic in protected .Net programs.

This will make almost every aspect of a target program susceptible to evaluation and change; and allow such hacks as the ability to intermix your favorite applications into a new Frankenstein App, compromise program level security, reverse engineer from memory, modify events, edit the GUI, hunt malware, get the code behind a button, and/or subvert program locks. Demo implementation and tools will be released.

The coding techniques presented will be applicable well beyond compromising the security of a running program. These techniques will grant programmers a new level of access and control over any .Net code, as well as granting the ability to use and integrate with most any .Net application. Creating a development path to test and build 3rd party patches within .Net.

-

DoJoCon 2010 - Hacking .Net Applications at Runtime: Ninja Patching

Hacking at the DoJoCon

ToorCon 13 - Hacking .Net(C#) Applications: The Black Arts

This presentation will cover the Black Arts of making Cracks, KeyGens, Malware, and more. The information in this presentation will allow a .NET programmer to do unspeakable things .NET applications. I will cover the life cycle of developing such attacks and over coming common countermeasures to stop such attacks. New tools to assist in the attacks will be supplied. This presentation will focus on C# but applies to any application based on the .NET framework.

-

ToorCon 13 - Hacking .Net(C#) Applications: Breaking Obfuscation

Johannes Doring & Jon McCoy

This presentation will focus on Deobfuscator technology targeted at Reverse Engineering protected .NET binaries.
Developers and businesses try to protect their source code and intellectual property from Decompilation, the first line of protection they commonly use is Obfuscators. The talk will cover the features of a popular Obfuscator and show how each step of Obfuscation is implemented and subsequently subverted. This will increase the usability and effectiveness of Decompilers used by both White and Black Hat Reverse Engineers and Developers.

Free Tools to Decompile and Deobfuscate compiled .NET applications will be released.

-

   
 

Copyright 2012 DigitalBodyGuard All Rights Reserved.

the best defence is a good sniper