Description: https://www.defcon.org/images/defcon-18/dc-18-presentations/McCoy/DEFCON-18-McCoy-MonkeyPatch.pdf
https://www.defcon.org/images/defcon-18/dc-18-presentations/McCoy/DEFCON-18-McCoy-MonkeyPatch-WP.pdf
https://www.defcon.org/images/defcon-18/dc-18-presentations/McCoy/Extras/Extras.zip
What do you do when you get inside of a .Net program? This presentation will demonstrate taking full advantage of the .Net world from the inside. Once inside of a program don't just put in a key-logger, remold it! I will presentation a how to infiltrate, evaluate, subvert, combine, and edit .Net applications at Runtime. The techniques demonstrated will focus on the modification of core logic in protected .Net programs. This will make almost every aspect of a target program susceptible to evaluation and change; and allow such hacks as the ability to intermix your favorite applications into a new Frankenstein App, compromise program level security, reverse engineer from memory, modify events, edit the GUI, hunt malware, get the code behind a button, and/or subvert program locks. Demo implementation and tools will be released. The coding techniques presented will be applicable well beyond compromising the security of a running program. These techniques will grant programmers a new level of access and control over any .Net code, as well as granting the ability to use and integrate with most any .Net application. Creating a development path to test and build 3rd party patches within .Net.
Tags: securitytube , defcon , def con , hacking , hackers , information security , convention , computer security , DC 18 , defcon-18 , dc-18 ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.