Jasmine Rice
Jasmine Rice
  • Видео 47
  • Просмотров 75 022
Code Auditing Discussion
Code Auditing Discussion
Просмотров: 490

Видео

Windows Internals
Просмотров 71 тыс.7 лет назад
Windows Internals
The Future of Intelligence: Changing Threats, Evolving Methods
Просмотров 517 лет назад
The Future of Intelligence: Changing Threats, Evolving Methods
Intro to ROP (part 4)
Просмотров 1137 лет назад
Intro to ROP (part 4)
Intro to ROP (part 5)
Просмотров 537 лет назад
Intro to ROP (part 5)
Intro to ROP (part 6)
Просмотров 437 лет назад
Intro to ROP (part 6)
Intro to Rop (part 3)
Просмотров 547 лет назад
Intro to Rop (part 3)
Intro to ROP (part 2)
Просмотров 1297 лет назад
Part 2 of a training I took.
Intro to ROP (part 1)
Просмотров 4987 лет назад
Part 1. This is from a training I took. The vulnerability is an arbitrary write by a format string.
recon2015 21 j00ru One font vulnerability to rule them all
Просмотров 247 лет назад
recon2015 21 j00ru One font vulnerability to rule them all
recon2015 20 steven vittitoe Reverse Engineering Windows AFD sys
Просмотров 877 лет назад
recon2015 20 steven vittitoe Reverse Engineering Windows AFD sys
recon2015 19 mike ryan john mcmaster marshallh Reversing the Nintendo 64 CIC
Просмотров 1377 лет назад
recon2015 19 mike ryan john mcmaster marshallh Reversing the Nintendo 64 CIC
recon2015 18 andrew zonenberg From Silicon to Compiler
Просмотров 237 лет назад
recon2015 18 andrew zonenberg From Silicon to Compiler
recon2015 17 nitay artenstein shift reduce Pandora s Cash Box The Ghost Under Your POS
Просмотров 227 лет назад
recon2015 17 nitay artenstein shift reduce Pandora s Cash Box The Ghost Under Your POS
recon2015 16 yong chuan koh Understaning the Microsoft Office Protected View Sandbox
Просмотров 607 лет назад
recon2015 16 yong chuan koh Understaning the Microsoft Office Protected View Sandbox
recon2015 12 alex ionescu Hooking Nirvana
Просмотров 367 лет назад
recon2015 12 alex ionescu Hooking Nirvana
recon2015 14 christopher domas The movfuscator
Просмотров 2197 лет назад
recon2015 14 christopher domas The movfuscator
recon2015 10 yaniv balmas 0x3E9 Ways to DIE
Просмотров 137 лет назад
recon2015 10 yaniv balmas 0x3E9 Ways to DIE
recon2015 09 yuriy bulygin oleksandr bazhaniuk Attacking and Defending BIOS in 2015
Просмотров 337 лет назад
recon2015 09 yuriy bulygin oleksandr bazhaniuk Attacking and Defending BIOS in 2015
recon2015 13 colin o flynn Glitching and Side Channel Analysis for All
Просмотров 387 лет назад
recon2015 13 colin o flynn Glitching and Side Channel Analysis for All
recon2015 05 peter hlavaty jihui lu This Time Font hunt you down in 4 bytes
Просмотров 137 лет назад
recon2015 05 peter hlavaty jihui lu This Time Font hunt you down in 4 bytes
recon2015 07 travis goodspeed sergey bratus Polyglots and Chimeras in Digital Radio Modes
Просмотров 257 лет назад
recon2015 07 travis goodspeed sergey bratus Polyglots and Chimeras in Digital Radio Modes
recon2015 06 sophia d antoine Exploiting Out of Order Execution
Просмотров 657 лет назад
recon2015 06 sophia d antoine Exploiting Out of Order Execution
recon2015 04 jeffrey crowell julien voisin Radare2 building a new IDA
Просмотров 327 лет назад
recon2015 04 jeffrey crowell julien voisin Radare2 building a new IDA
recon2015 02 brian gorenc simon zuckerbraun abdul aziz hariri Abusing Silent Mitigations
Просмотров 137 лет назад
recon2015 02 brian gorenc simon zuckerbraun abdul aziz hariri Abusing Silent Mitigations
recon2015 03 exide Finish Him
Просмотров 197 лет назад
recon2015 03 exide Finish Him
recon2015 01 joan calvet marion marschalek paul rascagneres Totally Spies
Просмотров 507 лет назад
recon2015 01 joan calvet marion marschalek paul rascagneres Totally Spies
recon2016 21 richard johnson Go Speed Tracer
Просмотров 167 лет назад
recon2016 21 richard johnson Go Speed Tracer
recon2016 20 julian kirsch clemens jonischkeit Movfuscator Be Gone
Просмотров 277 лет назад
recon2016 20 julian kirsch clemens jonischkeit Movfuscator Be Gone
recon2016 19 alex ionescu Abusing the NT Kernel Shim Engine
Просмотров 517 лет назад
recon2016 19 alex ionescu Abusing the NT Kernel Shim Engine

Комментарии

  • @harryshuman9637
    @harryshuman9637 5 месяцев назад

    1:15:24 the dude falls asleep after listening to Windows Internals for an hour.... I know that feeling.

  • @SupportCyberkalki
    @SupportCyberkalki 5 месяцев назад

    Very insightful as per security perspectrive.. well done @jasmine rice !

  • @hericpan5442
    @hericpan5442 7 месяцев назад

    Thanks for sharing!

  • @KabelkowyJoe
    @KabelkowyJoe 11 месяцев назад

    Potentially not bad presentation but the only way to listen is 1.5x original speed, still painfull "um um um" omg 52:00 defined in PATH by user, nothing said about protection UAC etc, system\drivers directory, services, syswo64 (32 bit dll) and system32 directory (64 bit dlls) lot about slashes backslashes.. sorry but its waste of time

  • @mafazabrar4349
    @mafazabrar4349 Год назад

    love this!

  • @Hade-hw6vl
    @Hade-hw6vl Год назад

    6 years from now, the content concept is still relevant. Great presentation, thanks a lot!

  • @user-zf8mp7ld8j
    @user-zf8mp7ld8j Год назад

    Саня, можно было и на русском) Зачем выпендриваться

  • @P0r0609
    @P0r0609 Год назад

    what should i have prior knowledge of before watching this video, cz i did not fully understand and i am a new student(first year ) but i do look to know what should i learn before jumping into windows architecture

  • @-dash
    @-dash Год назад

    Alternate Data Streams are fascinating! I wonder what some legitimate use cases are for them

    • @JakeHambyZ80
      @JakeHambyZ80 10 месяцев назад

      In the 1990s, when Microsoft was designing NTFS, the major use case for alternate data streams was so that Services for Macintosh (SFM), Microsoft's early AppleTalk server implementation, could store Mac file resource forks and data forks together. In this century, it's easy to forget that classic Mac OS had an interop problem where its files, especially executable programs, had multiple data streams that had to be handled when saving Mac files on other systems. That's what MacBinary and BinHex encodings dealt with. BTW, SMB servers including Samba to this day recognize a filename mapping that Microsoft came up with for SFM so that it could encode filename characters that were legal on Macs but illegal on Windows, like "?", "/", etc. using vendor-specific Unicode sequences (NTFS and NT in general use UTF-16 everywhere, including filenames). Apple has similarly extended the SMB protocol in recent years in their client and server to handle macOS-specific filesystem metadata like Finder window position (which otherwise goes into ".DS_Store" files that the client creates) and Spotlight searching / Time Machine backup / etc..

  • @frieden6298
    @frieden6298 2 года назад

    8:54 I couldn't quite catch the name of the case that he mentioned which caused the release of several Native API documentations. Does anyone know that case?

  • @raymondshawn3864
    @raymondshawn3864 2 года назад

    Impressive

  • @TNothingFree
    @TNothingFree 2 года назад

    A bit mundane but with good explanation. Thanks!

  • @duckie4670
    @duckie4670 2 года назад

    thank for this content :D

  • @Konym
    @Konym 2 года назад

    This video taught me a lot about the NT Kernel Interface and I am grateful for that. Despite that, certain people will always find ways to be jackasses about it in the comment section. You do you, Mr. Sotirov, and thank you for the knowledge.

  • @furmankhann
    @furmankhann 3 года назад

    The fluctuations in voice making uncomfortable 😣

  • @bds1092
    @bds1092 3 года назад

    MyProgressTime 8:00

  • @googleuser4720
    @googleuser4720 3 года назад

    I was hoping this would be about the Windows 9x kernel

  • @jp19962
    @jp19962 3 года назад

    Great talk! One clarification for confusion at 1:11:05 It's file.txt::$DATA (2 colons) and file.txt:$FOO (1 colon) Also, command "type" will not read it, notepad.exe will.

  • @PhysicsMath
    @PhysicsMath 3 года назад

    Python program install by dafault user/vendor/appdata/.. which doesn't required any special permission . Interfer with doesn't required any special permission

  • @aardvarrock9657
    @aardvarrock9657 3 года назад

    Is the content of this talk still relevant today, particularly in regards to security?

  • @harshal458
    @harshal458 3 года назад

    I expected some Memory Management and other operating functionalities because of the title of the video, this was more of security related stuff, how windows can be vulnerable through different mediums, Nevermind, Got to learn something new.

    • @adnank4458
      @adnank4458 3 года назад

      thanks for your review

  • @fulliculli
    @fulliculli 3 года назад

    You need to breathe man.

  • @10hourslooney25
    @10hourslooney25 4 года назад

    "Focus" Pronounced: Fow-kus Not: Fockus

  • @askhowiknow5527
    @askhowiknow5527 4 года назад

    What inbred thought I would want to load the DLL from the same folder as some random shortcut? Welcome to Windows NT. Population: misguided clusterf***

  • @aatirsaadain6431
    @aatirsaadain6431 4 года назад

    Windows Rocks

  • @phagyauto160
    @phagyauto160 4 года назад

    It's like he's not breathing while talking.

  • @aperture147
    @aperture147 4 года назад

    Windows is not bad, it's just too different from UNIX and costly to experience.

  • @payloadartist
    @payloadartist 5 лет назад

    Thanks a lot @Jasmine Rice for sharing this, this is simply amazing. Always love Sotirov's presentations!

  • @gareginasatryan6761
    @gareginasatryan6761 5 лет назад

    The linux kernel’s userspace interface is not stable. He’s confusing glibc and the kernel. Which btw is also not stable between versions.

    •  10 месяцев назад

      Uapi is fairly stable. Linus especially said very often: Don't break the userspace.

  • @pauldzim
    @pauldzim 5 лет назад

    He's using an overhead projector! Was this recorded in the 90's?

    • @nirv
      @nirv 2 года назад

      Looking at the laptops and video quality, I'd guess 2013-2017.

  • @fredxu9826
    @fredxu9826 5 лет назад

    Anything wrong with the throat? Just wondering

  • @KeithMakank3
    @KeithMakank3 5 лет назад

    12:25 this is impressive, but Linux was always designed to not only allow easy cross compilation between architectures so they can "use each others code", but is always inherently designed to run on anything. Windows OS internals is just slow experiments in realizing the Linux people know their shit better.

    • @deepakfrenzy
      @deepakfrenzy 4 года назад

      Keith Makan lol

    • @boywithacoin
      @boywithacoin 2 года назад

      windows OS internals are bloated asf. Even their compiler MSVC is bloated.

  • @KeithMakank3
    @KeithMakank3 5 лет назад

    12:30 its functions are not as easy to use? WTF does that mean? its code, you call the code because it does a thing. OR we don't know what it does and we are not allowed to know, or make it simpler to know.

    • @MrEnsiferum77
      @MrEnsiferum77 4 года назад

      it's embedded stub asm code which makes transition to ring 0, in nutshell is reference to dispatcher table in the kernel part of the memory. it's something that change quite often, and in wndows 10 is again changed.

    • @GANDHIXtv
      @GANDHIXtv Год назад

      More parameters basically. For example, you may need to send some handle or other structs as parameters, which may require you to call other API functions to get.

  • @KeithMakank3
    @KeithMakank3 5 лет назад

    11:45 why is NTDLL not documented? Because MS is dumb and doesn't realize the value of documentation - that's why.

    • @meenakshinidhi6202
      @meenakshinidhi6202 5 лет назад

      Keith Makan MS is not dumb actually MS wants stupids to know basics first. But if you are intelligent like Mark Russinowich then go and read his book that is System Internals or read MSDN articles of you know how to access the information provided on iternet.

    • @MrEnsiferum77
      @MrEnsiferum77 4 года назад

      why windows does not document ntdll, or other api calls, because they change often, from one version to another. in win10, the transition from ring 3 to ring 0 in ntdll.dll is changed again by windows.

  • @k31058
    @k31058 6 лет назад

    This video is very interesting! I tried in command prompt (Win10), the syntax should be: - To save to data stream with customized name: "type C:\Windows otepad.exe > D:\1.txt:test" (single colon) - To save in default data stream: "type C:\Windows otepad.exe > D:\1.txt::$DATA" (double colon) :)

  • @sent4dc
    @sent4dc 6 лет назад

    I don't think it was recorded in 2017. It's a pretty old but good stuff. I also wish that lecturers like that besides pointing out the bad ways of doing things immediately followed up with a good example of how its recommended to do things. Otherwise everyone gets scared by a bad example but don't learn the good way.

  • @victortarnovskiy8407
    @victortarnovskiy8407 6 лет назад

    Great talk, thanks so much!

  • @nagorik24
    @nagorik24 6 лет назад

    Thnx :)