BSides 2018 presentation.
In this article we are going to talk about the following WDEG features: Code Integrity Guard, Arbitrary Code Guard and "Do not allow child processes" policy.
In this article we are going to look at Control Flow Guards, how they work and what are the common weakenses.
In this article we will learn how DEP works and what are the most common exploitation techniques to bypass it.
In this article, we are going to review ASLR, Mandatory ASLR, and Bottom Up/High-entropy ASLR.
In this article we are going to discuss what is SEHOP, how it is related to SafeSEH and what is its role in exploitation.
Meet me at BSides in San Diego on June 9th, 2018 to learn more about exploitation and exploit mitigation techniques available in Windows Defender Exploit Guard.
Stay up to date! Get all the latest & greatest posts delivered straight to your inbox