Syscall proxying fun and applications (22c3)
Item
-
Title
-
Syscall proxying fun and applications (22c3)
-
Description
-
This talk is about how using syscall proxying technique for envolved attacks or other distributed applications. It includes source code examples like shellcodes, tools and a poc rootkit using this technique. This talk will be submited first at 0sec, a private security event we organize in switzerland in october.
about this event: https://hacker-archive.org/assets/22C3/fahrplan/events/553.en.html
-
originalMediaLink
-
https://cdn.media.ccc.de/congress/2005/lectures/video/mp4-avc/320x240/22C3-553-en-syscall_proxying.m4v
-
Abstract
-
This talk is about how using syscall proxying technique for envolved attacks or other distributed applications. It includes source code examples like shellcodes, tools and a poc rootkit using this technique. This talk will be submited first at 0sec, a private security event we organize in switzerland in october.
about this event: https://hacker-archive.org/assets/22C3/fahrplan/events/553.en.html