Syscall proxying fun and applications (22c3)

Item

Title
Syscall proxying fun and applications (22c3)
Description
This talk is about how using syscall proxying technique for envolved attacks or other distributed applications. It includes source code examples like shellcodes, tools and a poc rootkit using this technique. This talk will be submited first at 0sec, a private security event we organize in switzerland in october.

about this event: https://hacker-archive.org/assets/22C3/fahrplan/events/553.en.html
originalMediaLink
https://cdn.media.ccc.de/congress/2005/lectures/video/mp4-avc/320x240/22C3-553-en-syscall_proxying.m4v
Beteiligte Person
csk
Extent
00:49:13
Type
video/mp4
Abstract
This talk is about how using syscall proxying technique for envolved attacks or other distributed applications. It includes source code examples like shellcodes, tools and a poc rootkit using this technique. This talk will be submited first at 0sec, a private security event we organize in switzerland in october.

about this event: https://hacker-archive.org/assets/22C3/fahrplan/events/553.en.html