Sun Bing: Software Virtualization Based Rootkits

09/01/2006 1h 10min

Listen "Sun Bing: Software Virtualization Based Rootkits"

Episode Synopsis

"This paper will show a extremely simple technique tquickly audit a software product in order tinfer how trustable and secure it is. I will show you step by step how tidentify half dozen of local 0day vulnerabilities in few minutes just making a couple of clicks on very easy tuse free tools, then for the technical guys enjoyment the vulnerabilities will be easily pointed out on disassembled code and detailed, finally a 0day exploit for one of the vulnerabilities will be demonstrated and explained.
While this technique can be applied tany software in this case I will take a look at the latest version of Oracle Database Server: 10gR2 for Windows, which is a extremely secure product sit will be a very difficult challenge tfind vulnerabilities since Oracle is using advanced next generation tools tidentify and fix vulnerabilities." Sun Bing is the Research Scientist at McAfee (China) currently, and has held security related positions at several famous companies heretofore, such as Rising and Siemens. SUN BING has more than 6 years of experience in Windows Kernel and Security Techniques (Anti-Virus, Firewall, IPS etc) research development, especially with deeply delving intBuffer Overflow Prevention, Rootkit Detection and x86 Virtualization. His main works previously involve participating in Rising Anti-Virus Softwares development, publishing the paper (The Design Of Anti-Virus Engine) at xfocus, taking charge of the design and development of a desktop security product-LinkTrust IntraSec, and speaking at security conferences such as XCON2006 and POC2006...

More episodes of the podcast Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.