Star 0

Abstract

Offensive tactics against executable code have traditionally been measured in repeatable predictable steps. This is suitable for an attack against a single processes, thread, or kernel function path. As exploitation evolves, so must our methodologies. Today’s offensive tactics are getting more robust. However, we are seeing very few attacks against moving targets in computer systems. In this presentation, the speaker intends to demonstrate the technical strategies for building attacks based on causality; or, the ability for one action to affect one or more known or unknown objects. Also, I may prank call Bryan Cranston just to be a dick.