Multiplatform malware within the .NET-Framework

Presented at DEF CON 15 (2007), Aug. 4, 2007, 10 a.m. (50 minutes).

Multiplatform Malware - many of us have heard that term. Discussions on this matter arose a few month ago and they didn't cease yet. But while many people have taken interest in this matter there still isn't much of a common sense around. The time has come to change this! In this speech you will learn about: a) The current status of multiplatform malware. b) The possibilities multiplatform malware opens up for an attacker. c) Different kinds of multiplatform malware. d) How to easily implement multiplatform malware using runtime frameworks You will also see a live demonstration of multiplatform malware while it's in action hopping between multiple operating systems with ease. Multiplatform malware is here to stay. And it will be a blast to computer security once it starts to strike. Many systems we presently consider "secure" will be broken, many basic concepts of security will be circumvented. If we don't want to be on lost stands as defenders once that happens - or if we want to ride the wave as attackers - we'll have to act now. Let's create the common sense the community has long waited for! Let's discover what is possible and where fiction starts! Let's all make this fairly new technique blossom or explode - whichever you prefer.


Presenters:

  • Paul Sebastian Ziegler
    Paul Sebastian Ziegler: Paul is an autodidact. You can easily tell since he sometimes messes up the pronunciation of technical terms - whitepapers in leetspeak simply don't contain phonetic spellings very often. His mind is just as chaotic with a lot of ideas, concepts and terms lying around and links between them wildly spreading like weeds. This constellation often leads to strange gasps of reality and also of computer security. And as always - "strange" is just another term for "new" and "unusual". Being a freelancer brings Paul time to write articles (hakin9) and books (O'Reilly), but pentesting and system administration take up most of his time. During free time he enjoys geeking out (e.g. turning record players into voice-controlled wireless mp3-music-stations), programming and swordplay. Also friends tend to keep him distracted a lot. Paul believes that real security can only come from broad knowledge and that security through obscurity is doomed to failure. Due to this basic assumption most of his research is dedicated to breaking security mechanisms and discovering new attack vectors to raise public awareness - - be it by analyzing wireless frames, messing with people's minds or pushing the topic of multiplatform malware.
  • Tatsumori

Links:

Similar Presentations: