Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Viewing all articles
Browse latest Browse all 12749

Now On Stage! Deep Hooks: Monitoring Native Execution In WOW64 Applications

$
0
0

Four months ago we published a 3-part series of blog posts, presenting a research carried out by two of our researchers: Yarden Shafir and Assaf Carlsbad. The research introduced a new way of monitoring parts of WoW64 processes that are usually ignored by security products. This blindspot often leads to exploitation by sophisticated pieces of malware. The technique presented in theresearch can be used to better monitor WoW64 processes, making detection harder to bypass.The research is the basis for some new SentinelOne detection capabilities, for example detecting the notorious “ Heaven ‘s Gate” bypass technique.

As a reminder, here are the links to this series of blog posts:

Part 1 Part 2 Part 3
Now On Stage! Deep Hooks: Monitoring Native Execution In WOW64 Applications

Following its publication, the research drew a lot of interest from the community. The researchers were invited to various cyber security conferences to share their insights.

For those of you who are intrigued by WOW64 applications and how to protect them, here is their talk from BSidesTLV. You can also meet them on August 30, at the HITB GSEC 2018 Conference.

Like this article? Follow us on LinkedIn , Twitter , YouTube or Facebook to see the content we post.

Want to see how SentinelOne can help improve your security? Get a Demo Now


Viewing all articles
Browse latest Browse all 12749

Trending Articles