Kapsch BusinessCom. When your Anti-Virus turns against you Are you frightened already?
|
|
- Brent Grant
- 5 years ago
- Views:
Transcription
1 Kapsch BusinessCom When your Anti-Virus turns against you Are you frightened already?
2 Florian Bogner Who Am I Information Security Auditor Speaker and Trainer Bug Bounty Hunter Vulnerabilities identified in When your Anti-Virus turns against you 2
3 When your Anti-Virus turns against you 3
4 When your Anti-Virus turns against you 4
5 When your Anti-Virus turns against you 5
6 When your Anti-Virus turns against you 6
7 When your Anti-Virus turns against you 7
8 When your Anti-Virus turns against you 8
9 When your Anti-Virus turns against you TODAY: Getting Local Admin by Abusing the Anti-Virus Quarantine When your Anti-Virus turns against you 9
10 When your Anti-Virus turns against you The Basics Unprivileged User SYSTEM User Interface System State Virus Warning Settings... talks to Windows Service File Access / Scanning Virus Quarantine Updating... User Mode Kernel Mode Kernel Component Remediation (f.e. Process killing) Kernel API Hooking Rootkit Detection When your Anti-Virus turns against you 10
11 When your Anti-Virus turns against you The Basics AV Scanning Engine AV Quarantine Files When your Anti-Virus turns against you 11
12 When your Anti-Virus turns against you The Basics AV Scanning Engine AV Quarantine Files When your Anti-Virus turns against you 12
13 When your Anti-Virus turns against you The Basics AV Scanning Engine manipulates AV Quarantine Files Local Attacker When your Anti-Virus turns against you 13
14 When your Anti-Virus turns against you The Basics AV Scanning Engine manipulates AV Quarantine Files Local Attacker When your Anti-Virus turns against you 14
15 #AVGater // Local Privilege Escalation When your Anti-Virus turns against you 15
16 I ll show you!
17 Summary Emsisoft Anyone can add files to AV quarantine Directory Junctions can then be used to redirect original source path to something else: While restoring the file the permissions of the Windows service are used: Privileged File Write Vulnerability On next reboot: Malicious DLL is loaded by AV Scanning engine. Results in Code Execution as System Local Privilege Escalation: Non-Admin User SYSTEM When your Anti-Virus turns against you 17
18 #AVGater // Local Privilege Escalation When your Anti-Virus turns against you 18
19 I ll show you!
20 Summary Malwarebytes Files can not be added manually to the Quarantine However, there is a race condition between detection and remediation of threats Hence, the file that is placed into the Quarantine can be manipulated! Again, while restoring the file the permissions of the Windows service are used: Privileged File Write Vulnerability On next reboot: Malicious DLL is loaded by AV Scanning engine. Results in Code Execution as System Local Privilege Escalation: Non-Admin User SYSTEM When your Anti-Virus turns against you 20
21 #AVGater // Local Privilege Escalation When your Anti-Virus turns against you 21
22 I ll show you!
23 Summary Kaspersky Files can not be added manually to the Quarantine There is no race condition between detection and remediation. However, the payload file itself can be made malicious. THIS CAN NOT BE FIXED! Hence, it is quarantined! Again, while restoring the file the permissions of the Windows service are used: Privileged File Write Vulnerability Although it s not easily possible to inject DLLs into the AV Scanning engine it can be crashed! (DoS) For Code Execution any other service can be used. Local Privilege Escalation: Non-Admin User SYSTEM When your Anti-Virus turns against you 23
24 #AVGater Summary Getting Local Admin by Abusing the Anti-Virus Quarantine Malicious File 1 Anti-Virus moves file to quarantine Virus Quarantine 2 Attacker manipulates Restore process, so that the file can be placed to any filesystem location Scanning Engine Local Non-Admin Attacker Code Execution as SYSTEM 3 Because of the new filesystem location, the malicious file is loaded by another process, which in turn executes the payload (e.f. DLL Sideloading) Restored File When your Anti-Virus turns against you 24
25 Visit When your Anti-Virus turns against you 25
26 We want you! When your Anti-Virus turns against you 26
27 Vielen Dank für Ihre Aufmerksamkeit. Florian Bogner Information Security Auditor Kapsch BusinessCom AG Kapsch BusinessCom AG Wienerbergstraße Wien, Österreich Phone: Hinweis: Der Inhalt dieser Präsentation ist geistiges Eigentum der Kapsch AG. Alle Rechte hinsichtlich des Kopierens, der Vervielfältigung, Änderung, Nutzung, Veröffentlichung oder Weitergabe des Inhalts an Dritte bleiben vorbehalten. Vorgenanntes ist ohne vorausgehende schriftliche Genehmigung der Kapsch AG ausdrücklich untersagt. Bei Produkt- und Firmennamen kann es sich um eingetragene Markennamen oder geschützte Marken Dritter handeln. Diese werden in der Präsentation lediglich zum Zweck der Verdeutlichung und zum Vorteil des jeweiligen rechtmäßigen Eigentümers ohne eine Absicht der Verletzung der Eigentumsrechte verwendet.
What s New? SAP HANA SPS 07 SAP HANA tailored data center integration. SAP HANA Product Management November, 2013
What s New? SAP HANA SPS 07 SAP HANA tailored data center integration SAP HANA Product Management November, 2013 Content This presentation provides an overview of the additional deployment option called
More informationWhat s New? SAP HANA SPS 07 Fuzzy Search (Delta from SPS 06 to SPS 07) SAP HANA Product Management November, 2013
What s New? SAP HANA SPS 07 Fuzzy Search (Delta from SPS 06 to SPS 07) SAP HANA Product Management November, 2013 Scope The scope of the extended development topic SAP HANA Fuzzy Search covers Fault-tolerant
More informationModem for SITRANS TK 7NG3190-6KB C79000-B7174-C14 SIEMENS SITRANS TK COM 1 MODEM
Modem for SITRANS TK 7NG3190-6KB I ns t r uct i o n M a nua l SIEMENS 2 SITRANS TK MODEM COM 1 C79000-B7174-C14 SITRANS und SIPROM sind eingetragene Warenzeichen der Siemens AG. Die übrigen Bezeichnungen
More informationWhat s New? SAP HANA SPS 07 SAP HANA Platform Lifecycle Management (Delta from SPS 06 to SPS 07) SAP HANA Product Management November, 2013
What s New? SAP HANA SPS 07 SAP HANA Platform Lifecycle Management (Delta from SPS 06 to SPS 07) SAP HANA Product Management November, 2013 Agenda Overview SAP HANA lifecycle management tools offerings
More informationSAP HANA Revision Strategy. SAP HANA Product Management May 2014
SAP HANA Revision Strategy SAP HANA Product Management May 2014 Table of Contents SAP HANA Revision Understand the difference between Support Package Stack, Support Packages and Revisions SAP HANA Release
More informationWhat s New? SAP HANA SPS 07 Administration & Monitoring (Delta from SPS 06 to SPS 07) SAP HANA Product Management November, 2013
What s New? SAP HANA SPS 07 Administration & Monitoring (Delta from SPS 06 to SPS 07) SAP HANA Product Management November, 2013 Content This presentation provides an overview of the changes regarding
More informationSAP Automation GUI Code Generator (BC-FES-AIT)
SAP Automation GUI Code Generator (BCFESAIT) HELP.BCFESDEB Release 4.6C SAP Automation GUI Code Generator (BCFESAIT) SAP AG Copyright Copyright 2001 SAP AG. Alle Rechte vorbehalten. Weitergabe und Vervielfältigung
More informationIntroduction to Data Archiving
Introduction to Data Archiving Georg Fischer, Product Manager PDMS SAP AG This presentation outlines our general product direction and should not be relied on in making a purchase decision. This presentation
More informationWhat s New? SAP HANA SPS 07 Security (Delta from SPS 06 to SPS 07) SAP HANA Product Management November, 2013
What s New? SAP HANA SPS 07 Security (Delta from SPS 06 to SPS 07) SAP HANA Product Management November, 2013 Agenda Authentication User/role management Authorization Encryption Audit logging Documentation
More informationOracle LogMiner (10g)
Oracle LogMiner (10g) Introduction and Case Studies Martin Frauendorfer, SAP Active Global Support martin.frauendorfer@sap.com 2008 Agenda 1. Introduction 2. Case Study 1: ORA-08103 Problem 3. Case Study
More informationSAP NetWeaver IT Scenario Overview <insert scenario name>
SAP NetWeaver IT Scenario Overview Using Room Extensions SAP NetWeaver Product Management Introduction to Room Extensions Mapping Plan Example How to develop an Extension Value Set
More informationSAP Exchange Infrastructure - Graphical Mapping
SAP Exchange Infrastructure - Graphical Mapping Joachim Orb SAP AG Thomas Volmering SAP AG Learning Objectives As a result of this workshop, you will be able to: Handle the graphical mapping editor Use
More informationEnhanced Change and Transport System (CTS+) in a SAP NetWeaver Portal landscape. January 2008
Enhanced Change and Transport System (CTS+) in a SAP NetWeaver Portal landscape January 2008 1 Agenda 1. Transports in the Portal 2. What is CTS+ 3. Transports in the Portal with CTS+ SAP 2007 / Page 2
More informationRFC C++ Class Library (BC-FES-AIT)
RFC C++ Class Library (BC-FES-AIT) HELP.BCFESDEA Release 4.6C SAP AG Copyright Copyright 2001 SAP AG. Alle Rechte vorbehalten. Weitergabe und Vervielfältigung dieser Publikation oder von Teilen daraus
More informationRounding Specification. Globalization Product Management Japan / SAP Japan November 27 th, 2012
Rounding Specification Globalization Product Management Japan / SAP Japan November 27 th, 2012 Disclaimer This message outlines our general product direction and should not be relied on in making a purchase
More informationInstallation Instructions Valid for EPLAN Platform Version 2.6 Status: 07 / 2016
Installation Instructions Valid for EPLAN Platform Version 2.6 Status: 07 / 2016 EPLAN Software & Service GmbH & Co. KG Technical Information Copyright 2016 EPLAN Software & Service GmbH & Co. KG EPLAN
More informationAdobe Forms Integration in SAP Web AS Marc Chan Sr. NetWeaver Consultant NetWeaver RIG US
Adobe Forms Integration in SAP Web AS 6.40 Marc Chan Sr. NetWeaver Consultant NetWeaver RIG US Agenda Scenario Overview Technical Architecture and Demo SAP AG 2004, Adobe Forms Integration with Web AS
More informationOverview on POWER List concept Designing new POWER Lists Implementing new POWER Lists. SAP AG 2007, SAP All-in-One: UE Workshop 1 JJ 2007
POWER Lists (Part I) Contents: Overview on POWER List concept Designing new POWER Lists Implementing new POWER Lists SAP AG 2007, SAP All-in-One: UE Workshop 1 The topic of POWER Lists is divided into
More informationMerging Artist systems. For Artist S, M, 32, 64, 128
Merging Artist systems For Artist S, M, 32, 64, 128 Document reference 3.2 S. Franke 10/2012 2012 Riedel Communications GmbH & Co KG. Alle Rechte vorbehalten. Dieses Handbuch ist urheberrechtlich geschützt.
More informationSpektroskopiesoftware
Spektroskopiesoftware OPUS-ROUTINE for OPUS/IR (Version 3) 08/2000 1991-2000 BRUKER ANALYTISCHE MESSTECHNIK GMBH Text, Abbildungen und Programme wurden mit größter Sorgfalt erarbeitet. Wir können jedoch
More informationTips & Tricks for FOX Formulas in BW-BPS
SAP NetWeaver Know-How Network Conference Call Tips & Tricks for FOX Formulas in BW-BPS Marc F. Bernard Platinum Consultant SAP NetWeaver RIG Americas SAP Labs, LLC Thursday, March 10, 2005 Learning Objectives
More informationThe SAP Transaction Model: Know Your Applications
The SAP Transaction Model: Know Your Applications SYSTEMATIC THOUGHT LEADERSHIP FOR INNOVATIVE BUSINESS Shel Finkelstein, Rainer Brendle, Dean Jacobs, Manfred Hirsch and Ulrich Marquard SAP Labs {firstname.lastname}@sap.com
More informationSEO Editorial Guidelines , Aperto
SEO Editorial Guidelines 02.12.2016, Aperto Agenda I= For Info 1 General Information on Keyword Placement I 2 Keyword Placement in Meta Information and URL I 3 Headings I 4 Content I 5 Images and Videos
More informationSAP NetWeaver 7.0: ETL and EII
SAP NetWeaver 7.0: ETL and EII Overview Product Management SAP NetWeaver BI November 2007 Agenda 1. Overview 2. ETL 2.1. Extraction 2.2. Transformation 2.3. Data Distribution 2.4. Real-Time Data Acquisition
More informationHow To Remove Personal Antivirus Security Pro Virus Windows 8
How To Remove Personal Antivirus Security Pro Virus Windows 8 When hackers break into government servers to steal your personal data, there's As for just relying on the antivirus built into Windows 8.x,
More informationDevelopment of an Object Oriented Data Model ADDAM for Applications in Aircraft Design
Development of an Object Oriented Data Model ADDAM for Applications in Aircraft Design MATLAB EXPO 2014 9 th July, Munich Fellow of Munich Aerospace e.v. Research Associate, Technical University of Munich
More informationIDoc Class Library (BC-FES-AIT)
IDoc Class Library (BC-FES-AIT) HELP.BCFESDED Release 4.6C SAP AG Copyright Copyright 2001 SAP AG. Alle Rechte vorbehalten. Weitergabe und Vervielfältigung dieser Publikation oder von Teilen daraus sind,
More informationRN.341 MY Interface Card. User Guide
RN.341 MY Interface Card User Guide 2009 Riedel Communications GmbH. Alle Rechte vorbehalten. Dieses Handbuch ist urheberrechtlich geschützt. Das Kopieren, Vervielfältigen, Übersetzen oder Umsetzen in
More informationKIM.
KIM www.kim-forum.org KIM Competence Center for Interoperable Metadata German Translation of DCMES 1.1 Dublin Core Conference 2007, Singapur Christine Frodl (German National Library) Stefanie Ruehle (State
More informationYu-Nong Zhang, Roland Hamm, SAP AG
SAP NetWeaver Java Development Infrastructure (aka NWDI) 19.04.2005 Yu-Nong Zhang, Roland Hamm, SAP AG NWDI - Inhouse Experience Demo: Migrating an J2EE application into NetWeaver Development Infrastructure
More informationThe Open Group Conference London. SAP EAF and TOGAF 9. History, differences, similarities and recommendations for the future
The Open Group Conference London SAP EAF and TOGAF 9 History, differences, similarities and recommendations for the future A personal (and software vendor) perspective! Steve Kirby Principal Enterprise
More informationInnovations in V6.5 Consolidation
Innovations in V6.5 Consolidation 2013-07-15 2013 APIS IT GmbH IQ Software Update Tutorial Excerpt: Consolidation 1 Copyright / authors: Version: July 01, 2013 Authors: Training team of APIS Informationstechnologien
More informationHazardous Area Tablet Tab-Ex 01 DZ1 SIM SIM CARD INSTALLATION AL19A
Hazardous Area Tablet Tab-Ex 01 DZ1 SIM SIM CARD INSTALLATION 100016AL19A 1 Content 1. Requirements...4 2. Required Tools:...4 3. SIM-Card Installation and Replacement instructions...5 3.1 Dissassembly...5
More informationEddy Neveux Solution Architect North America May 26-28, 2015 Public
SAP HANA 101 Eddy Neveux Solution Architect North America May 26-28, 2015 Public SAP Business One Innovation summit - Barcelona 2015 SAP SE or an SAP affiliate company. All rights reserved. Public 1 Agenda
More informationWhat s New? SAP HANA SPS 07 Real-Time Data Replication with SAP Landscape Transformation Replication Server (Delta from SPS 06 to SPS 07)
What s New? SAP HANA SPS 07 Real-Time Data Replication with SAP Landscape Transformation Replication Server (Delta from SPS 06 to SPS 07) SAP HANA Product Management November, 2013 Agenda o Overview o
More informationCANopen Commandline Tool
[uv-software] can_open February 2009 CANopen Commandline Tool Abstract can_open Request CANopen services from a CANopen device on the command line. Description The CANopen Commanline Tool is a text based
More informationRGB SQ PROCESSOR BOARD HKSR-5803SQ ADVANCED HQ PROCESSOR BOARD HKSR-5803HQ. INSTALLATION MANUAL 1st Edition
RGB SQ PROCESSOR BOARD HKSR-5803SQ ADVANCED HQ PROCESSOR BOARD HKSR-5803HQ INSTALLATION MANUAL 1st Edition ! WARNING This manual is intended for qualified service personnel only. To reduce the risk of
More informationRelease Notes DriveLock SE
Release Notes Table of Contents Introduction 3 Document Conventions 3 Part II Supported Platforms 4 Part III Version History 6 1 DriveLock 7.7.10 6 2 DriveLock 7.7.8 6 3 DriveLock 7.7.4 8 4 DriveLock 7.6.16
More informationMOC ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER AND INTUNE
ONE STEP AHEAD. MOC 20696 ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER AND INTUNE Length: 5 Forms Level: 300 Technology: Windows Delivery Method: Instructor-led (classroom) COURSE OUTLINE Module 1:
More informationAdvanced Systems Security: Ordinary Operating Systems
Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security:
More informationLaststufenschalter. Supplement. Betriebsanleitung. Device Profile Document MODBUS
Laststufenschalter Voltage Regulator TAPCON VACUTAP 230 VRAVT I HD Betriebsanleitung Supplement Device Profile Document MODBUS Alle Rechte bei Maschinenfabrik Reinhausen Weitergabe sowie Vervielfältigung
More informationTechnical Architecture Overview SAP BPC
Technical Architecture Overview SAP BPC Agenda Presentation Purpose Provide an overview of the technology components that comprise the BPC platform Today. Explain how components can be mixed to design
More informationThe SAP Eclipse Story. Rainer Ehre, NW C Tools Malte Kaufmann, NW C Tools 10/11/2007
The SAP Eclipse Story Rainer Ehre, NW C Tools Malte Kaufmann, NW C Tools 10/11/2007 Agenda 1. Eclipse Positioning in SAP s Product Strategy 2. SAP Eclipse History 3. Demo SAP NetWeaver Developer Studio
More informationSentinelOne Technical Brief
SentinelOne Technical Brief SentinelOne unifies prevention, detection and response in a fundamentally new approach to endpoint protection, driven by behavior-based threat detection and intelligent automation.
More informationMarketing Cloud Scripting Languages
Marketing Cloud Scripting Languages Salesforce, Winter 19 @salesforcedocs Letzte Aktualisierung: 03.12.2018 Die englische Version dieses Dokuments hat Vorrang vor der übersetzten Version. Copyright 2000
More informationCCP1116. Commentary Panel. Quick Guide
CCP1116 Commentary Panel Quick Guide Document Reference 1.2 S.Franke 01/2013 2013 Riedel Communications GmbH & Co KG. Alle Rechte vorbehalten. Dieses Handbuch ist urheberrechtlich geschützt. Das Kopieren,
More informationKASPERSKY FRAUD PREVENTION FOR ENDPOINTS
KASPERSKY FRAUD PREVENTION FOR ENDPOINTS www.kaspersky.com KASPERSKY FRAUD PREVENTION 1. Ways of Attacking Online Banking The prime motive behind cybercrime is making money and today s sophisticated criminal
More information7PMDM Server x - Microsoft Windows Phone 8 7P Mobile Device Management. Doc.Rel: 1.0 / Doc.No.: Windows_ Phone 8 _EN
7PMDM Server 5.06.0x - Microsoft Windows Phone 8 7P Mobile Device Management Doc.Rel: 1.0 / 2014-11-17 Doc.No.: Windows_ Phone 8 _EN Table of Contents 1 Objectives and Target Groups... 4 1.1 Legal statements...
More informationSentinelOne Technical Brief
SentinelOne Technical Brief SentinelOne unifies prevention, detection and response in a fundamentally new approach to endpoint protection, driven by machine learning and intelligent automation. By rethinking
More informationABAP Course. ABAP Objects and Business Server Pages
ABAP Course ABAP Objects and Business Server Pages Lecturer: André Bögelsack, UCC Technische Universität München Author: Valentin Nicolescu, André Bögelsack ABAP Course André Bögelsack, Valentin Nicolescu
More informationCANopen Object Browser, Version 0.5
CANopen Object Browser, Version 0.5 CANopen Object Browser for generic CAN Interfaces The CANopen Object Browser is a tool to display and browse through a CANopen Object Dictionary based on EDS-Files.
More informationHackveda Training - Ethical Hacking, Networking & Security
Hackveda Training - Ethical Hacking, Networking & Security Day1: Hacking windows 7 / 8 system and security Part1 a.) Windows Login Password Bypass manually without CD / DVD b.) Windows Login Password Bypass
More informationRelease Notes DriveLock SE
Release Notes Table of Contents Introduction 3 Document Conventions 3 Part II Supported Platforms 4 Part III Version History 6 1 DriveLock 7.8.2 6 2 DriveLock 7.7.14 7 Known Issues 8 1 DriveLock ios and
More informationCS 356 Operating System Security. Fall 2013
CS 356 Operating System Security Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5 Database
More informationFDT beyond parameterization
FDT beyond parameterization FDT BEYOND PARAMETERIZATION Part 1: PLC tool interface IO mapping The Challenge DTM ProcessData interface Device IO configuration example DTM ProcessImage interface Engineering
More information100% Endpoint Protection dank Machine Learning, EDR & Deception?
100% Endpoint Protection dank Machine Learning, EDR & Deception? 13. Februar 2018 Evolving Threat Landscape Hard to keep up with significant growth and sophistication in cyber threats
More informationPerform Manual System Restore Xp Safe Mode Command Prompt
Perform Manual System Restore Xp Safe Mode Command Prompt Dell support article tagged with: System restore, windows, XP, WinXP, Safe Mode, Command Prompt. This is This article provides information on the
More informationAuskunftsbegehren gemäß Art 15 DSGVO (Facebook Version englisch) - V1.0
Auskunftsbegehren gemäß Art 15 DSGVO (Facebook Version englisch) - V1.0 Inhalt 1. Versionsstand dieses Dokuments... 1 1.1 V1.0 Stammfassung... 1 2. Hinweise zu diesem Muster... 1 3. Musterbrief... 2 1.
More informationBecoming the Adversary
SESSION ID: CIN-R06 Becoming the Adversary Tyrone Erasmus Managing Security Consultant MWR InfoSecurity @metall0id /usr/bin/whoami Most public research == Android Something different today 2 Overview Introduction
More informationCourse Outline (version 2)
Course Outline (version 2) Page. 1 CERTIFIED SECURE COMPUTER USER This course is aimed at end users in order to educate them about the main threats to their data s security. It also equips the students
More informationHow To Remove Virus From Computer Without Using Antivirus In Windows Xp
How To Remove Virus From Computer Without Using Antivirus In Windows Xp How to remove a virus - how to clean PC and laptop of virus, spyware and other PC internet security software that includes up to
More informationChris Rupp. Requirements Templates The Blueprint of your Requirement STANDARD REQUIREMENTS. Templates For A Optimal Solution
Webinhalte zu Kapitel 10 Chris Rupp Requirements Templates The Blueprint of your Requirement STANDARD REQUIREMENTS The fully automated creation of a requirements document seems to remain a dream in the
More informationSpectre, Meltdown, and the Impact of Security Vulnerabilities on your IT Environment. Orin Jeff Melnick
Spectre, Meltdown, and the Impact of Security Vulnerabilities on your IT Environment Orin Thomas @orinthomas Jeff Melnick Jeff.Melnick@Netwrix.com In this session Vulnerability types Spectre Meltdown Spectre
More informationAtos - For internal use
Atos - For internal use The openmdm roadmap The future of measured data management Dr. Dietmar Rapf 21.06.2017 Atos - For internal use Speaker information Dr. Dietmar Rapf Biologist (biocybernetics) doing
More informationRelease Notes DriveLock SE
Release Notes Table of Contents Introduction 3 1 Document Conventions 3 2 DriveLock Documentation 3 System Requirements 5 1 DriveLock Agent 5 2 DriveLock Management Console and Control Center 5 3 DriveLock
More informationComCom-Ex. Safety instructions
ComCom-Ex Safety instructions 1 Content 1. Application...11 1.1 ATEX & IECEx...11 2. Safety precautions...11 3. Faults and damage...11 4. Safety regulations...12 4.1 Possible devices for connection to
More informationÜbungsblatt 2. Aufgabe 1 (Klassifikationen von Betriebssystemen)
Übungsblatt 2 Aufgabe 1 (Klassifikationen von Betriebssystemen) 1. Zu jedem Zeitpunkt kann nur ein einziges Programm laufen. Wie ist der passende Fachbegriff für diese Betriebsart? 2. Was versteht man
More informationCOPYRIGHT: NACHGEDRUCKT ODER SONST REPRODUZIERT WERDEN (Z. B. AUF CD-ROM ODER IM INTERNET).
COPYRIGHT: D EUTSCH DIESE DRUCKSCHRIFT UND ALLE IHRE BESTANDTEILE IST URHEBERECHTLICH GESCHÜTZT. ABBILDUNGEN, GRAFISCHE DARSTELLUNGEN, TEXTE ODER DIE DRUCKSCHRIFT INSGESAMT ODER IN TEILEN DÜRFEN NICHT
More informationSAP NetWeaver 7.0 Product Availability Matrix (PAM)
SAP NetWeaver 7.0 Product Availability Matrix (PAM) This PAM represents current planning for NW only and not for the SAP products using NW and can be subject to further changes without further notice SAP
More informationANATOMY OF AN ATTACK!
ANATOMY OF AN ATTACK! Are Your Crown Jewels Safe? Dom Kapac, Security Evangelist WHAT DO WE MEAN BY CROWN JEWELS? Crown jewels for most organizations are critical infrastructure and data Data is a valuable
More informationFLASH INSIGHT. The internet giants media mobilisation Do they play turtle and hare with us?
August 2015 Shaping the Digital Future FLASH INSIGHT The internet giants media mobilisation Do they play turtle and hare with us? How Google, Amazon, Apple and Microsoft conquer almost all digital business
More informationSIOV Metal Oxide Varistors HighE Series
HighE Series Block varistors Construction Disk-shaped varistor element, potted in plastic housing Housing flame-retardant to UL 9 V-0 Screw terminals M (SIOV-B 0) Screw terminals M (SIOV-B0 80) Features
More informationCERTIFIED SECURE COMPUTER USER COURSE OUTLINE
CERTIFIED SECURE COMPUTER USER COURSE OUTLINE Page 1 TABLE OF CONTENT 1 COURSE DESCRIPTION... 3 2 MODULE-1: INTRODUCTION TO DATA SECURITY... 4 3 MODULE-2: SECURING OPERATING SYSTEMS... 6 4 MODULE-3: MALWARE
More informationAdvanced Ethical Hacking & Penetration Testing. Ethical Hacking
Summer Training Internship Program 2017 (STIP - 2017) is a practical oriented & industrial level training program for all students who have aspiration to work in the core technical industry domain. This
More informationDATENBLATT. ULx (Universal Library Extensions) für LabVIEW
DATENBLATT ULx (Universal Library Extensions) für LabVIEW HABEN SIE FRAGEN ODER WÜNSCHEN SIE EIN INDIVIDUELLES ANGEBOT? Unser Team berät Sie gerne persönlich. TELEFON + 49 (0) 81 41/36 97-0 TELEFAX + 49
More informationManaged. Code Rootkits. Hooking. into Runtime. Environments. Erez Metula ELSEVIER. Syngress is an imprint of Elsevier SYNGRESS
Managed Code Rootkits Hooking into Runtime Environments Erez Metula ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEWYORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Syngress is an imprint
More informationCourse to Steer Indicator (Operator Unit)
Course to Steer Indicator () Type 130-625 NG001 Raytheon Anschuetz GmbH Postfach 11 66 D-24100 Kiel Germany Tel +49-4 31-30 19-0 Fax +49-4 31-30 19 464 Email service@raykiel.com www.raytheon-anschuetz.com
More informationAndreas Stolz NetWeaver RIG Expert, SAP AG Walldorf, Nov. 2006
XI Operations Nordic SAP User Group Andreas Stolz NetWeaver RIG Expert, SAP AG Walldorf, Nov. 2006 Learning Objectives As a result of this workshop, you will be able to: Describe Process Integration system
More informationSafe N Sec Enterprise Pro
Anti-Virus Comparative Single Product Test Safe N Sec Enterprise Pro Date: January 2008 Last revision: 26 th January 2008 Author: Andreas Clementi Website: http://www.av-comparatives.org 1. Tested product
More informationLive Attack Visualization and Analysis. What does a Malware attack look like?
Live Attack Visualization and Analysis What does a Malware attack look like? Introduction Bromium is a virtualization pioneer whose micro-virtualization technology delivers dependable, secure and manageable
More informationCANopen Object Browser, Version 0.2
CANopen Object Browser, Version 0.2 CANopen Object Browser for Linux The CANopen Object Browser is a tool to display and browse through a CANopen Object Dictionary based on EDS-Files. The program allows
More informationInline Reference Monitoring Techniques
Inline Reference Monitoring Techniques In the last lecture, we started talking about Inline Reference Monitors. The idea is that the policy enforcement code runs with the same address space as the code
More informationUser Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client.
User Guide This user guide explains how to use and update Max Secure Anti Virus Enterprise Client. Copyright 2002-2016 Max Secure Software. All rights reserved. Contents 2 Contents Introduction... 3 System
More informationMGS USB Gauge Monitor
Software Thank you for purchasing this Magnescale product. Read all the instructions in the manual carefully before use and strictly follow them. Be sure to keep this manual for future reference. This
More informationAdvanced Systems Security: Ordinary Operating Systems
Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security:
More informationDwg viewer free download vista. Dwg viewer free download vista.zip
Dwg viewer free download vista Dwg viewer free download vista.zip free dwg viewer free download - Free DWG Viewer, Free DWG Viewer, DWG Viewer, and many more programsdeep View Free DWG DXF Viewer, free
More informationPAR-KL-68. QUANCOM Informationssysteme GmbH
PAR-KL-68 Copyright Alle Angaben in diesem Handbuch sind nach sorgfältiger Prüfung zusammengestellt worden, gelten jedoch nicht als Zusicherung von Produkteigenschaften. QUANCOM haftet ausschließlich in
More informationFILELESSMALW ARE PROTECTION TEST OCTOBER2017
FILELESSMALW ARE PROTECTION TEST OCTOBER2017 1 / 12 INTRODUCTION In times of digitalization of each aspect of public and private life new and interesting techniques of bypassing protections are abundant.
More informationDamping of Inrush Current in Low-Voltage PFC Equipment
Damping of Inrush Current in Low-Voltage PFC Equipment Low-Voltage PFC Application Note 2001 http://www.epcos.com Power Quality Contents General 3 The risks of high inrush current 4 Single capacitor connection,
More informationProdukt-Datenblatt. Technische Daten, Spezifikationen. MEsstechnik fängt mit ME an. Kontakt
Produkt-Datenblatt Technische Daten, Spezifikationen Kontakt Technischer und kaufmännischer Vertrieb, Preisauskünfte, Angebote, Test-Geräte, Beratung vor Ort: Tel: (0 81 41) 52 71-0 FAX: (0 81 41) 52 71-129
More informationSkyRAY Light. Installation Handbook
Doc. No.: HB_0531_1000 Date: 2007-10-15 Issue: draft Release Notes Name Task Department Date Signature C. Hauff Creator 2007-10-15 Quality Management Review NDSQ Weitergabe sowie Vervielfältigung dieser
More informationBest practice settings and information
EN Kapsch Enterprise Platform Based on Microsoft SharePoint. Best practice settings and information This whitepaper will explain how to optimized settings in order to enhance the end user experience when
More informationPROTOCOL MANUAL VERSION 1.0 VPL-PX11 VPL-PX11 LCD DATA PROJECTOR VPLL-CT10 VPLL-CW10 RM-PJM MODEL DEST... WORLD Serial No. 6,500,001 and later
PROTOCOL MANUAL... MODEL DEST....... MODEL DEST.... WORLD Serial No. 6,500,001 and later CHINA Serial No. 6,000,001 to 6,500,000 VPLL-CT10 VPLL-CW10 RM-PJM12 WORLD WORLD WORLD VERSION 1.0 VPLL-CT10/CW10
More informationThe State of the Hack. Kevin Mandia MANDIANT
The State of the Hack Kevin Mandia MANDIANT Who Am I? Adjunct Professor Carnegie Mellon University 95-856 Incident Response Master of Information System Management The George Washington University Computer
More informationWORKSHOP 4.3: PI READINESS OF WAREHOUSE TECHNOLOGY IPIC 2017 DR. MAX WINKLER / JULY, 2017
WORKSHOP 4.3: PI READINESS OF WAREHOUSE TECHNOLOGY IPIC 2017 DR. MAX WINKLER / JULY, 2017 WHAT ARE WE TALKING ABOUT? PI:= Physical Packet + Information Packet Communication between PI objects and warehouse
More informationVPL-ES3 VPL-EX3 VPL-ES4 VPL-EX4 VPL-EX5 VPL-EX50 VPL-EX5U VPL-EW5
DATA PROJECTOR VPL-ES3 VPL-EX3 VPL-ES4 VPL-EX4 VPL-EX5 VPL-EX50 VPL-EX5U VPL-EW5 PROTOCOL MANUAL 1st Edition (Revised 3) ! WARNING This manual is intended for qualified service personnel only. To reduce
More informationKeeping Your PC Safe. Tips on Safe Computing from Doug Copley
Keeping Your PC Safe Tips on Safe Computing from Doug Copley Don t be an Administrator Administrator is an account that can do ANYTHING on the PC Most computers start with 1 account with administrator
More informationCisco Security Exposed Through the Cyber Kill Chain
Cisco Forschung & Lehre Forum für Mecklenburg Vorpommern Cisco Security Exposed Through the Cyber Kill Chain Rene Straube CSE, Cisco Advanced Threat Solutions January, 2017 The Cisco Security Model BEFORE
More informationSucceed with Eclipse: Large Scale 11/14/16
Succeed with Eclipse: Large Scale 1 Introduction Markus Duft Software Architect Working for Salomon Automation since 2005 markus.duft@ssi-schaefer.com Salomon Automation GmbH part of the privately held
More informationReduce the Breach Detection Gap to Minutes. What is Forensic State Analysis (FSA)?
Reduce the Breach Detection Gap to Minutes Whether cloud-hosted or situated on premise, Cyber Threat Hunting as a Service is an essential and complimentary addition to any organization serious about security.
More information