Trusted Things That Execute Untrusted Things

Discussion in 'other security issues & news' started by WildByDesign, Nov 17, 2016.

  1. WildByDesign

    WildByDesign Registered Member

    Joined:
    Sep 24, 2013
    Posts:
    2,587
    Location:
    Toronto, Canada
    Application Whitelisting bypasses - tutorial video by Casey Smith (https://twitter.com/subTee)

    Trusted Things That Execute Untrusted Things
    An Unhealthy Obsession

    YouTube video link: https://www.youtube.com/watch?v=dYVEUidAtUM
     
  2. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,606
    Location:
    The Netherlands
    So in other words it's crucial to monitor these system tools. Now that I think of it, instead of building a "vulnerable apps" list, it's probably best to always think twice before letting some app run any system app. BTW, I haven't watched the whole video yet.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.