This trio of Black Hat Europe 2015 Briefings grapple with different aspects of the art of intelligent counter-intelligence. The Domain Name System that makes the web so human-friendly is highly dynamic and continually changing. Microsoft’s Application Compatibility Toolkit can be leveraged to achieve persistence and privilege escalation via Shim Database Files. Linux’s increasing ubiquity, particularly in embedded applications, unfortunately makes it more attractive to malware authors. As such, researchers need better tools to analyze rogue programs. That’s where Limon comes in.”]
Source: https://www.darkreading.com/black-hat/black-hat-europe-2015-the-best-response/d/d-id/1322538

