From cff3f295987a89c43336c7d57fdfe8173b55a4bc Mon Sep 17 00:00:00 2001 From: pe3zx Date: Wed, 20 Dec 2017 15:27:49 +0700 Subject: [PATCH] Add new section in exploitation techniques called "Trusted Execution" "Trusted execution" basically an execution of malicious binary via signed/trusted program, bypassing various security protection. --- README.md | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/README.md b/README.md index 828638a..46ab3e9 100644 --- a/README.md +++ b/README.md @@ -249,6 +249,13 @@ My curated list of awesome links, resources and tools - [X86 EXPLOITATION 101: “HOUSE OF SPIRIT” – FRIENDLY STACK OVERFLOW](https://gbmaster.wordpress.com/2015/07/21/x86-exploitation-101-house-of-spirit-friendly-stack-overflow/) - [Your First Buffer Overflow](https://medium.com/@mackwage/your-first-buffer-overflow-89141a9a2941) + +#### Trusted Execution + +**Various techniques to execute malicious binary with trusted, bypassing security protection** + +- [Execute unsigned binary via signed Tracker.exe (required Tracker.exe and TrackerUI.dll)](https://twitter.com/sudhanshu_c/status/943011972261412864?ref_src=twcamp%5Eshare%7Ctwsrc%5Eios%7Ctwgr%5Eother) + ##### Use-After-Free **Use-After-Free related arcitles**