t2 was born at a time when there was a need for a conference that was "from hacker to hacker" when there was not one single independent, technically oriented, information security conference in Finland in existence.
The mission of t2 has remained the same from its commencement, to be an annual conference dedicated to those who are interested in the technical aspects of information security. t2 offers the opportunity to publish new research and ideas as well as networking, the latter an elemental part of its ideology.
Talk presented by MWR
- Room: TBC
- Topic: One Template to Rule 'em All
- Speakers: Kostas Lintovois
- Description: Current attack vectors indicate that malware families are still abusing Microsoft Office's functionality to attack unsuspecting victims and formulate attacks against today's businesses. Cracking the perimeter is no longer a requirement in order to obtain a foothold within a target environment. As the Office Suite is an integral tool in business today, such attack vectors stay current and relevant.
This presentation will walk the audience through the different configurations and mitigating controls made available by Microsoft over the years. It will discuss various bypasses that have been known and highlight Office templates and the ways that they can be used to assist in different stages of an APT life cycle. More specifically, in this talk we demonstrate how they can be used as a covert persistence mechanism as well as for asynchronous C2 communications. Furthermore, the presentation identifies how these templates can be used as a mechanism for native code execution in locked down environments where VBA is explicitly disabled.
The talk will include the demonstration and release of a new tool that generates VBA architecture independent code to be used in an Office template and capable of enumerating a target system's configuration. The generated implant evaluates the applied security controls and decides what the appropriate attack elements should be in order to reliably bypass application control and circumvent EMET's mitigations.