Events

ElevenPaths Talks Code for Devs

 

'UAC-A-Mola', a Framework for Research, Detect and Mitigate UAC Bypasses by Pablo González

June 20, 2018. In this session, our experts explain about UAC-A-MOLA tool. It is an UAC bypass and we can use it to research, detect, exploit and mitigate these types of security issues that affects the latest Windows operating systems. Put your knowledge on test! connect to the talk!


#CodeTalks4Devs: 'UAC-A-Mola', a Framework for Research, Detect and Mitigate UAC Bypasses by Pablo González

Code Talks for Devs webinar cybersecurity Latch Integration in a Cryptocurrency Wallet Using Exfiltration
Latch Integration in a Cryptocurrency Wallet Using Exfiltration Danilo Ninabanda, Ignacio Jiménez... March 21, 2018.
Code Talks for Devs webinar cybersecurity UAC-A-Mola, a Framework for Research, Detect and Mitigate UAC Bypasses
UAC-A-Mola, a Framework for Research, Detect and Mitigate... Pablo González y Santiago Hernández June 20, 2018.
Code Talks for Devs webinar cybersecurity Evil Foca in a nutshell
Evil Foca in a nutshell, get to know it! Álvaro Núñez-Romero July 18, 2018.
Code Talks for Devs webinar cybersecurity LiLaS, a Project to Protect Data Networks
LiLaS, a Project to Protect Data Networks Santiago Hernández August 22, 2018.
Code Talks for Devs webinar cybersecurity WordPress in Paranoid Mode
WordPress in Paranoid Mode Pablo González September 19, 2018.
Code Talks for Devs webinar cybersecurity How to Create a FOCA Plugin
How to Create a FOCA Plugin José Sperk October 17, 2018.
Code Talks for Devs webinar cybersecurity Joomla in Paranoid Mode
Joomla in Paranoid Mode Mateo González November 21, 2018.

In the first part of this Code Talks for Devs, we are going to introduce UAC-A-MOLA tool. We will talk about the framework architecture and how easy is to build a module that can be adapted to our needs even if you barely know how to program. We will review the source code, highlighting the most important parts of it. Then, in the second part of the talk, we will show the practical form of the tool, from the exploitation of this kind of security issues in the latest Windows Systems, to the researching process to detect or mitigate them in your own personal computer.

Find out more about this subject:
UAC-A-Mola Tool