Harry Williams
Self-proclaimed Linux connoisseur, Scapy's #1 fan and ActiveDirectory (PrivEsc) enjoyer, Harry is a penetration tester with a background varying from social engineering to SOC evasion. Particularly, he enjoys Scapy so much that he did a BSides London talk on the matter in 2020. When he's not recommending risk mitigations he's recommending Linux distributions and memes in equal measure. He vehemently believes that hoodies, dark mode, Synthwave and mechanical keyboards make hacking over 9000 times faster. When not at a desk hacking things, he can be found eating pizza and climbing - where he enjoys talking about being at a desk and hacking things.
Session
A discussion of thick client testing using modified field examples seeking to address the following:
- Common scoping and testing issues for thick client testing and how to avoid/solve them
- Reverse engineering and subsequent patching of thick clients using examples in Common Intermediate Language (CIL) and C# - this will be used to illustrate how you can grant administrative rights on applications and combine these for further compromise
- Chaining findings for greater client value and closer emulation of threat actor techniques - stamping out "box ticker" pentests and behaving like a threat actor
- Honorary mention of a potential, theoretical vector for harvested thick client credentials and their use in red teaming, or at least wider consideration for thick clients in various attack simulations
- Declining research quality(?) and lack of quality thick client testing resources - a brief overview of the problem and some key takeaways for wider consideration post-talk
