Unlimited WordPress themes, plugins & video downloads!

Research

Research – Bypassing McAfee’s Application Whitelisting For Critical Infrastructure Systems

This paper describes the results of the research conducted by SEC Consult Vulnerability Lab on the security of McAfee Application Control. This product is an example of an application whitelisting solution which can be used to further harden critical systems such as server systems in SCADA environments or client systems with high security requirements like administrative workstations. Application whitelisting is a concept which works by whitelisting all installed software on a system and after that prevent the execution of not whitelisted software. This should prevent the execution of malware and therefore protect against advanced persistent threat (APT) attacks. McAfee Application Control is an example of such a software. It can be installed on any system, however, the main field of application is the protection of highly critical infrastructures. While the core feature of the product is application whitelisting, it also supports additional security features including write and read protection as well as different memory corruption protections.

 

You can download it from the following link: https://packetstormsecurity.com/files/download/135226/Whitepaper_Bypassing_McAfees_Application_Whitelisting_for_critical_infrastructure_systems_v10.pdf

Source: https://packetstormsecurity.com/files/135226/Bypassing-McAfees-Application-Whitelisting-For-Critical-Infrastructure-Systems.html

Related posts
Research

Research - Transferable State Attack On Iterated Hashing Functions

Research

Research - Troopers 2013 Call For Papers

Research

Research - Ubuntu OverlayFS Local Privilege Escalation

Research

Research - Understanding SQL Injection

Sign up for our Newsletter and
stay informed