SlideShare ist ein Scribd-Unternehmen logo
1 von 56
Downloaden Sie, um offline zu lesen
50	Shades	Of	Fuzzing
Peter	Hlavaty (@zer0mem)
Marco	Grassi (@marcograss)
Who	Are	You?
• Peter	Hlavaty
• Senior	security	Researcher
• Lead	of	Windows	Kernel	security	Research
• Marco	Grassi
• Senior	Security	Researcher	@	Tencent KEEN	Security	Lab
• Main	focus:	Vulnerability	Research,	OS	X/iOS,	Android,	Sandboxes
Agenda
• The	Team
• VMWare	Overview
• VMWare	Workstation/Fusion	Fuzzing
• Win32k	Overview
• Win32k	Fuzzing
• Conclusions
• Questions
The	Team
• Previously	known	as	KeenTeam
• All	researchers	moved	to	Tencent because	of	business	
requirement
• New	name:	TencentKEEN	Security	Lab
• We	won	the	title	of	“Master	Of	Pwn”	2016	and	actively	
participating	at	pwn2own	from	2013	to	this	year.
• Keep	an	eye	on	our	blog!	(English:	
http://keenlab.tencent.com/en/ Chinese:	
http://keenlab.tencent.com/zh/ )
This	Talk	in	one	Slide
VMWare	Workstation	/	Fusion
VMWare	Workstation	/	Fusion
• Most	likely	everyone	is	sort	of	familiar	with	VMWare	here…
• One	of	the	first	companies	(if	not	the	first)	to	successfully	virtualize	
x86	(which	is	not	formally	virtualizable	– see	Popek	&	Goldberg)
• Nowadays	with	VT-X	support	virtualization	is	faster	and	easier
• It’s	a	product	that	allows	you	to	run	unmodified	operationg	systems	
as	guests.
• Their	software	runs	at	different	privilege	levels,	they	have	kernel	
components	and	some	host	usermode processes.
• Our	talk	will	focus	mainly	on	how	VMWare	virtualizes	the	GPU	in	a	
guest,	since	they	offer	advanced	functions	such	as	3d	acceleration.
Why	VMWare	research?
• VMWare	workstation/fusion	is	a	very	widespread	software,	so	it’s	an	
attractive	target	for	attackers
• Maybe	sometimes	a	virtual	machine	is	used,	and	even	if	you	gain	
code	execution,	or	even	kernel	code	execution	inside	the	virtual	
machine,	you	are	still	trapped	in	there.
• By	leveraring	a	bug	in	some	component	of	VMWare	you	can	
potentially	escape	the	virtual	machine	and	gain	code	execution	in	the	
host	system!
VMWare	– important	resources/prev research
• GPU	Virtualization	on	VMware’s	Hosted	I/O	Architecture	- Micah	
Dowty,	Jeremy	Sugerman – VMWare	(this	is	the	paper	you	absolutely	
want	to	read	before	approaching	this	area)
• CLOUDBURST	A VMware Guest to Host Escape Story	- Kostya
Kortchinsky – Black	Hat	USA	2009
VMWare	GPU
• Despite	there	is	a	good	support	at	CPU	level	for	virtualization	today	
with	Intel/AMD	in	hardware	support,	for	GPU	and	in	general	other	
hardware	virtualization,	the	status	quo	is	not	as	good	as	CPU	virt
• Vmware wanted	to	offer	high	performance	GPU	/	3d	to	the	guests,	so	
they	had	to	deploy	their	own	solution	to	defeat	also	host	driver	
fragmentation,	introducing	several	abstraction	layers	(and	lot	of	code)
VMWare	GPU	Virtual	Device
• The	VMWare	virtualized	GPU	will	
show	up	in	your	guest	as	a	PCI	device	
called	“Vmware SVGA	3D”
• Has	several	Memory	ranges	that	maps	
to	interesting	stuff	(more	on	the	next	
slide)
• They	implement	a	2D	Framebuffer	
(not	very	interesting,	just	the	pixel	
shown	on	your	screen)
• And	a	GPU	Command	queue	(!)
• Here	you	can	see	the	different	
purposes	of	the	memory	areas.
• We	are	mainly	interested	in	the	
FIFO	Memory
• Think	of	it	like	a	FIFO	processed	
asynchronously	and	
concurrently	outside	of	your	
system,	by	the	VMWare	GPU	
subsystem
• Implements	a	lot	of	commands	
for	3D	and	other	functionalities
High	level	description	of	the	FIFO
• The	FIFO	when	used	for	3D	commands,	expect	a	custom	protocol	
(SVGA3D)
• 1.	Write	commands	into	the	queue
• 2.	optionally	insert	a	fence	if	the	guest	wants	to	be	notified	of	
progress	with	a	virtual	interrupt
• 3.	At	some	point	your	commands	will	be	processed	asynchronously
• The	SVGA3D	protocol	takes	ideas	and	simplify	the	Direct3D	APIs
Where	is	the	VMWare	GPU	code?
• The	core	functionality	of	the	GPU	is	implemented	in	the	vmware-
vmx.exe
• We	should	expect	fault	in	this	process	(or	in	any	.dll	inside	here)
• So	we	turn	on	PageHeap	in	Gflags	for	fault	monitoring	and	WinDbg	
autostart	on	fault
• Maybe	a	fault	will	traverse	the	virtualization	layer	and	appears	in	Host	
graphics	also	J
Code	path
VMWare	SVGA3D
• Very	rich	of	functionalities,	like	shaders,	textures	etc,	lot	of	attack	
surface!
• But…	HOW	DO	WE	FUZZ	THIS?
• Let’s	explore	some	alternatives..
Fuzzing	alternatives:	From	Guest	usermode
• Extremely	inconvenient	for	several	
reasons:
• Too	many	layers	of	software	that	
doesn’t	interest	us	and	perform	
validation
• Performance	reasons
• The	GPU	resource	is	contended	and	
manipulated	by	the	running	Guest	
system.	It	would	be	very	difficult	to	
reproduce	eventual	crashes.
• Heavy,	we	want	to	scale	&	run	lot	of	
Guests
Fuzzing	alternatives:	From	Guest	kernelmode
• This	alternative	is	more	appealing	
because:
• In	general	we	have	more	control
• Less	resource	contention	if	we	don’t	
use	any	UI
• We	can	skip	pretty	much	any	
validation	layer
• But	still	we	are	running	together	with	
a	kernel,	so	we	are	not	the	only	code	
running	on	the	system	and	lot	of	stuff	
is	going	on.
• Heavy,	we	want	to	scale	&	run	lot	of	
Guests
The	right	Fuzzing	option:	Baremetal Guest!
• If	we	run	our	code	as	a	guest,	
without	any	operating	system	we	
have:
• Performance	boost	of	course!
• Complete	control!
• No	validation	steps!
• Exclusive	access	to	the	hardware!
• Extremely	light,	few	MB	of	ram	only,	
we	can	run	a	huge	number	of	guests!
What	to	fuzz?
• We	picked	shaders	because	they	are	complex,	and	they	undergo	
several	layers	of	translations	in	several	points.
1. Collect	valid	shaders
2. Put	together	code	to	load	and	render	with	shaders	correctly	on	
bare	metal	code
3. Mutate	shader,	load,	render,	see	if	it	crash.
4. GOTO	3
• You	can	fuzz	also	raw	commands,	but	the	semantics	is	not	trivial	and	
require	reversing.
Bare	metal	GPU	Fuzzer DEMO
BUG	DEMO	J
Soon	a	couple	of	CVEs	in	VMWare	Fusion,	waiting	
for	the	fix	to	be	deployed	(ETA	q3)	disclosed	
several	months	ago	(slow)
Microsoft	w32k	sub-system
Fuzzing	all	around	your	window,	and	beyond!
w32k	– Data	Parsing #TTF
• TrueType	Font
• Popular	at	sophisticated	- stuxnet,	duqu,	..
• https://cansecwest.com/slides/2013/Analysis%20of%20a%20Windows%20Ke
rnel%20Vuln.pdf
• Abused	at	p2o	2015	– KEEN
• http://www.slideshare.net/PeterHlavaty/windows-kernel-exploitation-this-
time-font-hunt-you-down-in-4-bytes
• A	year	of	Windows	kernel	font	fuzzing	– j00ru
• http://googleprojectzero.blogspot.nl/2016/06/a-year-of-windows-kernel-font-
fuzzing-1_27.html
w32k	– syscalls #DC
DC
bitmap
Brush
Pen
Pallete
Font
…
w32k	– syscalls #DC	#collisions
DC	#UAF,	however	nils was	already	here..
w32k	– syscalls #DC	#collisions
DC	*nice*	#UAF,		however	..once	again,	nils ..	:)
w32k	– syscalls #DC	#collisions
(nils)	PoC overview	:
w32k	– syscalls #DC	#collisions
(nils)	PoC overview	:
w32k	– syscalls #DC	#collisions
(nils)	PoC overview	:
w32k	– syscalls #DC	#collisions
(nils)	PoC overview	:
w32k	– syscalls #DC	#collisions
(nils)	PoC overview	:
w32k	– syscalls #DC	#collisions
(nils)	PoC overview	:	
…	pretty	much	all	to	one…
w32k	– syscalls #DC
• Various	components	are	interconnected
• Binding	to	DC
• GetStockObject,	SelectObject
w32k	– syscalls #Window
ShowSet
WND Msg
ClipBClass
SetWindowText
w32k	– syscalls #DC	#Window
• Interconnections	#2
• GetWindowDC,	BeginPaint,	Caret
• Binding	back	to	DC
w32k	– syscalls #Window	#Menu
• Menu
• PopUps
• Window	connected	{
• DrawMenuBarTemp
• HilitieMenuItem
• TrackPopUpMenu*
• CalcMenuBar
• …
}
• Binded with	window
w32k	– syscalls #Window	#Menu
More	on	our	w32k-syscalls	results	and	another	part	of	w32k	at	ruxcon :
https://ruxcon.org.au/speakers/#Peter	Hlavaty &	Jin Long
f.e.	:
w32k	– DirectX
• Ilja Van	sprundel
• https://www.blackhat.com/us-14/briefings.html#windows-kernel-graphics-
driver-attack-surface
• Nikita	Tarakanov – zeronights
• http://2015.zeronights.org/assets/files/11-Tarakanov.pdf
• p2o	2016	– KEEN
• http://community.hpe.com/t5/Security-Research/Pwn2Own-2016-Day-two-
crowning-the-Master-of-Pwn/ba-p/6842863#.V4d1NMpOKDt
w32k	– Data	Parsing #DirectX
• Code	shipped	by	intel,	nvidia
• Balast of	code	responsible	for	various	data	parsing!
• Extended	arm	of	
{
D3DKMTSubmitCommand
D3DKMTEscape
D3DKMTRender
D3DKMTPresent
}
w32k	– sycalls #2 #DirectX
w32k		
dxg
Adapter
Alloc
Context
Overlay
Mutex
Sync
Paging
Device
o Universal	windows	code
o Independent	on	graphic	
vendors
o More	strict	attack	vector	than	
data	parsing
Fuzzing
w32k	– Fuzzing #templates
• syzkaller • Qilin
w32k	– Fuzzing #templates
• Nt*	syscalls mostly	undocumented
• Various	API	however	nicely	documented!
• goog :	“	MSDN	%target%	functions	“
• Once	you	know	whats going	on	at
API,	easier	to	RE	arg at	syscalls
w32k	– Fuzzing #syscalls
• Just	tip	of	the	IceBerg!
• #1	api is	just	small	part
• #2	what	we	cover	is	just	small	subset!
• Take	a	look	at	win32k	subsystem	syscall table
• x	win32k*!Nt*
• http://j00ru.vexillium.org/win32k_syscalls/
• Around	#xyz	syscalls !!
w32k	– Hardening
• Notably	Nils,	Terjei,	j00ru,	Tencent,	360	and	others
• Securing	code	base
• TTF	stripping	from	kernel
• moving	attack	surface	of	out	kernel
• w32k	separation	win32k{base,	full}
• Step	by	step	to	re-design
• w32k	lockdown
• Strenghten sandboxes
• gdi leaking	locked
• Fixing	OLD	&	obvious	security	issues
w32k	– 50	shades [	Qilin ]
w32k	– 50	shades [	DEMO	]
• ~50	core	test
OSX/iOS	Graphics	fuzzing
• Unfortunately	there	is	not	much	time	left	to	discuss	this,	but	we	can	
reccomend	some	of	our	presentations	on	the	topic	that	you	can	check	
out:
• CanSecWest	16:	Don't	Trust	Your	Eye:	Apple	Graphics	Is	Compromised!	– Liang	
Chen	– Marco	Grassi – Qidan He
• Recon	2016:	Shooting	the	OS	X	El	Capitan	Kernel	Like	a	Sniper	– Liang	Chen	–
Qidan He
• Black	Hat	USA	2016:	SUBVERTING	APPLE	GRAPHICS:	PRACTICAL	APPROACHES	
TO	REMOTELY	GAINING	ROOT	- Liang	Chen	- Qidan He	- Marco	Grassi - Yubin
Fu	(TO	BE	PRESENTED)
• In	pwn2own	2016	we	used	2	different	bugs	to	compromise	twice	OS	
X!
OSX/iOS	Graphics	fuzzing
Conclusions
• Graphics	it’s	a	huge	attack	surface	still	reachable	from	interesting	
sandboxes	(like	some	browser	sandboxes)
• Many	researchers	are	looking	into	this	area,	there	are	a	lot	of	bugs	in	
this	kind	of	code	but	security	is	becoming	better.
• Fuzzing	the	graphic	stack	requires	different	approaches	and	principles	
compared	to	fuzzing	core	components.
• In	graphics	data	and	state	fuzzing	are	both	important	attack	vectors.
Credits
• Wushi
• Liang	Chen
• Daniel	King
• All	our	teammates!
Questions?
50 Shades of Fuzzing by Peter Hlavaty & Marco Grassi
50 Shades of Fuzzing by Peter Hlavaty & Marco Grassi

Weitere ähnliche Inhalte

Was ist angesagt?

CSW2017 Peng qiu+shefang-zhong win32k -dark_composition_finnal_finnal_rm_mark
CSW2017 Peng qiu+shefang-zhong win32k -dark_composition_finnal_finnal_rm_markCSW2017 Peng qiu+shefang-zhong win32k -dark_composition_finnal_finnal_rm_mark
CSW2017 Peng qiu+shefang-zhong win32k -dark_composition_finnal_finnal_rm_mark
CanSecWest
 
OS X Drivers Reverse Engineering
OS X Drivers Reverse EngineeringOS X Drivers Reverse Engineering
OS X Drivers Reverse Engineering
Positive Hack Days
 
Windows Kernel Exploitation : This Time Font hunt you down in 4 bytes
Windows Kernel Exploitation : This Time Font hunt you down in 4 bytesWindows Kernel Exploitation : This Time Font hunt you down in 4 bytes
Windows Kernel Exploitation : This Time Font hunt you down in 4 bytes
Peter Hlavaty
 

Was ist angesagt? (20)

Reliable Windows Heap Exploits
Reliable Windows Heap ExploitsReliable Windows Heap Exploits
Reliable Windows Heap Exploits
 
Starting up Containers Super Fast With Lazy Pulling of Images
Starting up Containers Super Fast With Lazy Pulling of ImagesStarting up Containers Super Fast With Lazy Pulling of Images
Starting up Containers Super Fast With Lazy Pulling of Images
 
MacOS memory allocator (libmalloc) Exploitation
MacOS memory allocator (libmalloc) ExploitationMacOS memory allocator (libmalloc) Exploitation
MacOS memory allocator (libmalloc) Exploitation
 
Pwning in c++ (basic)
Pwning in c++ (basic)Pwning in c++ (basic)
Pwning in c++ (basic)
 
Linux binary Exploitation - Basic knowledge
Linux binary Exploitation - Basic knowledgeLinux binary Exploitation - Basic knowledge
Linux binary Exploitation - Basic knowledge
 
4章 Linuxカーネル - 割り込み・例外 3
4章 Linuxカーネル - 割り込み・例外 34章 Linuxカーネル - 割り込み・例外 3
4章 Linuxカーネル - 割り込み・例外 3
 
ceph optimization on ssd ilsoo byun-short
ceph optimization on ssd ilsoo byun-shortceph optimization on ssd ilsoo byun-short
ceph optimization on ssd ilsoo byun-short
 
Bruh! Do you even diff?—Diffing Microsoft Patches to Find Vulnerabilities
Bruh! Do you even diff?—Diffing Microsoft Patches to Find VulnerabilitiesBruh! Do you even diff?—Diffing Microsoft Patches to Find Vulnerabilities
Bruh! Do you even diff?—Diffing Microsoft Patches to Find Vulnerabilities
 
CSW2017 Peng qiu+shefang-zhong win32k -dark_composition_finnal_finnal_rm_mark
CSW2017 Peng qiu+shefang-zhong win32k -dark_composition_finnal_finnal_rm_markCSW2017 Peng qiu+shefang-zhong win32k -dark_composition_finnal_finnal_rm_mark
CSW2017 Peng qiu+shefang-zhong win32k -dark_composition_finnal_finnal_rm_mark
 
Advanced heap exploitaion
Advanced heap exploitaionAdvanced heap exploitaion
Advanced heap exploitaion
 
OS X Drivers Reverse Engineering
OS X Drivers Reverse EngineeringOS X Drivers Reverse Engineering
OS X Drivers Reverse Engineering
 
Revisiting CephFS MDS and mClock QoS Scheduler
Revisiting CephFS MDS and mClock QoS SchedulerRevisiting CephFS MDS and mClock QoS Scheduler
Revisiting CephFS MDS and mClock QoS Scheduler
 
Windows Kernel Exploitation : This Time Font hunt you down in 4 bytes
Windows Kernel Exploitation : This Time Font hunt you down in 4 bytesWindows Kernel Exploitation : This Time Font hunt you down in 4 bytes
Windows Kernel Exploitation : This Time Font hunt you down in 4 bytes
 
x86
x86x86
x86
 
Garbage collection
Garbage collectionGarbage collection
Garbage collection
 
JVM @ Taobao - QCon Hangzhou 2011
JVM @ Taobao - QCon Hangzhou 2011JVM @ Taobao - QCon Hangzhou 2011
JVM @ Taobao - QCon Hangzhou 2011
 
淺談探索 Linux 系統設計之道
淺談探索 Linux 系統設計之道 淺談探索 Linux 系統設計之道
淺談探索 Linux 系統設計之道
 
Linux SMEP bypass techniques
Linux SMEP bypass techniquesLinux SMEP bypass techniques
Linux SMEP bypass techniques
 
技術紹介: S2E: Selective Symbolic Execution Engine
技術紹介: S2E: Selective Symbolic Execution Engine技術紹介: S2E: Selective Symbolic Execution Engine
技術紹介: S2E: Selective Symbolic Execution Engine
 
0xdec0de01 crypto CTF solutions
0xdec0de01 crypto CTF solutions0xdec0de01 crypto CTF solutions
0xdec0de01 crypto CTF solutions
 

Andere mochten auch

D1T3-Anto-Joseph-Droid-FF
D1T3-Anto-Joseph-Droid-FFD1T3-Anto-Joseph-Droid-FF
D1T3-Anto-Joseph-Droid-FF
Anthony Jose
 
[CB16] About the cyber grand challenge: the world’s first all-machine hacking...
[CB16] About the cyber grand challenge: the world’s first all-machine hacking...[CB16] About the cyber grand challenge: the world’s first all-machine hacking...
[CB16] About the cyber grand challenge: the world’s first all-machine hacking...
CODE BLUE
 

Andere mochten auch (20)

FUZZING & SOFTWARE SECURITY TESTING
FUZZING & SOFTWARE SECURITY TESTINGFUZZING & SOFTWARE SECURITY TESTING
FUZZING & SOFTWARE SECURITY TESTING
 
Software Security : From school to reality and back!
Software Security : From school to reality and back!Software Security : From school to reality and back!
Software Security : From school to reality and back!
 
Torturing the PHP interpreter
Torturing the PHP interpreterTorturing the PHP interpreter
Torturing the PHP interpreter
 
NSC #2 - D3 02 - Peter Hlavaty - Attack on the Core
NSC #2 - D3 02 - Peter Hlavaty - Attack on the CoreNSC #2 - D3 02 - Peter Hlavaty - Attack on the Core
NSC #2 - D3 02 - Peter Hlavaty - Attack on the Core
 
When is something overflowing
When is something overflowingWhen is something overflowing
When is something overflowing
 
D1T3-Anto-Joseph-Droid-FF
D1T3-Anto-Joseph-Droid-FFD1T3-Anto-Joseph-Droid-FF
D1T3-Anto-Joseph-Droid-FF
 
Attack on the Core
Attack on the CoreAttack on the Core
Attack on the Core
 
The Python bites your apple
The Python bites your appleThe Python bites your apple
The Python bites your apple
 
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
 
What the fuzz
What the fuzzWhat the fuzz
What the fuzz
 
[CB16] About the cyber grand challenge: the world’s first all-machine hacking...
[CB16] About the cyber grand challenge: the world’s first all-machine hacking...[CB16] About the cyber grand challenge: the world’s first all-machine hacking...
[CB16] About the cyber grand challenge: the world’s first all-machine hacking...
 
Henrique Dantas - API fuzzing using Swagger
Henrique Dantas - API fuzzing using SwaggerHenrique Dantas - API fuzzing using Swagger
Henrique Dantas - API fuzzing using Swagger
 
SmartphoneHacking_Android_Exploitation
SmartphoneHacking_Android_ExploitationSmartphoneHacking_Android_Exploitation
SmartphoneHacking_Android_Exploitation
 
American Fuzzy Lop
American Fuzzy LopAmerican Fuzzy Lop
American Fuzzy Lop
 
Bug Hunting with Media Formats
Bug Hunting with Media FormatsBug Hunting with Media Formats
Bug Hunting with Media Formats
 
Discovering Vulnerabilities For Fun and Profit
Discovering Vulnerabilities For Fun and ProfitDiscovering Vulnerabilities For Fun and Profit
Discovering Vulnerabilities For Fun and Profit
 
The Nightmare Fuzzing Suite and Blind Code Coverage Fuzzer
The Nightmare Fuzzing Suite and Blind Code Coverage FuzzerThe Nightmare Fuzzing Suite and Blind Code Coverage Fuzzer
The Nightmare Fuzzing Suite and Blind Code Coverage Fuzzer
 
Hacking Web Apps by Brent White
Hacking Web Apps by Brent WhiteHacking Web Apps by Brent White
Hacking Web Apps by Brent White
 
High Definition Fuzzing; Exploring HDMI vulnerabilities
High Definition Fuzzing; Exploring HDMI vulnerabilitiesHigh Definition Fuzzing; Exploring HDMI vulnerabilities
High Definition Fuzzing; Exploring HDMI vulnerabilities
 
Beyond Automated Testing - RVAsec 2016
Beyond Automated Testing - RVAsec 2016Beyond Automated Testing - RVAsec 2016
Beyond Automated Testing - RVAsec 2016
 

Ähnlich wie 50 Shades of Fuzzing by Peter Hlavaty & Marco Grassi

2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing
2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing
2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing
Stephan Chenette
 
Building Custom Android Malware BruCON 2013
Building Custom Android Malware BruCON 2013Building Custom Android Malware BruCON 2013
Building Custom Android Malware BruCON 2013
Stephan Chenette
 
MvvmCross Introduction
MvvmCross IntroductionMvvmCross Introduction
MvvmCross Introduction
Stuart Lodge
 

Ähnlich wie 50 Shades of Fuzzing by Peter Hlavaty & Marco Grassi (20)

Security research over Windows #defcon china
Security research over Windows #defcon chinaSecurity research over Windows #defcon china
Security research over Windows #defcon china
 
2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing
2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing
2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing
 
The Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDThe Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CD
 
DEF CON 27 - workshop - RICHARD GOLD - mind the gap
DEF CON 27 - workshop - RICHARD GOLD - mind the gapDEF CON 27 - workshop - RICHARD GOLD - mind the gap
DEF CON 27 - workshop - RICHARD GOLD - mind the gap
 
SCADA Software or Swiss Cheese Software?  by Celil UNUVER
SCADA Software or Swiss Cheese Software?  by Celil UNUVERSCADA Software or Swiss Cheese Software?  by Celil UNUVER
SCADA Software or Swiss Cheese Software?  by Celil UNUVER
 
Devoxx UK 22: Debugging Java Microservices "Remocally" in Kubernetes with Tel...
Devoxx UK 22: Debugging Java Microservices "Remocally" in Kubernetes with Tel...Devoxx UK 22: Debugging Java Microservices "Remocally" in Kubernetes with Tel...
Devoxx UK 22: Debugging Java Microservices "Remocally" in Kubernetes with Tel...
 
Rainbow Over the Windows: More Colors Than You Could Expect
Rainbow Over the Windows: More Colors Than You Could ExpectRainbow Over the Windows: More Colors Than You Could Expect
Rainbow Over the Windows: More Colors Than You Could Expect
 
CloudStack Secured
CloudStack SecuredCloudStack Secured
CloudStack Secured
 
OWASP Poland Day 2018 - Andrzej Dyjak - Zero Trust Theorem
OWASP Poland Day 2018 - Andrzej Dyjak - Zero Trust TheoremOWASP Poland Day 2018 - Andrzej Dyjak - Zero Trust Theorem
OWASP Poland Day 2018 - Andrzej Dyjak - Zero Trust Theorem
 
SCADA Software or Swiss Cheese Software - CODE BLUE, Japan
SCADA Software or Swiss Cheese Software - CODE BLUE, JapanSCADA Software or Swiss Cheese Software - CODE BLUE, Japan
SCADA Software or Swiss Cheese Software - CODE BLUE, Japan
 
DEF CON 27 - WENXIANG QIAN and YUXIANG LI HUIYU - breaking google home exploi...
DEF CON 27 - WENXIANG QIAN and YUXIANG LI HUIYU - breaking google home exploi...DEF CON 27 - WENXIANG QIAN and YUXIANG LI HUIYU - breaking google home exploi...
DEF CON 27 - WENXIANG QIAN and YUXIANG LI HUIYU - breaking google home exploi...
 
Intro to Node.js (for .NET Developers)
Intro to Node.js (for .NET Developers)Intro to Node.js (for .NET Developers)
Intro to Node.js (for .NET Developers)
 
Node azure
Node azureNode azure
Node azure
 
Securing your Cloud Environment v2
Securing your Cloud Environment v2Securing your Cloud Environment v2
Securing your Cloud Environment v2
 
321 codeincontainer brewbox
321 codeincontainer brewbox321 codeincontainer brewbox
321 codeincontainer brewbox
 
Building Custom Android Malware BruCON 2013
Building Custom Android Malware BruCON 2013Building Custom Android Malware BruCON 2013
Building Custom Android Malware BruCON 2013
 
Sandbox detection: leak, abuse, test - Hacktivity 2015
Sandbox detection: leak, abuse, test - Hacktivity 2015Sandbox detection: leak, abuse, test - Hacktivity 2015
Sandbox detection: leak, abuse, test - Hacktivity 2015
 
Container Days: Easy Debugging of Microservices Running on Kubernetes with Te...
Container Days: Easy Debugging of Microservices Running on Kubernetes with Te...Container Days: Easy Debugging of Microservices Running on Kubernetes with Te...
Container Days: Easy Debugging of Microservices Running on Kubernetes with Te...
 
MvvmCross Introduction
MvvmCross IntroductionMvvmCross Introduction
MvvmCross Introduction
 
MvvmCross Seminar
MvvmCross SeminarMvvmCross Seminar
MvvmCross Seminar
 

Mehr von Shakacon

Pwned in Translation - from Subtitles to RCE
Pwned in Translation - from Subtitles to RCEPwned in Translation - from Subtitles to RCE
Pwned in Translation - from Subtitles to RCE
Shakacon
 
Oversight: Exposing spies on macOS
Oversight: Exposing spies on macOS Oversight: Exposing spies on macOS
Oversight: Exposing spies on macOS
Shakacon
 
A Decompiler for Blackhain-Based Smart Contracts Bytecode
A Decompiler for Blackhain-Based Smart Contracts BytecodeA Decompiler for Blackhain-Based Smart Contracts Bytecode
A Decompiler for Blackhain-Based Smart Contracts Bytecode
Shakacon
 
Reviewing the Security of ASoC Drivers in Android Kernel
Reviewing the Security of ASoC Drivers in Android KernelReviewing the Security of ASoC Drivers in Android Kernel
Reviewing the Security of ASoC Drivers in Android Kernel
Shakacon
 
When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...
When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...
When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...
Shakacon
 

Mehr von Shakacon (20)

Web (dis)assembly
Web (dis)assemblyWeb (dis)assembly
Web (dis)assembly
 
Macdoored
MacdooredMacdoored
Macdoored
 
I can be apple and so can you
I can be apple and so can youI can be apple and so can you
I can be apple and so can you
 
Cloud forensics putting the bits back together
Cloud forensics putting the bits back togetherCloud forensics putting the bits back together
Cloud forensics putting the bits back together
 
Pwned in Translation - from Subtitles to RCE
Pwned in Translation - from Subtitles to RCEPwned in Translation - from Subtitles to RCE
Pwned in Translation - from Subtitles to RCE
 
Oversight: Exposing spies on macOS
Oversight: Exposing spies on macOS Oversight: Exposing spies on macOS
Oversight: Exposing spies on macOS
 
Modern Reconnaissance Phase on APT - protection layer
Modern Reconnaissance Phase on APT - protection layerModern Reconnaissance Phase on APT - protection layer
Modern Reconnaissance Phase on APT - protection layer
 
Shamoon
ShamoonShamoon
Shamoon
 
A Decompiler for Blackhain-Based Smart Contracts Bytecode
A Decompiler for Blackhain-Based Smart Contracts BytecodeA Decompiler for Blackhain-Based Smart Contracts Bytecode
A Decompiler for Blackhain-Based Smart Contracts Bytecode
 
Honey, I Stole Your C2 Server: A Dive into Attacker Infrastructure
Honey, I Stole Your C2 Server:  A Dive into Attacker InfrastructureHoney, I Stole Your C2 Server:  A Dive into Attacker Infrastructure
Honey, I Stole Your C2 Server: A Dive into Attacker Infrastructure
 
Dock ir incident response in a containerized, immutable, continually deploy...
Dock ir   incident response in a containerized, immutable, continually deploy...Dock ir   incident response in a containerized, immutable, continually deploy...
Dock ir incident response in a containerized, immutable, continually deploy...
 
Reviewing the Security of ASoC Drivers in Android Kernel
Reviewing the Security of ASoC Drivers in Android KernelReviewing the Security of ASoC Drivers in Android Kernel
Reviewing the Security of ASoC Drivers in Android Kernel
 
Silent Protest: A Wearable Protest Network
Silent Protest:  A Wearable Protest NetworkSilent Protest:  A Wearable Protest Network
Silent Protest: A Wearable Protest Network
 
WiFi-Based IMSI Catcher
WiFi-Based IMSI CatcherWiFi-Based IMSI Catcher
WiFi-Based IMSI Catcher
 
Sad Panda Analysts: Devolving Malware
Sad Panda Analysts:  Devolving MalwareSad Panda Analysts:  Devolving Malware
Sad Panda Analysts: Devolving Malware
 
reductio [ad absurdum]
reductio [ad absurdum]reductio [ad absurdum]
reductio [ad absurdum]
 
XFLTReat: a new dimension in tunnelling
XFLTReat:  a new dimension in tunnellingXFLTReat:  a new dimension in tunnelling
XFLTReat: a new dimension in tunnelling
 
Windows Systems & Code Signing Protection by Paul Rascagneres
Windows Systems & Code Signing Protection by Paul RascagneresWindows Systems & Code Signing Protection by Paul Rascagneres
Windows Systems & Code Signing Protection by Paul Rascagneres
 
When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...
When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...
When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...
 
The Search for the Perfect Door - Deviant Ollam
The Search for the Perfect Door - Deviant OllamThe Search for the Perfect Door - Deviant Ollam
The Search for the Perfect Door - Deviant Ollam
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Kürzlich hochgeladen (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

50 Shades of Fuzzing by Peter Hlavaty & Marco Grassi