На канале "Black Hat" было опубликовано видео: Strengthening Cyber Resiliency in a Time of Geopolitical Crises...
YouTube
Strengthening Cyber Resiliency in a Time of Geopolitical Crises...
The basis of our presentation is the long-term monitoring of the development of the attackers on the Russian scene, their maturity and goals. This interest was logically strengthened by the conflict in Ukraine when the Czech Republic also became their target.…
На канале "Black Hat" было опубликовано видео: Microsoft Defender for Office 365 Evasion - The Story of Confirmed Vulnerability
YouTube
Microsoft Defender for Office 365 Evasion - The Story of Confirmed Vulnerability
Microsoft Defender for Office 365 safeguards your organization against malicious threats posed by email messages, links (URLs), and collaboration tools. Safe Attachments routes all messages and attachments that do not have a virus/malware signature to a special…
На канале "Black Hat" было опубликовано видео: Practically-exploitable Cryptographic Vulnerabilities in Matrix
YouTube
Practically-exploitable Cryptographic Vulnerabilities in Matrix
We report several practically-exploitable cryptographic vulnerabilities in the Matrix standard for federated realtime communication and its flagship client and prototype implementation, Element. These, together, invalidate the confidentiality and authentication…
На канале "Black Hat" было опубликовано видео: {JS-ON: Security-OFF}: Abusing JSON-Based SQL Queries
YouTube
{JS-ON: Security-OFF}: Abusing JSON-Based SQL Queries
All major SQL-based database engines such as Postgres, SQLite, MS SQL, and MySQL have in the last few years started to adopt native JSON features that enable data interactions with complicated JSON-type objects. While these native JSON features are enabled…
На канале "Black Hat" было опубликовано видео: Vlind Glitch: Blind VCC Glitching Technique to Bypass the Secure Boot of Qualcomm MSM8916 Mobile SoC
YouTube
Vlind Glitch: Blind VCC Glitching Technique to Bypass the Secure Boot of Qualcomm MSM8916 Mobile SoC
...In this talk, we will present a Blind VCC glitch (Vlind Glitch) method to bypass bootroms' secure boot mechanisms without requiring source or binary code. In other words, we do not have to know things like the code we are glitching, how the secure boot…
На канале "Black Hat" было опубликовано видео: Abusing CNC Technologies
YouTube
Abusing CNC Technologies
CNC machines are largely used in production plants and constitute a critical asset for organizations globally. The strong push dictated by the Industry 4.0 paradigm led to the introduction of technologies for the wide connectivity of industrial equipment…
На канале "Black Hat" было опубликовано видео: Select Bugs From Binary Where Pattern Like CVE-1337-Days
YouTube
Select Bugs From Binary Where Pattern Like CVE-1337-Days
Static code review is an effective way to discover vulnerability variants and exploitation primitives, but two of the most challenging tasks for static analysis are the effective code pattern extraction from huge amounts of various bugs and the efficient…
На канале "Black Hat" было опубликовано видео: The Hacker's Guide to Policyland
YouTube
The Hacker's Guide to Policyland
...In this talk, Irfan Hemani of the Department for Digital, Culture, Media and Sport, and cybersecurity adviser, Jen Ellis, will provide a comprehensive view of the government's policy priorities and focus areas for cybersecurity. We will discuss the status…
На канале "Black Hat" было опубликовано видео: Writing Your Own Ticket to the Cloud Like APT: A Dive to AD FS Attacks, Detections, and Mitigations
YouTube
Writing Your Own Ticket to the Cloud Like APT: A Dive to AD FS Attacks, Detections, and Mitigations
Azure Active Directory (Azure AD) is Microsoft's cloud-based identity and access management solution used by Microsoft 365, Azure, and thousands of third-party service providers. Almost all Fortune 500 companies have adopted Azure AD, mainly by consuming…
На канале "Black Hat" было опубликовано видео: From Finding New Type of Logical Flaw at Linux Kernel To Developing New Heap Exploitation Technique
YouTube
From Finding New Type of Logical Flaw at Linux Kernel To Developing New Heap Exploitation Technique
Reliable exploitation is the key requirement for highly targeted and valuable attacks (such as APT). If the exploitation is not reliable, the exploitation may be fragile and thus fail (e.g., a kernel crash or panic), which would be easily noticed by others.…
На канале "Black Hat" было опубликовано видео: Locknote: Conclusions and Key Takeaways from Day 2
YouTube
Locknote: Conclusions and Key Takeaways from Day 2
To close out Black Hat Europe 2022, join Black Hat Founder Jeff Moss and Review Board members Jiska Classen, Federico Maggi, Leigh-Anne Galloway and Anant Shrivastava for an insightful conversation on the most pressing issues facing the InfoSec community.…
На канале "Black Hat" было опубликовано видео: How We Organize Large-Scale DDoS Exercises in the Netherlands
YouTube
How We Organize Large-Scale DDoS Exercises in the Netherlands
In the Netherlands, following a large number of DDoS attacks experienced in January 2018, it was apparent that things needed to change. Specifically, we decided to implement the concept of cooperative DDoS mitigation at the national level. To that end, we…
На канале "Black Hat" было опубликовано видео: Exploring a New Class of Kernel Exploit Primitive
YouTube
Exploring a New Class of Kernel Exploit Primitive
Microsoft Security Response Center receives and examines many interesting bug classes. Often, the exploitability of those bugs is apparent, but this is not always the case. One interesting outlier is an arbitrary kernel pointer read primitive where the attacker…
На канале "Black Hat" было опубликовано видео: LCDPwn: Breaking Enterprise-Things with Layer 2 Discovery Protocol Vulnerabilities Again
YouTube
LCDPwn: Breaking Enterprise-Things with Layer 2 Discovery Protocol Vulnerabilities Again
When targeting enterprise devices, compared to higher layer protocols, the attack surface exposed by layer 2 protocols is often neglected. The recent research CDPwn, conducted by the Armis labs, sheds light on the severe impact of attack surface exposed by…
На канале "Black Hat" было опубликовано видео: Grand Theft Drone: Reaching Breaking Point in Drone Proprietary RF Link Security
YouTube
Grand Theft Drone: Reaching Breaking Point in Drone Proprietary RF Link Security
The drone industry is under enormous change, and the technology in the remote control for drones has vastly improved. Nevertheless, many remote control vendors reveal a lack of security features, and they use proprietary protocols instead of standard ones.…
На канале "Black Hat" было опубликовано видео: Fuzzing and Breaking Security Functions of SIMATIC PLCs
YouTube
Fuzzing and Breaking Security Functions of SIMATIC PLCs
...In this presentation, I will take Siemens S7-1500/S7-1200 PLC with enhanced security design as the target, and elaborate on the following aspects: cracking TLS secure communication protocol, security protocol Fuzzing testing, high risk vulnerability analysis…
На канале "Black Hat" было опубликовано видео: Good Motive but Bad Design: Pitfalls in MPU Usage in Embedded Systems in the Wild
YouTube
Good Motive but Bad Design: Pitfalls in MPU Usage in Embedded Systems in the Wild
As more and more microcontroller-based embedded devices are connected to the Internet, as part of the Internet-of-Things (IoT), previously less tested (and insecure) devices are exposed to miscreants. To prevent them from being compromised, the memory protection…
На канале "Black Hat" было опубликовано видео: Design Flaws and Deployment Chaos in Cloud-based IoT Access Control Policies
YouTube
Design Flaws and Deployment Chaos in Cloud-based IoT Access Control Policies
Modern internet-of-things device manufacturers are taking advantage of the managed Platform-as-a-Service (PaaS) and Infrastructure-as-a-Service (IaaS) IoT clouds (e.g., AWS IoT, Azure IoT) for secure and convenient IoT development/deployment. The IoT access…
На канале "Black Hat" было опубликовано видео: Knockout Win Against TCC - 20+ NEW Ways to Bypass Your MacOS Privacy Mechanisms
YouTube
Knockout Win Against TCC - 20+ NEW Ways to Bypass Your MacOS Privacy Mechanisms
...During this talk, we will give you an overview of the TCC framework, its building blocks, and how it limits application access to private data. We will explore the various databases it uses and discuss the difference between user consent and user intent.…
На канале "Black Hat" было опубликовано видео: Aikido: Turning EDRs to Malicious Wipers Using 0-day Exploits
YouTube
Aikido: Turning EDRs to Malicious Wipers Using 0-day Exploits
Wipers are becoming the go-to tool for nation-state cyber warfare in the last decade since the Shamoon attack. Wipers have been used by Russia, Iran, North Korea, and other APTs to support offensive acts. One of the most famous recent attacks was launched…