Use-After-Use-After-Free: Exploit UAF by Generating Your Own
This talk will introduce Use-After-Use-After-Free (UAUAF), a novel and relatively universal exploitation technique for UAF vulnerabilities in Adobe Flash. By…Подробнее
This talk will introduce Use-After-Use-After-Free (UAUAF), a novel and relatively universal exploitation technique for UAF vulnerabilities in Adobe Flash. By…Подробнее
Following recent security issues discovered in Android, Google made a number of changes to tighten security across its fragmented landscape.…Подробнее
Over the years, obfuscation has taken a significant place in the software protection field. The term generally embraces any mean…Подробнее
Since win8, Microsoft introduced a variety of exploit mitigations into Windows kernel, such as Kernel DEP,KASLR,SMEP; this made the exploit…Подробнее
In this presentation, we will reveal the “Open Sesame” vulnerability, a much more powerful vulnerability in Cortana that allows attackers…Подробнее
I will discuss each of the techniques the malware author used in order to prevent reverse engineering of their Android…Подробнее
Modern web applications are composed from a crude patchwork of caches and content delivery networks. In this session I’ll show…Подробнее
The goal of this talk is to provide a penetration tester experienced in exploitation and post-exploitation of networks and systems…Подробнее
SirenJack is a vulnerability that was found to affect radio-controlled emergency warning siren systems from ATI Systems. It allows a…Подробнее
In this talk, vulnerabilities that affect millions of traders will be shown in detail. Among them are unencrypted authentication, communications,…Подробнее
This talk will demonstrate what everyone has long feared but never proven: there are hardware backdoors in some x86 processors,…Подробнее
In this talk, we’ll first dive into what it takes to create an effective firewall for macOS. Yes we’ll discuss…Подробнее
Sean Convery, VP and GM Security and Risk Business Unit at ServiceNow discusses best practices on how cybersecurity leaders avoid…Подробнее
It’s the 20th Black Hat, and it’s been a wild ride from 1997 to 2017. So, what will happen over…Подробнее
Cyber threats are intensifying dramatically, with growing global concerns about attacks on critical infrastructure, as well as political parties and…Подробнее
In this work, we demonstrate the feasibility of the large-scale scanning over the 3G/4G intranet. First, we adapt the Nmap…Подробнее
Security teams must address the countless vulnerabilities in popular document formats like PDFs, Office files and legacy textual formats. This…Подробнее
Active Directory (AD) object discretionary access control lists (DACLs) are an untapped offensive landscape, often overlooked by attackers and defenders…Подробнее
Meet Broadpwn, a vulnerability in Broadcom’s Wi-Fi chipsets which affects millions of Android and iOS devices, and can be triggered…Подробнее
In this talk we’ll cover the psychology of phishing, then walk through a series of real-world attacks conducted against a…Подробнее
While both the SYSTEM_ALERT_WINDOW and the BIND_ACCESSIBILITY_SERVICE Android permissions have been abused individually (e.g., in UI redressing attacks, accessibility attacks),…Подробнее
A processor is not a trusted black box for running code; on the contrary, modern x86 chips are packed full…Подробнее
Attackers, administrators and many legitimate products rely on PowerShell for their core functionality. However, being a Windows-signed binary native on…Подробнее
Best of Black Hat USA 2017 Briefings Winner How did the Feds catch the notorious Russian computer hacker Roman Seleznev…Подробнее