Tag Archive for: CON

DEF CON Safe Mode Demo Labs – Ajin Abraham – Mobile App Security Testing with MobSF



Top Hacks from Black Hat and DEF CON 2021


Tools, techniques, and (hybrid) procedures

Top hacks from Black Hat and DEF CON 2021

Hacker Summer Camp 2021 adopted a hybrid format this year, as the restrictions imposed by the ongoing coronavirus epidemic meant that the majority of participants to Black Hat and DEF CON tuned in online rather than turning up in Las Vegas.

CATCH UP Black Hat 2021: Zero-days, ransoms, supply chains, oh my!

Security researchers made up for the lack of audience interaction by showing that – like the athletes competing at this month’s Olympics and Paralympics – they could go faster, higher, and stronger together.

Still catching up on the proceedings? Look no further:

Attacking Let’s Encrypt

Researchers showed how to circumvent domain validation controls from Lets Encrypt

At Black Hat, researchers from the Fraunhofer Institute for Secure Information Technology showed how the security controls introduced with Let’s Encrypt’s multi-perspective validation feature might be abused.

Circumventing these controls, which were introduced in February 2020 in response to earlier attacks, makes it possible for attackers to get digital certificates for web domains they do now own, offering a springboard for phishing attacks or other scams.

By introducing packet loss or latency to connections to some of the nameservers, an attacker could force the system to rely on a nameserver of their choice – downgrading the security offered by multiperspective validation.

The work shows that domain validation, though it enjoys advantages because it is low cost and lends itself to automation, is not yet secure and needs to be refined in order to become more effective as a barrier to fraud.

Pulling the pin on FragAttacks

At Black Hat, security researcher Mathy Vanhoef shared his impressive work on FragAttacks fragmentation and aggregation attacks) and – with the help of Tom Van Goethem – timing attacks.

For the former, he described how implementation flaws and design vulnerabilities in WiFi’s frame aggregation and fragmentation features affect all protected WiFi networks, and even the WEP protocol dating back to 1997.

Certain implementation bugs were particularly widespread and trivial to exploit, he warned.

The gradual adoption of ‘operating channel validation’ (PDF) and ‘beacon protection’…

Source…

Security Innovation Experts Bring Exploit Expertise to Black Hat 2021 and DEF CON 29 for Fifth …


Press release content from Globe Newswire. The AP news staff was not involved in its creation.

WILMINGTON, Mass., Aug. 04, 2021 (GLOBE NEWSWIRE) — Security Innovation, an authority in software security assessments and training, is delivering advanced training workshops and hands-on hacking at the Black Hat USA and DEF CON 29 conferences. Among the premier cybersecurity events in the world, these annual conferences convene the most innovative and creative researchers to explore new exploits, discuss trends and findings, and collaborate on pressing cyber security issues.

Offensive Mobile Reversing & Exploitation
The company’s Mobile Center-of-Excellence lead, Dinesh Shetty, returned to Black Hat USA 2021 and Black Hat Asia 2021 with an updated version of this popular course that includes expanded coverage of ARM64, mobile browser security, and more in-depth coverage of Mobile apps and operating system security.

House of Heap Workshop
The sold out House of Heap Workworkshop at DEF CON 29 is the results of over a year’s worth of research. This hands-on introduction to GLibC Malloc heap exploitation will help attendees learn how the allocator functions, understand heap specific vulnerability classes, and gain root access with a variety of techniques.

“Heap exploitation is a subject that has evaded many people for years for one primary reason – they focus on the techniques instead of the allocator, said Maxwell Dulin, Security Consultant at Security Innovation. “By learning with an allocator-first style, the techniques are easily understood and practical to use. I look forward to presenting this novel approach.”

Three Security Innovation engineers with deep expertise in Heap exploitation will join Maxwell to ensure students get the most tailored training possible:

  • James Dolan, Security Engineer
  • Nathan Kirkland, Security Researcher & Engineer
  • Zachary Minneker, Security Researcher & Engineer

DevOps CTF
Security Innovation is running one of the DEF CON CTF events again this year. InfiniCrate is the company’s latest cyber range, an ultra-realistic cloud storage repository…

Source…