2024年美国黑帽大会(Black Hat USA 2024)嘉宾演讲PPT合集(共82套打包)

2024年美国黑帽大会(Black Hat USA 2024)嘉宾演讲PPT合集(共82套打包)

更新时间:2025-12-03 报告数量:82份

那个赌博网站?它背后有中国有组织犯罪集团撑腰.pdf   那个赌博网站?它背后有中国有组织犯罪集团撑腰.pdf
防守方是否取胜?.pdf   防守方是否取胜?.pdf
让缓存缓存让 WebAssembly 组装:敲响 Chrome 的外壳.pdf   让缓存缓存让 WebAssembly 组装:敲响 Chrome 的外壳.pdf
靠微软 Copilot 生活.pdf   靠微软 Copilot 生活.pdf
评估国家网络安全战略的框架.pdf   评估国家网络安全战略的框架.pdf
激光束与光流:让黑客尽情攻击打造价格亲民的基于光的硬件安全工具.pdf   激光束与光流:让黑客尽情攻击打造价格亲民的基于光的硬件安全工具.pdf
巴别塔倒塌:利用异构控制协议入侵无线网状网络.pdf   巴别塔倒塌:利用异构控制协议入侵无线网状网络.pdf
利用Wi-Fi定位系统监视大众.pdf   利用Wi-Fi定位系统监视大众.pdf
从HAL到HALT:在人工智能编码时代挫败天网的同胞.pdf   从HAL到HALT:在人工智能编码时代挫败天网的同胞.pdf
追溯源头:在深度伪造时代辨别内容真实性.pdf   追溯源头:在深度伪造时代辨别内容真实性.pdf
破坏派对:RPKI 验证中的漏洞.pdf   破坏派对:RPKI 验证中的漏洞.pdf
揭开九头蛇的真面目:曝光中国政府支持的针对外国政府的多头行动.pdf   揭开九头蛇的真面目:曝光中国政府支持的针对外国政府的多头行动.pdf
利用代码基因组框架揭露供应链攻击.pdf   利用代码基因组框架揭露供应链攻击.pdf
网络保险基础知识.pdf   网络保险基础知识.pdf
利用网络保险加强网络安全.pdf   利用网络保险加强网络安全.pdf
通过鲜为人知的远程攻击面远程、一键式突破智能手机.pdf   通过鲜为人知的远程攻击面远程、一键式突破智能手机.pdf
克服状态漏洞:通过模糊测试二层网络来发现基带漏洞.pdf   克服状态漏洞:通过模糊测试二层网络来发现基带漏洞.pdf
破解5G堡垒:窥探5G的脆弱深渊.pdf   破解5G堡垒:窥探5G的脆弱深渊.pdf
15种方法让你的副驾驶崩溃.pdf   15种方法让你的副驾驶崩溃.pdf
攻击三星 Galaxy A_ 启动链及其他.pdf   攻击三星 Galaxy A_ 启动链及其他.pdf
利用侧信道攻击绕过 ARM 的内存标记扩展.pdf   利用侧信道攻击绕过 ARM 的内存标记扩展.pdf
停止!使用内核机器学习对可利用的函数和模块进行沙箱隔离.pdf   停止!使用内核机器学习对可利用的函数和模块进行沙箱隔离.pdf
一招制胜:在工作流自动化、虚拟语音助手、物联网和LLM服务集成平台中实现普遍的账户接管.pdf   一招制胜:在工作流自动化、虚拟语音助手、物联网和LLM服务集成平台中实现普遍的账户接管.pdf
杀手锏:破解苹果新款 USB-C 控制器.pdf   杀手锏:破解苹果新款 USB-C 控制器.pdf
向左滑动即可面临身份盗窃:基于位置的约会应用用户数据隐私风险分析.pdf   向左滑动即可面临身份盗窃:基于位置的约会应用用户数据隐私风险分析.pdf
利用 RISC-V 架构 CPU 零日漏洞进行任意数据操纵和泄露.pdf   利用 RISC-V 架构 CPU 零日漏洞进行任意数据操纵和泄露.pdf
不S7ill 并不安全:从 S7 PLC 窃取私钥.pdf   不S7ill 并不安全:从 S7 PLC 窃取私钥.pdf
Hack@DAC 的故事:从组织全球最大规模硬件黑客大赛中汲取的经验教训.pdf   Hack@DAC 的故事:从组织全球最大规模硬件黑客大赛中汲取的经验教训.pdf
黑客如何改变媒体(媒体又如何改变黑客).pdf   黑客如何改变媒体(媒体又如何改变黑客).pdf
奥里·大卫_隧道视野探索VPN后利用技术.pdf   奥里·大卫_隧道视野探索VPN后利用技术.pdf
耶胡达·斯米尔诺夫_鱼钩、钓线与鱼饵网络钓鱼Windows Hello for Business.pdf   耶胡达·斯米尔诺夫_鱼钩、钓线与鱼饵网络钓鱼Windows Hello for Business.pdf
亚基尔·卡德科达与迈克尔·卡钦斯基与奥费克·伊塔赫_通过影子资源入侵AWS帐户.pdf   亚基尔·卡德科达与迈克尔·卡钦斯基与奥费克·伊塔赫_通过影子资源入侵AWS帐户.pdf
王楠与肖正航与郭学浩与戴秦润_超级帽子戏法四次利用Chrome和Firefox.pdf   王楠与肖正航与郭学浩与戴秦润_超级帽子戏法四次利用Chrome和Firefox.pdf
MICHAE~1.PDF   MICHAE~1.PDF
阿德南·汗与约翰·斯塔温斯基_自托管的GitHub CICD跑步者持续集成与持续毁灭.pdf   阿德南·汗与约翰·斯塔温斯基_自托管的GitHub CICD跑步者持续集成与持续毁灭.pdf
弗拉德斯拉夫·巴布金_保护网络设备新技术和旧挑战.pdf   弗拉德斯拉夫·巴布金_保护网络设备新技术和旧挑战.pdf
朱利安·沃伊辛_竞争性电子游戏中的现代反滥用机制.pdf   朱利安·沃伊辛_竞争性电子游戏中的现代反滥用机制.pdf
科里·米查尔与布兰登·莱文与本·普鲁斯_现代杀链现实世界SaaS攻击与缓解策略.pdf   科里·米查尔与布兰登·莱文与本·普鲁斯_现代杀链现实世界SaaS攻击与缓解策略.pdf
橙色蔡_混淆攻击利用Apache HTTP服务器中的隐藏语义模糊(预录).pdf   橙色蔡_混淆攻击利用Apache HTTP服务器中的隐藏语义模糊(预录).pdf
瓦西里奥斯·马夫鲁迪斯与杰米·加维斯与桑亚姆·维亚斯与克里斯·希克斯_深度强化学习代理中的深度后门.pdf   瓦西里奥斯·马夫鲁迪斯与杰米·加维斯与桑亚姆·维亚斯与克里斯·希克斯_深度强化学习代理中的深度后门.pdf
王昊与凯莱布·萨金特与哈里森·波默罗伊与雷纳娜·弗里德利希_进入收件箱新颖的电子邮件欺骗攻击模式.pdf   王昊与凯莱布·萨金特与哈里森·波默罗伊与雷纳娜·弗里德利希_进入收件箱新颖的电子邮件欺骗攻击模式.pdf
亚历克斯·普拉斯克特与罗伯特·埃雷拉_注意听Sonos的空中远程内核利用与秘密窃听.pdf   亚历克斯·普拉斯克特与罗伯特·埃雷拉_注意听Sonos的空中远程内核利用与秘密窃听.pdf
马胜豪与林宜安与马斯·程_注意力是语义检测所需的一切一种神经符号方法的变压器.pdf   马胜豪与林宜安与马斯·程_注意力是语义检测所需的一切一种神经符号方法的变压器.pdf
埃里克·伍德拉夫_未经授权的一种权限提升到全球管理员的技术.pdf   埃里克·伍德拉夫_未经授权的一种权限提升到全球管理员的技术.pdf
齐西斯·西亚尔韦拉斯_过去的错误VMware虚拟机管理程序上的漏洞狩猎之旅.pdf   齐西斯·西亚尔韦拉斯_过去的错误VMware虚拟机管理程序上的漏洞狩猎之旅.pdf
肯德拉·阿尔伯特与乔纳森·彭尼与拉姆·尚卡尔·希瓦·库马尔_忽略你的生成式AI安全指示违反CFAA.pdf   肯德拉·阿尔伯特与乔纳森·彭尼与拉姆·尚卡尔·希瓦·库马尔_忽略你的生成式AI安全指示违反CFAA.pdf
李中权与何其丹_揭开Mac安全沙盒和AppData TCC的全面探索.pdf   李中权与何其丹_揭开Mac安全沙盒和AppData TCC的全面探索.pdf
桑内·马萨克斯_揭开APT背后的思维分析借口在CTI和归因中的作用.pdf   桑内·马萨克斯_揭开APT背后的思维分析借口在CTI和归因中的作用.pdf
加雷斯·海耶斯_分裂邮件原子利用解析器绕过访问控制.pdf   加雷斯·海耶斯_分裂邮件原子利用解析器绕过访问控制.pdf
埃亚尔·帕兹与利亚德·科恩_我们能幸免于递归漏洞蝗虫吗.pdf   埃亚尔·帕兹与利亚德·科恩_我们能幸免于递归漏洞蝗虫吗.pdf
卡西米尔·舒尔茨与汤姆·博纳_所有这些不安全的序列化格式让我们陷入困境.pdf   卡西米尔·舒尔茨与汤姆·博纳_所有这些不安全的序列化格式让我们陷入困境.pdf
马丁·多伊纳德_全部缓存弯曲Web缓存利用规则.pdf   马丁·多伊纳德_全部缓存弯曲Web缓存利用规则.pdf
安德斯·福格与丹尼尔·格鲁斯_微架构漏洞的过去现在和未来.pdf   安德斯·福格与丹尼尔·格鲁斯_微架构漏洞的过去现在和未来.pdf
尼克·弗里谢特_踢开云的门利用云提供商漏洞获得初始访问权限.pdf   尼克·弗里谢特_踢开云的门利用云提供商漏洞获得初始访问权限.pdf
萨拉·法默_用于自主弹性网络防御的强化学习.pdf   萨拉·法默_用于自主弹性网络防御的强化学习.pdf
理查德·哈朗_实际LLM安全性收获一年中的经验教训.pdf   理查德·哈朗_实际LLM安全性收获一年中的经验教训.pdf
JS引擎的阿喀琉斯之踵:在WASM执行期间利用现代浏览器漏洞.pdf   JS引擎的阿喀琉斯之踵:在WASM执行期间利用现代浏览器漏洞.pdf
龚熙凌与邢选与尤金·罗迪奥诺夫_通往Android Root之路在智能手机上利用您的GPU.pdf   龚熙凌与邢选与尤金·罗迪奥诺夫_通往Android Root之路在智能手机上利用您的GPU.pdf
HD·摩尔与罗布·金_安全外壳混乱不堪.pdf   HD·摩尔与罗布·金_安全外壳混乱不堪.pdf
Toshinori Usui & Yuto Otsuki & Ryo Kubota & Yuhei Kawakoya & Makoto Iwamura & Kanta Matsuura_Bytecode Jiu-Jitsu Choking Interpreters to Force Execution of Malicious Bytecode.pdf   Toshinori Usui & Yuto Otsuki & Ryo Kubota & Yuhei Kawakoya & Makoto Iwamura & Kanta Matsuura_Bytecode Jiu-Jitsu Choking Interpreters to Force Execution of Malicious Bytecode.pdf
弗兰基·萨格曼_基于北约30年经验的外国信息操纵与干涉(虚假信息2.0).pdf   弗兰基·萨格曼_基于北约30年经验的外国信息操纵与干涉(虚假信息2.0).pdf
从低功耗到高功耗:通过蓝牙破解附近的电动汽车充电器.pdf   从低功耗到高功耗:通过蓝牙破解附近的电动汽车充电器.pdf
MaLDAPtive:深入剖析 LDAP 混淆、反混淆和检测.pdf   MaLDAPtive:深入剖析 LDAP 混淆、反混淆和检测.pdf
一次一个漏洞逐步破坏机密计算.pdf   一次一个漏洞逐步破坏机密计算.pdf
瑞安·凯恩与鲁尚克·谢蒂_即使你无法访问您的备份仍然不可更改吗.pdf   瑞安·凯恩与鲁尚克·谢蒂_即使你无法访问您的备份仍然不可更改吗.pdf
让-菲利普·奥马松与谢尔温·马杰里_加强银行级加密钱包的硬件安全模块.pdf   让-菲利普·奥马松与谢尔温·马杰里_加强银行级加密钱包的硬件安全模块.pdf
达莉亚·马纳托娃与让·坎普_关系重要重构勒索软件团伙的组织与社会结构.pdf   达莉亚·马纳托娃与让·坎普_关系重要重构勒索软件团伙的组织与社会结构.pdf
詹姆斯·凯特尔_倾听低语实际有效的Web计时攻击.pdf   詹姆斯·凯特尔_倾听低语实际有效的Web计时攻击.pdf
汤姆·多尔曼_所有你的秘密属于我们利用固件漏洞破解TEEs.pdf   汤姆·多尔曼_所有你的秘密属于我们利用固件漏洞破解TEEs.pdf
松尾和树_你已经被黑了如果你的UEFI OROM中有一个后门怎么办.pdf   松尾和树_你已经被黑了如果你的UEFI OROM中有一个后门怎么办.pdf
周亚金_利用您的法术针对您通过重用操作码跟踪进行智能合约漏洞威胁防范.pdf   周亚金_利用您的法术针对您通过重用操作码跟踪进行智能合约漏洞威胁防范.pdf
诺姆·摩西_从漏洞到取证证据解开Unitronics攻击.pdf   诺姆·摩西_从漏洞到取证证据解开Unitronics攻击.pdf
阿德里安·科勒萨与索林·博洛斯_从武器到目标量子计算机悖论.pdf   阿德里安·科勒萨与索林·博洛斯_从武器到目标量子计算机悖论.pdf
Qi Wang & Jianjun Chen & Run Guo & Chao Zhang & Haixin Duan_Break the Wall from Bottom Automated Discovery of Protocol-Level Evasion Vulnerabilities in Web Application Firewalls.pdf   Qi Wang & Jianjun Chen & Run Guo & Chao Zhang & Haixin Duan_Break the Wall from Bottom Automated Discovery of Protocol-Level Evasion Vulnerabilities in Web Application Firewalls.pdf
雅各布·拉尔森_从网络暴露到门口揭露黑客用于勒索的隐私入侵技术.pdf   雅各布·拉尔森_从网络暴露到门口揭露黑客用于勒索的隐私入侵技术.pdf
沙查尔·梅纳谢_从MLOps到MLOops暴露机器学习平台的攻击面.pdf   沙查尔·梅纳谢_从MLOps到MLOops暴露机器学习平台的攻击面.pdf
阿隆·列维夫_利用Windows更新的降级攻击.pdf   阿隆·列维夫_利用Windows更新的降级攻击.pdf
王琦与李翔与王楚涵_图门攻击系统地探索和利用DNS响应预处理中的逻辑漏洞和畸形数据包.pdf   王琦与李翔与王楚涵_图门攻击系统地探索和利用DNS响应预处理中的逻辑漏洞和畸形数据包.pdf
法比安·鲍默_陆龟攻击通过序列号操纵破坏SSH通道完整性.pdf   法比安·鲍默_陆龟攻击通过序列号操纵破坏SSH通道完整性.pdf
丹尼尔·格鲁斯与斯特凡·加斯特_蜗牛负载互联网上的任何人都可以了解你在做什么.pdf   丹尼尔·格鲁斯与斯特凡·加斯特_蜗牛负载互联网上的任何人都可以了解你在做什么.pdf
JOSHWI~1.PDF   JOSHWI~1.PDF
钱智云与胡佳毅与周金梦与唐奇与沈文博_PageJack一种强大的页面级UAF利用技术.pdf   钱智云与胡佳毅与周金梦与唐奇与沈文博_PageJack一种强大的页面级UAF利用技术.pdf

报告合集目录

报告预览

  • 全部
    • 2024年美国黑帽大会(Black Hat USA)嘉宾演讲PPT合集
      • 那个赌博网站?它背后有中国有组织犯罪集团撑腰.pdf
      • 防守方是否取胜?.pdf
      • 让缓存缓存让 WebAssembly 组装:敲响 Chrome 的外壳.pdf
      • 靠微软 Copilot 生活.pdf
      • 评估国家网络安全战略的框架.pdf
      • 激光束与光流:让黑客尽情攻击打造价格亲民的基于光的硬件安全工具.pdf
      • 巴别塔倒塌:利用异构控制协议入侵无线网状网络.pdf
      • 利用Wi-Fi定位系统监视大众.pdf
      • 从HAL到HALT:在人工智能编码时代挫败天网的同胞.pdf
      • 追溯源头:在深度伪造时代辨别内容真实性.pdf
      • 破坏派对:RPKI 验证中的漏洞.pdf
      • 揭开九头蛇的真面目:曝光中国政府支持的针对外国政府的多头行动.pdf
      • 利用代码基因组框架揭露供应链攻击.pdf
      • 网络保险基础知识.pdf
      • 利用网络保险加强网络安全.pdf
      • 通过鲜为人知的远程攻击面远程、一键式突破智能手机.pdf
      • 克服状态漏洞:通过模糊测试二层网络来发现基带漏洞.pdf
      • 破解5G堡垒:窥探5G的脆弱深渊.pdf
      • 15种方法让你的副驾驶崩溃.pdf
      • 攻击三星 Galaxy A_ 启动链及其他.pdf
      • 利用侧信道攻击绕过 ARM 的内存标记扩展.pdf
      • 停止!使用内核机器学习对可利用的函数和模块进行沙箱隔离.pdf
      • 一招制胜:在工作流自动化、虚拟语音助手、物联网和LLM服务集成平台中实现普遍的账户接管.pdf
      • 杀手锏:破解苹果新款 USB-C 控制器.pdf
      • 向左滑动即可面临身份盗窃:基于位置的约会应用用户数据隐私风险分析.pdf
      • 利用 RISC-V 架构 CPU 零日漏洞进行任意数据操纵和泄露.pdf
      • 不S7ill 并不安全:从 S7 PLC 窃取私钥.pdf
      • Hack@DAC 的故事:从组织全球最大规模硬件黑客大赛中汲取的经验教训.pdf
      • 黑客如何改变媒体(媒体又如何改变黑客).pdf
      • 奥里·大卫_隧道视野探索VPN后利用技术.pdf
      • 耶胡达·斯米尔诺夫_鱼钩、钓线与鱼饵网络钓鱼Windows Hello for Business.pdf
      • 亚基尔·卡德科达与迈克尔·卡钦斯基与奥费克·伊塔赫_通过影子资源入侵AWS帐户.pdf
      • 王楠与肖正航与郭学浩与戴秦润_超级帽子戏法四次利用Chrome和Firefox.pdf
      • MICHAE~1.PDF
      • 阿德南·汗与约翰·斯塔温斯基_自托管的GitHub CICD跑步者持续集成与持续毁灭.pdf
      • 弗拉德斯拉夫·巴布金_保护网络设备新技术和旧挑战.pdf
      • 朱利安·沃伊辛_竞争性电子游戏中的现代反滥用机制.pdf
      • 科里·米查尔与布兰登·莱文与本·普鲁斯_现代杀链现实世界SaaS攻击与缓解策略.pdf
      • 橙色蔡_混淆攻击利用Apache HTTP服务器中的隐藏语义模糊(预录).pdf
      • 瓦西里奥斯·马夫鲁迪斯与杰米·加维斯与桑亚姆·维亚斯与克里斯·希克斯_深度强化学习代理中的深度后门.pdf
      • 王昊与凯莱布·萨金特与哈里森·波默罗伊与雷纳娜·弗里德利希_进入收件箱新颖的电子邮件欺骗攻击模式.pdf
      • 亚历克斯·普拉斯克特与罗伯特·埃雷拉_注意听Sonos的空中远程内核利用与秘密窃听.pdf
      • 马胜豪与林宜安与马斯·程_注意力是语义检测所需的一切一种神经符号方法的变压器.pdf
      • 埃里克·伍德拉夫_未经授权的一种权限提升到全球管理员的技术.pdf
      • 齐西斯·西亚尔韦拉斯_过去的错误VMware虚拟机管理程序上的漏洞狩猎之旅.pdf
      • 肯德拉·阿尔伯特与乔纳森·彭尼与拉姆·尚卡尔·希瓦·库马尔_忽略你的生成式AI安全指示违反CFAA.pdf
      • 李中权与何其丹_揭开Mac安全沙盒和AppData TCC的全面探索.pdf
      • 桑内·马萨克斯_揭开APT背后的思维分析借口在CTI和归因中的作用.pdf
      • 加雷斯·海耶斯_分裂邮件原子利用解析器绕过访问控制.pdf
      • 埃亚尔·帕兹与利亚德·科恩_我们能幸免于递归漏洞蝗虫吗.pdf
      • 卡西米尔·舒尔茨与汤姆·博纳_所有这些不安全的序列化格式让我们陷入困境.pdf
      • 马丁·多伊纳德_全部缓存弯曲Web缓存利用规则.pdf
      • 安德斯·福格与丹尼尔·格鲁斯_微架构漏洞的过去现在和未来.pdf
      • 尼克·弗里谢特_踢开云的门利用云提供商漏洞获得初始访问权限.pdf
      • 萨拉·法默_用于自主弹性网络防御的强化学习.pdf
      • 理查德·哈朗_实际LLM安全性收获一年中的经验教训.pdf
      • JS引擎的阿喀琉斯之踵:在WASM执行期间利用现代浏览器漏洞.pdf
      • 龚熙凌与邢选与尤金·罗迪奥诺夫_通往Android Root之路在智能手机上利用您的GPU.pdf
      • HD·摩尔与罗布·金_安全外壳混乱不堪.pdf
      • Toshinori Usui & Yuto Otsuki & Ryo Kubota & Yuhei Kawakoya & Makoto Iwamura & Kanta Matsuura_Bytecode Jiu-Jitsu Choking Interpreters to Force Execution of Malicious Bytecode.pdf
      • 弗兰基·萨格曼_基于北约30年经验的外国信息操纵与干涉(虚假信息2.0).pdf
      • 从低功耗到高功耗:通过蓝牙破解附近的电动汽车充电器.pdf
      • MaLDAPtive:深入剖析 LDAP 混淆、反混淆和检测.pdf
      • 一次一个漏洞逐步破坏机密计算.pdf
      • 瑞安·凯恩与鲁尚克·谢蒂_即使你无法访问您的备份仍然不可更改吗.pdf
      • 让-菲利普·奥马松与谢尔温·马杰里_加强银行级加密钱包的硬件安全模块.pdf
      • 达莉亚·马纳托娃与让·坎普_关系重要重构勒索软件团伙的组织与社会结构.pdf
      • 詹姆斯·凯特尔_倾听低语实际有效的Web计时攻击.pdf
      • 汤姆·多尔曼_所有你的秘密属于我们利用固件漏洞破解TEEs.pdf
      • 松尾和树_你已经被黑了如果你的UEFI OROM中有一个后门怎么办.pdf
      • 周亚金_利用您的法术针对您通过重用操作码跟踪进行智能合约漏洞威胁防范.pdf
      • 诺姆·摩西_从漏洞到取证证据解开Unitronics攻击.pdf
      • 阿德里安·科勒萨与索林·博洛斯_从武器到目标量子计算机悖论.pdf
      • Qi Wang & Jianjun Chen & Run Guo & Chao Zhang & Haixin Duan_Break the Wall from Bottom Automated Discovery of Protocol-Level Evasion Vulnerabilities in Web Application Firewalls.pdf
      • 雅各布·拉尔森_从网络暴露到门口揭露黑客用于勒索的隐私入侵技术.pdf
      • 沙查尔·梅纳谢_从MLOps到MLOops暴露机器学习平台的攻击面.pdf
      • 阿隆·列维夫_利用Windows更新的降级攻击.pdf
      • 王琦与李翔与王楚涵_图门攻击系统地探索和利用DNS响应预处理中的逻辑漏洞和畸形数据包.pdf
      • 法比安·鲍默_陆龟攻击通过序列号操纵破坏SSH通道完整性.pdf
      • 丹尼尔·格鲁斯与斯特凡·加斯特_蜗牛负载互联网上的任何人都可以了解你在做什么.pdf
      • JOSHWI~1.PDF
      • 钱智云与胡佳毅与周金梦与唐奇与沈文博_PageJack一种强大的页面级UAF利用技术.pdf
请点击导航文件预览
资源包简介:

#BHUSA BlackHatEventsPageJackPageJack:A Powerful Exploit Technique With Page:A Powerful Exploit Technique With Page-Level UAFLevel UAFSpeaker:Zhiyun QianContributors:Jiayi Hu,Jinmeng Zhou,Qi Tang,Wenbo Shen8/8/2024#BHUSA BlackHatEventsWho we areZhiyun QianJinmeng ZhouQi TangWenbo ShenJiayi Hu#BHUSA BlackHatEventsOS kernel exploitsControl flow hijackEx:corrupt function pointer return-oriented programming(ROP)Data-only attacksEx:corrupt data pointer arbitrary read/write to modify key objects(e.g.,#BHUSA BlackHatEventsPyLingualPyLingual:A Python:A Python DecompilationDecompilation Framework for Framework for Evolving Python VersionsEvolving Python VersionsJosh Wiedemeier#BHUSA BlackHatEventsHello!AWS Logo PNG Transparent Images-PNG AllSang Kil ChaMuhyun KimElliot TarbetSimon LiuJessica OuyangKangkook JeeJosh WiedemeierJerry TengMax Zheng#BHUSA BlackHatEventsPython is PopularSource:PYPL#BHUSA BlackHatEventsPeople Use It to Make Malware#BHUSA BlackHatEventsHeres One6 LOAD_GLOBAL 1(getpass)8SnailLoadAnyone on the Internet Can Learn What Youre DoingStefan Gast,Daniel Gruss2024-08-07Graz University of Technology1Stefan Gast,Daniel GrussWho are we?Stefan GastPhD StudentGraz University of Technology notbobbytablesinfosec.exchange?notbobbytables?https:/stefangast.eu/Daniel GrussProfessorGraz University of Technology lavadosinfosec.exchange?lavados?https:/gruss.cc/2Stefan Gast,Daniel GrussWho are we?Stefan GastPhD StudentGraz University of Technology notbobbytablesinfosec.exchange?notbob#BHUSA BlackHatEventsTerrapin Attack:Breaking SSH Channel Terrapin Attack:Breaking SSH Channel Integrity by Sequence Number ManipulationIntegrity by Sequence Number ManipulationFabian BumerRuhr University Bochum Marcus BrinkmannRuhr University Bochum Jrg SchwenkRuhr University Bochum#BHUSA BlackHatEventsA Tale Of System Administrationsrv-prod-01ProductionSysadmin Bobbobsrv-prod-01SSHmallorysrv-test-01SSHTrainee Mallorysrv-test-01TestNetwork TAP#BHUSA BlackHatEventsDemo-A Normal Workday For Bob#B#BHUSA BlackHatEventsTuDoor Attack:Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed PacketsSpeaker(s):Qi Wang,Tsinghua UniversityContributor(s):Xiang Li,Nankai University&Chuhan Wang,Tsinghua University#BHUSA BlackHatEventsAttack Impact2Poisoning vulnerable resolvers cache within just one second.Our TuDoor attack could poisonarbitrary domains,e.g.,.com .#BHUSA BlackHatEventsDomain Name System(DNS)3DNS Overviewq Translating domain namWindows Downdate:Downgrade Attacks Using Windows UpdatesAlon LevievSecurity Researcher SafeBreach22-years-oldSelf-taughtOS internals,reverse engineering and vulnerability researchFormer BJJ world and european championCreator of PoolParty process injection techniquesAgendaResearch BackgroundDowngrade Attacks Using Windows UpdatesVirtualization-Based Security VulnerabilitiesWindows Update Restoration VulnerabilityClosing RemarksResearch BackgroundWINDOWS DOWNDATEWhat are Downgrade Attacks?Immune S#BHUSA BlackHatEventsFrom From MLOpsMLOps to to MLOopsMLOopsExposing the Attack Surface of Machine Learning PlatformsExposing the Attack Surface of Machine Learning PlatformsSpeaker:Shachar Menashe#BHUSA BlackHatEventswhoami Shachar Menashe Classically-Binary reverse engineer In practice-Full-time CVSS assigner:)Leading JFrogs security research teams 0-day,CVE,malware research Presenting recent research from our 0-day team Ori Hollander,Natan Nehorai,Uriya Yavnieli#BHUSA BlackHatEventsOrg High V#BHUSA BlackHatEventsFrom Doxing to Doorstep:From Doxing to Doorstep:Jacob LarsenExposing Privacy Intrusion Techniques used by Hackers for Extortion#BHUSA BlackHatEventswhoamiJacob Larsen Offensive Security Team Lead CyberCX Threat Researcher Researching underground cyber crime groups since 2016 Based in Perth,Australialarsencyberhttps:/#BHUSA BlackHatEvents 9 years ago,I was a doxing victim.I had an online account with a rare username which they wanted.Ever since then,I have followed the subcul#BHUSA BlackHatEventsBreak the Wall from Bottom:Automated Discovery of Protocol-Level Evasion Vulnerabilities in Web Application FirewallsSpeaker:Qi Wang(Eki)Contributors:Jianjun Chen,Run Guo,Chao Zhang,Haixin Duan#BHUSA BlackHatEvents2Talk RoadmapvWhat are WAFs and how do they work?vHow do we discover new evasion cases automatically?vHow to bypass WAF at the protocol-level like a Pro?vBonus:Three useful tactics to bypass WAFs at the protocol-level#BHUSA BlackHatEvents3WebApps Security RiskvWebAFromWeapontoTarget:QuantumComputersParadoxMdlina BSorin Bolos,sorin.bolostransilvania-Adrian Coles,Andrei KAndrei Lut,as,Dan Lut,as,Radu Mrgineanradu.margineantransilvania-Andrei MRadu PMiruna Ros,August 2,2024Executive SummaryThe impact of quantum computing on the classical computing based cybersecurityhas been discussed extensively over the past 30 years.This led to development ofthe so-called post-quantum cryptography.In the same time,relatively little atten-tion has been paid to the securityTeam82From Exploits to Forensic Evidence:Unraveling the Unitronics AttackNoam Moshe Claroty Research,Claroty Team82$whoamiNoam MosheVulnerability researcher-mostly breaking IoT clouds.Master of Pwn Pwn2Own ICS 2023.*Special thanks to Claroty Team82 researchers:Sharon Brizinov,Vera Mens,Tomer GoldschmidtSo whats the sitch?So whats the sitch?Nov 23:APT targets Unitronics PLCs CyberAv3ngers Used in water facilities worldwideSo whats the sitch?Nov 23:APT targets Unitronics PLCs CyberAv3ngers Used in#BHUSA BlackHatEventsUse Your Spell Against Y ou:A Proactive ThreatPrevention of Smart Contract ExploitYajin ZhouBlockSec&Zhejiang UniversityThis work is a team effort of researchers from Zhejiang University and BlockSec.Hailin Wang,Jianfeng Zhu,Hang Feng,Youwen Hu,Runhuai Li,Sheng Yu,Lei Wu,Yajin ZhouAbout MeCo-founder of BlockSec and Professor of Zhejiang UniversityResearch interestsDeFi security,Blockchain system securityPublish:60+papers with 9,000+citationsHack and build systemsRead mor#BHUSA BlackHatEventsYouve AlreadyYouve Already BeenBeen HackedHackedWhat if There Is a Backdoor in Your UEFI OROM?What if There Is a Backdoor in Your UEFI OROM?Kazuki Matsuo(InfPCTechStack)2024/8/8 South Seas CD,Level 3#BHUSA BlackHatEventsWhoami-Kazuki Matsuo(InfPCTechStack)Title:Security ResearcherAffiliation:FFRI Security,Inc&Waseda University(This study was done during my masters degree)Interests:UEFI(Negative Rings)Trusted ComputingWindows Kernel#BHUSA BlackHatEventsContributo#BHUSA BlackHatEventsAll Your Secrets Belong to Us:All Your Secrets Belong to Us:Leveraging Firmware Bugs to Break TEEsLeveraging Firmware Bugs to Break TEEsTom Dohrmann#BHUSA BlackHatEventswhoamiTom DohrmannLow-level enthusiastCodingHacking#BHUSA BlackHatEventsOutlineShort Intro to TEEs and AMD SEV-SNPPrerequisitesPlatform Security Processor&FirmwareReverse Map TableBug#1Simple ExploitImproved ExploitBug#2ExploitWrap-up and take-aways#BHUSA BlackHatEventsWhats a TEE Anyway?TEE=Trusted ExecuListen to the whispersJames Kettleweb timing attacks that actually workPortSwigger ResearchThe timing trapdef strcmp(s1,s2):for c1,c2 in zip(s1,s2):if c1!=c2:return Falsetime.sleep(0.01)return TrueDoes the database contain a password reset token starting with d7e?(not to scale)The timing divideLab-provenTheoretical200s(0.2ms,0.0002 seconds)The timing divideMaking timing attacks that work everywhereListening to whispers:Hidden attack-surface Server-side injection Reverse proxy misconfigurationsDe#BHUSA BlackHatEventsRelationships Matter:Reconstructing the Organizational and Social Structure of a Ransomware GangSpeaker(s):Dalya Manatova and L Jean CampIndiana University#BHUSA BlackHatEventsL Jean CampProfessor,IUFellow,IEEEFellow,ACMFellow,AAASWe areDalya ManatovaDoctoral ResearcherOstrom FellowIndiana University#BHUSA BlackHatEventsModern eCrimeAttackers are described asExcitingArtistsInnovativeAnonymousReputation&profit maximizing#BHUSA BlackHatEventsIs OrganizedeCrime as a serviceHardening HSMs for Hardening HSMs for BankingBanking-Grade Crypto WalletsGrade Crypto WalletsBlack Hat 2024Black Hat 2024JP Aumasson,Chervine MajeriJP Aumasson,Chervine MajeriWhoisWhoisJP Taurus co-founder&CSO First BHUS talk was in 2013 Chervine Taurus lead research engineer First BHUS talk is nowCrypto asset custody&issuance for banks()regulated and running a marketplace for tokenized assets(t-)In Geneva,Zurich,London,Paris,Vancouver,DubaiOutlineOutline1.What is really an HSM?2.Securit#BHUSA BlackHatEventsAre Your Backups Still Immutable,Even Though You Cant Access Them?Speaker(s):Rushank Shetty Ryan KaneINTROwhoamiData Immutability BackgroundVendor Case StudiesRecommendationsThe WhyQ/AIntro whoami Ransomware Groups Data Immutability Dell/EMC IBM DS8000 AWS Backup Recommendations Why test Q/AWHOAMIRyan KaneNorthwestern MutualPen Tester/Red TeamerCypherCon Volunteer(MKE,WI)Rushank ShettyNorthwestern MutualPen Tester/Red TeamerFirst-time Black Hat Attendee/PresenterIntro whoami#BHUSA BlackHatEventsForeign Information Manipulation and Interference(Disinformation 2.0)FRANKY SAEGERMAN Based on Learnings from 30 Years at NATO#BHUSA BlackHatEvents#BHUSA BlackHatEventsfrankyliticsFRANKY SAEGERMAN Head of Social Media.(2012-2016)Head Digital Insights.(2016-2020)Information Environment Analyst.(2020-2024)#BHUSA BlackHatEvents#BHUSA BlackHatEventsWhat is Disinformation?Disinformation#BHUSA BlackHatEvents#BHUSA BlackHatEventsWhat is Disinformation?What is it not?Disinformation##BHUSA BlackHatEventsBytecode Jiu-JitsuContributors:Ryo Kubota1,Yuhei Kawakoya1,Makoto Iwamura1,Kanta Matsuura2Choking Interpreters to Force Execution of Malicious Bytecode 1NTT Security Holdings Corporation2Institute of Industrial Science,The University of TokyoToshinori Usui1,Yuto Otsuki1#BHUSA BlackHatEventsToshinori Usui,Ph.D.Research scientist,security principalResearch interests:malware analysis,reverse engineering,and exploit developmentCTF loverBrazilian Jiu-Jitsu enthusiastYuto Otsuki,PBLACK HAT BRIEFINGSSecure Shellsin ShamblesHD MOORE|ROB KING|AUGUST 7,2024Agenda2This is a talk about the evolution of the Secure Shell(SSH)An overview of the SSH ecosystemWhats changed&what hasntNew&interesting attacksOpenSSH fragmentationIntroducing SSHambleDefending SSH2024In the beginning was SSH3Tatu Ylnen created SSH v1 in 1995 as freewareContinued development as the proprietary SSH.comBjrn Grnvall forked Ylnens free SSH v1.2.12 as OSSHOpenBSD forked OSSH into OpenSSH in 1999199519#BHUSA BlackHatEventsThe Way to Android Root:Exploiting Your GPU On SmartphoneXuan XingEugene RodionovXiling Gong#BHUSA BlackHatEventsWhoamiIncrease Android and Pixel security by attacking key components and features,identifying critical vulnerabilities before adversariesOffensive Security Reviews to verify(break)security assumptionsScale through tool development(e.g.continuous fuzzing)Develop proof of concepts to demonstrate real-world impactAssess the efficacy of security mitigations#BHUSA BlaPractical LLM Security:Takeaways From a Year in the TrenchesRich Harang,Principal Security Architect(AI/ML)|August 7,2024IntroWho am I and why should you listen to me about LLM security?PhD in Statistics and Applied Probability Working at intersection of machine learning,security,and privacy since 2010 U.S.Army Research Laboratory making and breaking ML tools for applied network security in partnership with CNDSP;source code and binary stylometry;adversarial examples for sequence models;frog-boi#BHUSA BlackHatEventsReinforcement LearningReinforcement Learningfor Autonomous Resilientfor Autonomous ResilientCyber DefenceCyber DefenceIan Miles,Sara Farmerarcdfnc.co.ukFrazer-Nash Reference:016273-146560V#BHUSA BlackHatEventsBriefing ContributorsIanSara2#BHUSA BlackHatEventsAutonomous Resilient Cyber DefenceUK ARCD programMission:Machine speed cyber response&recovery on military platforms&systems Defending IT&OT systemsGoals:Understand&demonstrate Autonomous Cyber Defence(AC#BHUSA BlackHatEventsKicking in the Door to the Kicking in the Door to the Cloud:Exploiting Cloud Cloud:Exploiting Cloud Provider Vulnerabilities for Provider Vulnerabilities for Initial AccessInitial AccessNick Frichette#BHUSA BlackHatEvents#BHUSA BlackHatEventsBoringBoring#BHUSA BlackHatEventsLeaked Access Keys#BHUSA BlackHatEventsLeaked Access KeysExposed S3 Bucket#BHUSA BlackHatEventsLeaked Access KeysExposed S3 BucketExploited EC2 Instance#BHUSA BlackHatEventsWhy is it,when something happenMicroarchitecture VulnerabilitiesPast,Present and FutureDaniel Gruss(Graz University of Technology)Anders Fogh(Intel Corporation)IntroductionDaniel GrussGraz University of TechnologyAnders FoghIntelDaniel and Andersdo not always agree!PastPast earliest daysSide Channels always existedPast earliest daysSide Channels always existedFirst scientific observations in 1943Past earliest daysSide Channels always existedFirst scientific observations in 1943Concept of“covert channels”in 1973Past earliestGotta Cache em allBending the rules of web cache exploitationMartin DoyhenardPortSwigger Research1.Web Caches2.Cache Rule Exploitation3.Cache Key Exploitation4.Cache-What-Where(DEMO)5.Defences6.TakeawaysAgendaWeb CachesKeyResponseOrigin ServerCache ProxyWeb CachesKeyResponseGET/styles.cssOrigin ServerCache ProxyWeb CachesKeyResponseOrigin ServerCache ProxyGET/styles.cssWeb CachesKeyResponseKey()Cache ProxyOrigin ServerGET/styles.cssWeb CachesIdentify Requests elements used for comparisonGET/styl#BHUSA BlackHatEventsWe R in a right pickle with all these We R in a right pickle with all these insecure serialization formatsinsecure serialization formatsSpeaker(s):Kasimir Schulz&Tom Bonner#BHUSA BlackHatEventsIntroductionKasimir SchulzPrincipal Security Researcher at HiddenLayerlinkedin/in/kasimir-schulzSocials:abraxus7331Tom BonnerVP of Research at HiddenLayerlinkedin/in/thomas-j-bonnerSocials:thomas_bonner#BHUSA BlackHatEventsIntroduction Weve been investigating machine learning libra#BHUSA BlackHatEventsSpeakers:Eyal PazLiad CohenWill We Survive the Transitive Will We Survive the Transitive Vulnerability Locusts?Vulnerability Locusts?#BHUSA BlackHatEventsVP of Research OX SecurityEyal Paz is the VP of Research at OX SecurityEleven years at Check Point working on security research for product innovation in network security,and threat intelligence Ph.D.candidate researching the problem of encrypted traic classification.Eyal PazLiad CohenData Scientist&Security Researcher Splitting The Email AtomExploiting Parsers To Bypass Access ControlsGARETH HEYESOutlineWhy email address parser discrepancies matterThe shaky foundationParser discrepancies-Unicode overflows-Encoded-word-PunycodeMethodology/ToolingDefenceTakeawaysADD FUNKY STARS1.2.3.4.5.6.Why email address parser discrepancies matterPredicting an email destination is extremely difficultThe shaky foundationRFC2822RFC“features”Quoted local- foo Quoted C(bar)foo(bar)(bar) The wrong questionWhich email is valid?#Unraveling the Mind behind the APTAnalyzing the Role of Pretexting in CTI and AttributionSpeaker:Sanne MaasakkersBlackHat USA 2024 briefingsContents3Introduction01Introduction02Research concept03Analyzing content04Analyzing context05Result&demos06Conclusion&outlookSanne4Introduction-Joined Mandiant Intelligence/Google Cloud in 2023 as Senior Analyst-Previously worked in Red Team/Research&Intel Fusion Team(Fox-IT)and Fusion Centre(NCSC-NL)analyzing threats against The Netherlands-3 ma#BHUSA BlackHatEventsUnveiling Mac Security:A Comprehensive Exploration of Sandboxing and AppData TCCZhongquan Li&Qidan He#BHUSA BlackHatEventsZhongquan Li GuluisacatSenior security researcher from Dawn Security Lab of JD.com Focusing on bug hunting and fuzzing in Android,IoT,and Apple products Blog:https:/Qidan He flanker_hqdDirector,Chief security researcher from Dawn Security Lab of JD.com Focusing on security architecture of mobile and cloud native security,bug hunting,anti-fruad Blog:ht1 Ignore Safety Directions.Violate the CFAA?Kendra Albert(Harvard Law School);Jonathon Penney(Osgoode Hall Law School/Harvard Berkman Klein Center);and Ram Shankar Siva Kumar(Harvard Berkman Klein Center)*Introduction In March,twenty-three artificial intelligence(AI)experts publicly released a working paper calling for legal and technical protections for researchers engaged in good faith evaluation and“red teaming”of AI systems.1 The co-authors,including experts from Massachusetts Institute of#BHUSA BlackHatEventsBugs of yore:A bug hunting Bugs of yore:A bug hunting journey on VMwares hypervisorjourney on VMwares hypervisorZisis Sialveras,zisiscensus-,_zisis#BHUSA BlackHatEventsWHOAMI Computer security researcher at CENSUS Finding and exploiting bugs professionally since 2013 Reversed A LOT of VMwares code Gave a few talks about VMware exploitation in the past#BHUSA BlackHatEventsHOW EVERYTHING STARTED Goal:Develop guest-to-host escape exploit for VMware Workstation 12(on Windows hos#BHUSA BlackHatEventsUnOAuthorizedUnOAuthorizedEric WoodruffSenior Security Researcher,Semperis#BHUSA BlackHatEventsEric WoodruffSenior Security Researcherericonidentityinfosec.exchange/in/ericonidentity#BHUSA BlackHatEventsUnauthorized+OAuth 2.0#BHUSA BlackHatEventsUnauthorized1+OAuth 2.0#BHUSA BlackHatEventsUnOAuthorized11h/t to myself,AI did not help with this name#BHUSA BlackHatEventsBackgroundBackground#BHUSA BlackHatEventsBackgroundPlenty of research on Entra ID app permissions and roles1G#BHUSA BlackHatEventsAttention Is All You Need for Semantics DetectionA Novel Transformer on Neural-Symbolic ApproachSheng-Hao MaYi-An LinMars Chengaaaddress1marscheng_TXOne Networks|Keep the Operation RunningTXOne Threat Researcher From Sheng-Hao MaMars ChengThreat Research ManagerPSIRT and Threat ResearchTeam LeadPSIRT and Threat ResearchYi-An LinThreat ResearcherPSIRT and Threat ResearchTXOne Networks|Keep the Operation RunningBackground and Pain PointsCuIDA(Cuda-trained Inference Decompiler #BHUSA BlackHatEventsListen Up:Sonos OverListen Up:Sonos Over-TheThe-Air Air Remote Kernel Exploitation and Remote Kernel Exploitation and Covert WiretapCovert WiretapRobert Herrera NCC GroupAlex Plaskett NCC Group#BHUSA BlackHatEvents$who$whoRobert Herrera NCC Group Hardware/Embedded Security Team(HES)Alex Plaskett NCC Group Exploit Development Group(EDG)#BHUSA BlackHatEventsDevice IntroductionDevice IntroductionSonos OneSonos Era-100#BHUSA BlackHatEventsSonos One Sonos One WiWi-Fi ExploitationInto the Inbox:Novel Email Spoofing Attack PatternsSpeakers:Caleb Sargent&Hao Wang#BHUSA BlackHatEventsAbout UsCaleb Sargent(squared_)Offensive Security EngineerHao Wang(MrRed_Panda)Offensive Security Manager#BHUSA BlackHatEventsDisclaimerThe ideas,content,or opinions expressed in this presentation are solely those of the author and do not reflect any endorsement or support by our employer.#BHUSA BlackHatEventsAgendaStory Time1Email Security Basics2Attack Patterns3Next Steps4Recommendations5Deep Backdoorsin Deep RLReinforcement LearningReinforcement LearningReinforcement LearningReinforcement LearningThe Anatomy of a RL BackdoorMaliciousTriggerBackdoored NeuronsSoftware Supply Chain AttacksCodeBuildDeployUpdateSoftware Supply Chain AttacksCodeBuildDeployUpdateCompromise source codeSoftware Supply Chain AttacksCodeBuildDeployUpdateInject malicious code in buildSoftware Supply Chain AttacksCodeBuildDeployUpdateExploit deployment pipelinesSoftware Supply Chain AttacksCodeBuildDeployUpConfusion Attacks!Orange TsaiExploiting Hidden Semantic Ambiguity in Apache HTTP ServerUSA 2024Who hasnt heard of Apache HTTP Server before?Apache Httpd in a Nutshell1.Almost 30-year-old open-source project2.CGI enabled by default3.Heavily integrated with PHP101 Ways to Run PHP1.mod_php2.php-fpm3.mod_fastcgi4.mod_proxy_fcgi5.mod_fcgi6.mod_fcgid7.mod_cgi+php-cli8.mod_cgi+php-cgi9.mod_cgi+spawn-fcgi10.mod_cgi+fcgiwrap11.more?Config Directives are ComplicatedSetHandler handler-name|none|expressionAModern Kill ChainsReal World SaaS Attacks and Mitigation StrategiesCory MichalVP of SecurityAugust 7,2024Brandon LevenePrincipal Product Manager,Threat DetectionBen PruceLead Threat Detection Engineer1Agenda Reflect on where we are currently Hypothesize why we are here Examine what it is like to be here Determine if something better is possible Outline how we could move to better state2Historical Attack Surface Change3Pre Cloud&SaaS Attack Surface 20094DMZDMZDMZModern Attack Surface 20205Att#BHUSA BlackHatEventsModern Anti-Abuse Mechanisms in Modern Anti-Abuse Mechanisms in Competitive Video GamesCompetitive Video GamesJulien Voisin dustri.orgJulien Voisin dustri.org#BHUSA BlackHatEventsAgenda-Cheats&abuses?-Countermeasures-Technical-Social-Exotic-Conclusion#BHUSA BlackHatEvents#BHUSA BlackHatEvents#BHUSA BlackHatEventsToxicity?Play Counter Strike or League of Legends for 10 minutes to get vivid examples.#BHUSA BlackHatEventsCheats,abuses,toxicity,Cheats arent hunted down becau#BHUSA BlackHatEventsSecuring Network AppliancesSecuring Network Appliances:New Technologies and Old ChallengesSpeaker:Vladyslav Babkin#BHUSA BlackHatEvents$whoamiVladyslav Babkin(“hotab”)Network&Web Hacker,Web Developer Long-time CTF player(team dcua)Security Researcher Eclypsium Twitter:HotabZero#BHUSA BlackHatEventsHOW DID NETWORK DEVICES EVOLVE?#BHUSA BlackHatEvents2005 First Cisco Rootkit2008 Operation Cisco Raider2015 SYNFUL Knock Cisco ROMMON Attack Juniper Backdoors 2016 Shadow Bro#BHUSA BlackHatEventsSelf Hosted GitHub Self Hosted GitHub RunnersRunnersContinuous Integration,Continuous DestructionContinuous Integration,Continuous DestructionAdnan Khan|John StawinskiFirstA StoryTwo months ago,someone identified a GitHub Actions misconfiguration in a public repository owned by one of the largest domestic chip manufacturers in the United States-anyone with a GitHub account could have exploited it by creating a pull request.The vulnerability allowed them to obtain Enterprise #BHUSA BlackHatEventsWhat Lies Beneath the Surface:What Lies Beneath the Surface:Evaluating LLMs for Offensive Cyber Capabilities through Evaluating LLMs for Offensive Cyber Capabilities through Prompting,Simulation&EmulationPrompting,Simulation&EmulationSpeaker(s):Michael Kouremetis,Marissa Dotter,Alexander ByrneCopyright 2024 The MITRE Corporation.ALL RIGHTS RESERVED.Approved for public release.Distribution unlimited.Case:24-2367#BHUSA BlackHatEventsTeamMarissa Dotter(Speaker)AI,AI Sec#BHUSA BlackHatEventsSuper Hat TrickExploit Chrome and Firefox Four TimesNan Wang,Zhenghang Xiao#BHUSA BlackHatEventsAbout usNan Wang eternalsakura13 Security researcher at 360 Vulnerability Research Institute Focusing on hunting Chrome vulnerabilities Chrome VRP top 10 researcher in 2021/2022/2023 Facebook Top 2 whitehat hacker in 2023 Speaker of BlackHat USA 2023/BlackHat Asia 2023Zhenghang XiaoKipreyyy Individual security researcher First-year Masters candidate at NISL Lab,Tsinghua University#BHUSA BlackHatEventsBreaching AWS AccountsThroughShadow ResourcesYakir KadkodaMichael KatchinskiyOfek Itach#BHUSA BlackHatEventsAWS Account IDEach AWS account has a unique account ID12-digit IDSome treat it as a secret,others dont#BHUSA BlackHatEventsAWS Account IDEach AWS account has a unique account ID12-digit IDSome treat it as a secret,others dont#BHUSA BlackHatEvents#BHUSA BlackHatEvents#BHUSA BlackHatEventshttps:/ BlackHatEvents#BHUSA BlackHatEventsYakir KadkoaSecurityLead Security ResearYehuda SmirnovHOOK,LINE AND SINKER:PHISHING WINDOWS HELLO FOR BUSINESS Like learning&researching Windows,Active Directory,Azure and anything interesting Develop in C,C#,Python&Assembly Ex private investigator Like to surf&play tennisRED TEAM&SECURITY RESEARCHER ACCENTURE SECURITY ISRAELABOUT MEyudasm_ on twitterYehuda Smirnov Like learning&researching Active Directory,Windows,Azure and anything interesting Develop in C,C#,Python&Assembly Ex private investigator Like to su 2022 Akamai|Confidential1Tunnel VisionExploring VPN Post-Exploitation TechniquesOri DavidAgendaVPN exploitationVPN post-exploitationWhat can we do about itwhoamiOri DavidSecurity Researcher at AkamaiBackground in red teaming&threat huntingWhy VPNs areappealing to attackers?VPNInternal NetworkWhy VPNs areappealing to attackers?“Classic”VPN exploitationAbused mainly to gain initial access to the networkVPNInternal NetworkVPN Post-Exploitation?VPN post-exploitationPersistencyCredential Acces#BHUSA BlackHatEventsHow Hackers Changed the Media(and the Media Changed Hackers)Moderated by:Sherri Davidoff|CEO,LMG SecurityPanelists:Lorenzo Franceschi-Bicchierai|Senior Writer/Editor,Cybersecurity,TechCrunchRobert McMillan|Reporter,The Wall Street JournalSadia Mirza|Partner,Troutman Pepper#BHUSA BlackHatEventsSenior Writer/Editor,CybersecurityTechcrunchLorenzo Franceschi-BicchieraiReporterThe Wall Street JournalRobert McMillanPartnerTroutman PepperSadia MirzaCEOLMG Security(Moderator)Sherri

展开阅读全文
客服
商务合作
小程序
服务号
折叠