Presentation 4: Analyzing PIPEDREAM: Challenges in testing an ICS attack toolkit. Lastly, they showed you an open-source command line tool to accomplish all of the above, allowing you to experiment with your own ideas. Additionally, they have suggested a few promising directions for future research. Next, they have focused at how this service works, how it's enabled by default, and how it can function without explicit user consent. The entire process is accomplished by using nothing but Windows executables, signed executables, and Office cloud services. This demonstration will show payloads are distributed, bypass perimeter controls, executed on victim machines, and data is exfiltrated. This is probably going somewhere you can already guess.ĭuring this presentation, they have demonstrated how Power Automate can be repurposed to power malware operations. Basically, users can create custom processes and hand them over to Microsoft, which executes them successfully and reports them back to the cloud once they have been distributed to all user machines or the Office cloud. With Windows 11, users can automate mundane processes using a feature called Power Automate. Presented by: Michael Bargury, Co-Founder and CTO, Zenity.io Presentation 3: No-Code Malware: Windows 11 At Your Service It's going to be an explosive show as these cute little emojis are turned into merciless weapons of mass destruction. To solve this problem, they have introduced a more generic and new approach to shellcoding. Following a quick review of shellcodes and why they are an art, they have examined a new constraint for which (to the best of our knowledge) no shellcode has previously been discovered: emoji shellcoding. When code execution is possible, shellcodes are used in various attack scenarios. Presented by: Hadrien Barral & Georges-Axel Jaloyan In this episode, the experts have explained how it works, describe the vulnerabilities we found and demonstrate how to use the new exploits and custom tools we created to allow for a consistent bypass for secure boot across all X86-64 UEFI platforms. Moreover, they explained how malicious executables may be able to hide from the TPM measures used by BitLocker and remote attestation mechanisms in some cases. In this presentation, we will discuss past and present flaws in valid bootloaders, including some that inadvertently bypass Secure Boot. The secure boot model relies on developers developing code without vulnerabilities and backdoors. Microsoft, Lenovo, Dell, and others secure boot processes by using tightly controlled code signing certificates, which prevent unsigned code from running during boot. UEFI-enabled computers around the world use Secure Boot - the OG trust in boot - since it was introduced in 2012 because it is integrated into their BIOS. Presented by: Jesse Michael & Mickey Shkatov Presentation 1: One Bootloader to Load Them All A CTF has also been adapted for academic and military contexts (as a red team exercise) in addition to hacking conferences.Ī number of federal law enforcement agencies, including the FBI, the Department of Defense, the Postal Inspection Service, the Department of Homeland Security, and others attend DEF CON. As one of the most popular hacking contests, Capture the Flag (CTF) involves teams of hackers attacking and defending computers and networks using software and network structures. Its contests range from finding the shortest Wi-Fi connection to cooling a beer in the Nevada heat.Ī number of other contests have been held over the years, including lockpicking, robotics contests, art contests, slogan contests, coffee wars, scavenger hunts, and Capture the Flag games. In addition to speakers on computer-related and hacking-related topics, the event includes hacking wargames (challenges and competitions). The DEF CON convention today draws a large number of computer security professionals, journalists, lawyers, federal government employees, security researchers, students, and hackers interested in software, computer architecture, hardware modification, conference badges, and other hacking-related topics. In June 1993, DEF CON was held for the first time. The DEF CON hacker convention is one of the largest and most prominent hacker events in the world, held annually in Las Vegas, Nevada.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |