NET serializers and JSON serializers and in the end find a general approach to this attack. – Speakers Alvaro Muñoz and Oleksandr Mirosh from Hewlett Packard – Fun with cats n´stuff (There are quite a few adorable cats in the slides!). – By showing his research he introduced a new Attack Surface on SSRF-Bypasses and New Attack Vectors on Protocol Smuggling. – He showed a case study where he chained four vulnerabilities to get code execution in GitHub enterprise instances. – Showing how libraries and programming languages handle URLs differently. – They tested different access points, e.g.: OpenBSD, Broadcom, MediaTek (home routers), Windows, Aironet Windows Hotspots suffers from Denial-of-Service attacks OpenBSD suffers from unauthenticated permanent DoSĪ New Era of SSRF – Exploiting URL Parser inTrending Programming i.e: check whether the implementation behaves according to documentation. – It is is a model-based testing for the Wi-Fi handshake. WiFuzz: Detecting and Exploiting Logical Flaws in the Wi-Fi – Investing time now in properly developing Purple and Orange teams lessen risks in the future. – Orange Team: Structured interactions between Red and Yellow Team members with the primary goal of providing education/benefits to the Yellow team. – Purple Team: A combo of Red and Blue Teams with the primary goal of maximizing the results of Red Team activities and improve Blue Team capability. “them” mentality when we’re all on the same team. – Tackles the challenge of the gap between software builders and security teams. Additionally, two tools to identify such vulnerabilities have been released: – Key takeaways: It was shown that minor flaws in reverse proxies can result in critical vulnerabilities.To achieve defense in depth, reverse proxies should be firewalled into a hardened DMZ, isolated from anything that isn’t publicly accessible. – Blog: hidden.html has detailed information. – He did so by using burps collaborator feature – It is possible to attack internal applications by misrouting requests and thus access applications behind load balancers and proxies. ![]() – After looking into an unexpected Pingback the researcher started to dig deeper into misrouting attacks and thus target auxiliary systems by manipulating the HTTP Host header and other parts of the HTTP request. – Speaker: James Kettle from PortSwigger, Slides: – Luckily currently there is no malware that is actively exploiting this issue.ĬRACKING THE LENS: TARGETING HTTP’S HIDDEN ATTACK-SURFACE – An infected device can be used to infect other mobile devices. Nexus 5, 6, 6X and 6P, All iPhones after iPhone 5 Affected devices are for example: Samsung Galaxy from S3 through S8, inclusive All Samsung Notes3. – This hits most of the mobiles users pretty hard. – He took a deep dive into the internals of the BCM4354, 43 Wi-Fi chipsets and found an issue that he exploited to an extent where he created the world´s first wifi worm. ![]() ![]() – Broadly covered in main stream Media –> Wired article, tons of write-ups…link: Slides: ’t-Your-Safe-Haven-Protocol-Analysis-And-Vulnerabilities-Of-Autonomic-Network.pdf Our own Omar Eissa even gave his first BH and DEFCON talks! See which talk we liked and what inspiration we took home.ĮRNW´s Omar Eissa presented on Cisco Autonomic networks showing how Some of the ERNW Crew hit up Black Hat USA and DEFCON.
0 Comments
Leave a Reply. |