📜 ⬆️ ⬇️

ZeroNights 2012: Do you want hardcore?

image

ZeroNights 2012, as in the past year, is held with the support and participation of Yandex. We are very happy to work with such a famous company again. The other day, Yandex has opened a program to reward researchers for found vulnerabilities in web services and mobile applications called “ Hunting for bugs ”. We are proud to note that this is the first software developer in the post-Soviet space who reacted so responsibly to the security of its products. The first results of the program will be announced at ZeroNights 2012, which, as before, will concentrate in itself all the most interesting and relevant information from the world of information security in Russia.

We are also pleased to announce that the network of hostels Bear Hostels provides conference visitors with a 10% discount. We are waiting for you to visit, in whatever city you live!
')
Another good news: thanks to the fact that we were able to somewhat optimize the conference budget, the cost of tickets for individuals is now 7,000 rubles. RISSPA and DEFCON Group members are eligible for a 10 percent discount.

We also removed the restriction on the number of registrations at the student rate. Recall that from October 1, the cost of participation for undergraduate and graduate students is 1900 rubles. The student package includes attendance at the conference, including all the workshops, participation in competitions with prizes, as well as coffee breaks.

New reports


Reverse analysis and reconstruction of the Win32 / Flamer object-oriented architecture

In the main program, the great and terrible (:)) Alexander Matrosov together with Evgeny Rodionov (Russia) will talk about the insides of Flamer without any idle talk.

In this report, you will not find any mention of exposing government structures involved in the development of Win32 / Flamer, as well as various conspiracy theories on the subject of cyber weapons. The report will discuss approaches to reverse analysis of malicious software that has an object-oriented architecture, using the example of one of the most complex threats since the anti-virus industry. On the example of Win32 / Flamer, the technique developed by the authors in the process of analyzing such complex threats as Stuxnet, Duqu and Festi will be presented. The presentation will present the problems encountered in the process of analyzing these threats and the ways to solve them using the tools from Hex-Rays. Also, the authors of the report will present the results of their research on the reconstruction of the object-oriented platform on the basis of which Win32 / Flamer was developed, and demonstrate its relationship with Stuxnet / Duqu / Gauss at the level of code and architecture.

Applied anti-forzics: rootkits, kernel vulnerabilities and all-all

Dmitry Oleksyuk aka Cr4sh (Russia) will break your understanding of advanced rootkit techniques, including enlighten the audience on the use of rootkits in targeted attacks.

Currently, the most widely known rootkits are used in malicious programs of mass distribution. However, they are also used in targeted attacks, which is why rootkit technologies can be divided into two large groups. The main difference between rootkits used in targeted attacks and their more massive counterparts is that they should not only prevent the system from being compromised in its daily operation mode (remain invisible to the user and anti-virus programs), but also have the qualities that would make it difficult for a rootkit to be detected when it is targeted by highly qualified forensic experts.

This report will discuss in detail the following questions:

PS The information that will be presented to the public is not just another useless research like "a new way of intercepting some garbage in the OS kernel." The main objective of the speaker is to demonstrate examples and results of an integrated approach to the development of complexly detectable malicious code.

Malware Review for Mac OS X

For some time now, Apple has stopped boasting of the absence of viruses in its products, and with the help of Ivan Sorokin (Russia) you can learn more about this.

Currently, Dr.Web has about 20 types of malware for the Mac OS X operating system. The report presents a comparative analysis of key representatives. At the same time, various aspects are considered as criteria for comparison, ranging from the purpose of the malicious program to the distinctive features of each threat family.

How to steal from a thief: break IonCube VM and reverse exploit assemblies

Speaker: Mohamed Saher (USA).

An exploit kit is a collection of malicious programs that are usually used to perform automated driveby attacks in order to further spread viruses. Such a kit can be bought on the black market (mainly from Russian cybercriminals) for prices ranging from a few hundred to a couple thousand dollars and even more. Recently, renting exploit packs located on a particular server has also become a common practice. Thus, a competitive market has emerged with many players, including many different authors. A few years ago, MPack appeared - one of the first such tools. Soon it was followed by the ICE-Pack, Fire-Pack and many others. Among the well-known modern exploit packs - for example, Eleonore, YES Exploit Pack and Crimepack.

To protect their exploit kits, cybercriminals use solutions to translate source code into bytecode (virtualized and obfuscated). It is then encoded and transmitted to the loader, which distributes it through a PHP page. Sold exploit kits are also protected by a strict licensing policy that prohibits copying and distribution.

In my talk I will talk about how the ionCube copy protection system is used to protect exploit kits. I will also show how to crack this protection and restore the source code of the exploit, as well as how to figure out which IP addresses are tied to a specific exploit license.

Plan:

The most complex copy protection systems are based on virtualization technologies, and there is little public information on practical deobfuscation of real protections, so we strongly recommend that you pay attention to this report.

Security of modern payment technologies: EMV, NFC, etc.?

Here you can hear the terrible truth about the security of modern payment technologies performed by Nikita Abdullin (Russia) - a person who has studied the work of the entire chain “client - card - terminal - acquirer - MPS - issuer - money - issuer - acquirer - terminal - product / service / money is a client "at all levels from iron to accounting.

Have you ever thought about the reliability and security of high-tech means of payment that live in your wallet and pockets? The very time to find out about this - the report examines the security aspects of modern electronic payment technologies from the "real world": EMV microprocessor bank cards and payment solutions based on NFC-enabled devices (Near Field Communication). The principles of operation of these technologies will be described, and both previously known and new attack vectors and countermeasures, forecasts and analytics will be considered.

Fast track


Fast track allows young information security enthusiasts to give a presentation of the research within 15 minutes.

Kirill Samosadny (Russia) will talk about the use of the potential of Flash-banner networks for the implementation of massive CSRF-attacks.
Fedor Yarochkin (Taiwan), Vladimir Kropotov (Russia) and Vitaly Chetvertak (Russia) will present a brief overview of the mass malware distribution campaigns in 2012. Emphasis will be placed on the circumvention technique for automatically detecting the presence of dangerous content on compromised servers.

Read more: 2012.zeronights.ru/fasttrack

Workshops


Random numbers Take two

Workshop from Russian experts - Arseniy Reutov, Timur Yunusov and Dmitry Nagibin (Russia) - is dedicated to attacks on random number generator in PHP.

The analysis of the work of George Argyros and Aggelos Kiayias, presented at BlackHat 2012, revealed that pseudo-random number generators used in PHP are very “pseudo”. As a result, a set of tools was created to implement attacks on session generators and other security features in PHP. Exploits have also been prepared for carrying out this type of attack on the latest versions of various popular web applications.

During the workshop will be presented:

Advanced Exploit Development (x32). Browser Edition

You will find a fascinating practical excursion into the world of exploits under Windows 7 with our guide - Alexey Sintsov (Moon). Having spent only 5 hours of time, you will understand from “A” to “Z” in the development of combat exploits for Windows 7, in particular for the IE9 browser.

The browser is a window into the world of the Internet, so it is not surprising that various adverse elements climb through a window directly into our home. This course is designed for those who are interested in understanding how these elements penetrate the house, exploiting browser vulnerabilities (or its plug-ins), such as buffer overflow or memory use upon release. In addition, it will be discussed in detail how various defense mechanisms work and are deceived, which should prevent penetration. We will study typical attacks on OS protection mechanisms and software, such as DEP / ASLR / SafeSEH / GS, consider the HeapSpray technique and execute arbitrary code to bypass all defenses! All attacks and exploits will be reproduced by the participants during the workshop, which will allow them to independently assess the threats and the real possibilities of such attacks.

The program includes:
At all key stages calc.exe will be obtained, that is, the participants themselves will bypass the protective methods and collect exploits - for this, the necessary details and the essence of the attacks will be analyzed in detail.

The participant will receive:

RFID: Jokers in the sleeve

Kirill Salamatin aka Del (Russia) and Andrei Tsumanov (Russia) will present a 4-hour master class, where they will teach visitors to manipulate contactless cards and defend themselves against such manipulations. The jacket-sniffer and much more can be felt and tested in action!

image

The program includes:

We are waiting for you in Infospace on November 19 and 20!

Source: https://habr.com/ru/post/152092/


All Articles