Review of the best technical reports of the Still Hacking Anyway 2017 conference
From August 4 to August 8, a large hacker festival SHA2017 was held in the Netherlands. Despite intensive preparations for my speech (and great excitement before him), I attended many interesting reports. In this article I will list those that I especially liked, and I will share my impressions.
1. How the NSA tracks you
Bill Binney spoke at the opening of SHA2017 and talked about how the NSA is following us. On the one hand, the very topic of the report is no longer a sensation. On the other hand, I note that this person worked at the NSA for 34 (!) Years, and at the end of his career he served as the technical director of this service. During his speech, I was sitting in the front row, and I was greatly impressed by the heavy and piercing gaze of this elderly person in a wheelchair. ')
Record of performance:
2. Mathematics and Video Games
Funny and informative lecture on the application of graph theory and topology in the analysis of good old games like Packman and Space Invaders.
Very interesting report on the use of a variety of impulse noise (glitches) for hacking automation systems. The researchers clearly showed that the ISO26262 standard, which regulates measures to ensure the reliability of automation systems, does not ensure their safety.
Record of performance:
4. DNA: The Code of Live
Just a great lecture by Bert Hubert (Bert Hubert) on DNA in terms of information technology. He is a charismatic speaker, plus he prepared his material well for the hacker conference. I did not notice how the hour passed, and in the end I was simply delighted with how brilliantly the Creator created life and described it in DNA.
Record of performance:
5. Improving Security with Fuzzing and Sanitizers
Cool performance on topical topics from the legend of the German security community - Hanno (Hanno Böck). I made some new ideas on fuzzing techniques for myself and talked to the speaker about the possibilities to expand the use of Sanitizers.
Record of performance:
6. Race for Root: Analysis of the Linux Kernel Race Condition Exploit
Very good technical report, I recommend! ;) I talked about the race condition I found in the Linux kernel (CVE-2017-2636) and described in detail the exploitation of this vulnerability for local privilege escalation. Also demonstrated a prototype exploit in action.
Record of performance:
I take this opportunity to inform you that my patch, which blocks similar exploits, has been adopted in the Linux kernel mainline. Technical details are published in our corporate blog .
7. Flip Feng Shui
One of the most powerful and high-profile reports of SHA2017. Victor van der Veen and Kaveh Razavi are advanced security figures in the Netherlands. The other day, they won the prestigious PWNIE award for the development of the Rowhammer operating methodology for hacking cloud platforms and Android attacks. The guys performed well, easily explained the beauty of their ideas and showed the demo.
Record of performance:
8. Computational Thinking
A valuable presentation by Pauline Maas, who shared her successful experience of involving children and teenagers in programming and algorithmic thinking.
Record of performance:
9. Bypassing Secure Boot using Fault Injection
Useful technical report on attacks using fault injection. Particularly impressed by the live demonstration of the bypass checks Secure Boot at ARM with the help of a brief power down at the right time.
Record of performance:
10. Rooting the MikroTik Routers
Solid technical report with live demos of hacking of industrial routers MikroTik. At the end, the speaker played a classic melody on the device’s beeper. The audience appreciated.
Record of performance:
11. Network Traffic Analysis using Deep Packet Inspection and Data Visualization
Cheerful performance on the results of the thesis. The speaker presented on his system live showed interesting features that gives a visual analysis of network traffic.
Record of performance:
12. Off Grid: Disclosing Your 0days in a Videogame Mod
Wonderful performance of the developers of the game Off Grid. This is a role-playing computer game in which you play as a hacker and hack systems in a huge building of a large corporation. Software on computers, smartphones, etc. that you interact with is running on real systems in virtual machines. That is all for real :) Plus there is an opportunity to practice social engineering and other tricks.
Record of performance:
13. FaceDancer 2.0
The valuable performance of a couple of FaceDancer 2.0 developers - USB fuzzing technology. The fact is that in the Linux kernel and many other systems the policy of trusting the hardware is incorrectly built. In particular, the code of the USB stack contains the basic confidence in the correct behavior of everything that is connected via USB. And that makes attacks with malicious USB devices very effective. And so FaceDancer 2.0 is an updated USB stack fuzzing technology that helps to find and fix its vulnerabilities.