📜 ⬆️ ⬇️

Review of the best technical reports of the Still Hacking Anyway 2017 conference

Photo by Arron Dowdeswell @Arronandir

From August 4 to August 8, a large hacker festival SHA2017 was held in the Netherlands. Despite intensive preparations for my speech (and great excitement before him), I attended many interesting reports. In this article I will list those that I especially liked, and I will share my impressions.


1. How the NSA tracks you


Bill Binney spoke at the opening of SHA2017 and talked about how the NSA is following us. On the one hand, the very topic of the report is no longer a sensation. On the other hand, I note that this person worked at the NSA for 34 (!) Years, and at the end of his career he served as the technical director of this service. During his speech, I was sitting in the front row, and I was greatly impressed by the heavy and piercing gaze of this elderly person in a wheelchair.
')
Record of performance:



2. Mathematics and Video Games


Funny and informative lecture on the application of graph theory and topology in the analysis of good old games like Packman and Space Invaders.

Record of performance:



3. Automotive Microcontrollers. Safety! = Security


Very interesting report on the use of a variety of impulse noise (glitches) for hacking automation systems. The researchers clearly showed that the ISO26262 standard, which regulates measures to ensure the reliability of automation systems, does not ensure their safety.

Record of performance:



4. DNA: The Code of Live


Just a great lecture by Bert Hubert (Bert Hubert) on DNA in terms of information technology. He is a charismatic speaker, plus he prepared his material well for the hacker conference. I did not notice how the hour passed, and in the end I was simply delighted with how brilliantly the Creator created life and described it in DNA.

Record of performance:



5. Improving Security with Fuzzing and Sanitizers


Cool performance on topical topics from the legend of the German security community - Hanno (Hanno Böck). I made some new ideas on fuzzing techniques for myself and talked to the speaker about the possibilities to expand the use of Sanitizers.

Record of performance:



6. Race for Root: Analysis of the Linux Kernel Race Condition Exploit


Very good technical report, I recommend! ;) I talked about the race condition I found in the Linux kernel (CVE-2017-2636) and described in detail the exploitation of this vulnerability for local privilege escalation. Also demonstrated a prototype exploit in action.

Record of performance:



I take this opportunity to inform you that my patch, which blocks similar exploits, has been adopted in the Linux kernel mainline. Technical details are published in our corporate blog .

7. Flip Feng Shui


One of the most powerful and high-profile reports of SHA2017. Victor van der Veen and Kaveh Razavi are advanced security figures in the Netherlands. The other day, they won the prestigious PWNIE award for the development of the Rowhammer operating methodology for hacking cloud platforms and Android attacks. The guys performed well, easily explained the beauty of their ideas and showed the demo.

Record of performance:



8. Computational Thinking


A valuable presentation by Pauline Maas, who shared her successful experience of involving children and teenagers in programming and algorithmic thinking.

Record of performance:



9. Bypassing Secure Boot using Fault Injection


Useful technical report on attacks using fault injection. Particularly impressed by the live demonstration of the bypass checks Secure Boot at ARM with the help of a brief power down at the right time.

Record of performance:



10. Rooting the MikroTik Routers


Solid technical report with live demos of hacking of industrial routers MikroTik. At the end, the speaker played a classic melody on the device’s beeper. The audience appreciated.

Record of performance:



11. Network Traffic Analysis using Deep Packet Inspection and Data Visualization


Cheerful performance on the results of the thesis. The speaker presented on his system live showed interesting features that gives a visual analysis of network traffic.

Record of performance:



12. Off Grid: Disclosing Your 0days in a Videogame Mod


Wonderful performance of the developers of the game Off Grid. This is a role-playing computer game in which you play as a hacker and hack systems in a huge building of a large corporation. Software on computers, smartphones, etc. that you interact with is running on real systems in virtual machines. That is all for real :) Plus there is an opportunity to practice social engineering and other tricks.

Record of performance:



13. FaceDancer 2.0


The valuable performance of a couple of FaceDancer 2.0 developers - USB fuzzing technology. The fact is that in the Linux kernel and many other systems the policy of trusting the hardware is incorrectly built. In particular, the code of the USB stack contains the basic confidence in the correct behavior of everything that is connected via USB. And that makes attacks with malicious USB devices very effective. And so FaceDancer 2.0 is an updated USB stack fuzzing technology that helps to find and fix its vulnerabilities.

Record of performance:



Enjoy watching!

Source: https://habr.com/ru/post/336412/


All Articles