SlideShare a Scribd company logo
1 of 54
Download to read offline
RemotelyAttackingSystemFirmware
AlexBazhaniuk JesseMichael MickeyShkatov
• Overview
• Remoteattacksurface
• BIOSRemoteattackvectors
• Walkthroughexploits
• Detectingcompromise
Agenda
Overview
Overview
14
3
3
4 5 6
2
2
1
5 6
BMC-RemoteAttacksurface
1
2
3
1
2
3
CPU
SRAM
FLASH
BMC-RemoteAttacksurface
• DesignedforOutofBandservermanagement
• Commonusecases
-KVM
-BIOSFLASH
-Etc.
• Licensingtiers
Nmap scanreportforsupermicro-x11ssm-bmc.x.x.x (x.x.x.x)
Not shown: 65530closedports
PORT STATESERVICE REASON VERSION
80/tcp open http syn-ackttl 64ATEN/SupermicroIPMIwebinterface
443/tcp open ssl/http syn-ackttl64ATEN/SupermicroIPMIwebinterface
623/tcp open asf-rmcpsyn-ackttl 64SuperMicroIPMIRMCP
5900/tcp open vnc syn-ackttl 64VNC(protocol3.8)
MACAddress:0C:C4:7A:40:60:97(SuperMicroComputer)
Nmap done: 1IPaddress(1host up)scanned in 1403.00 seconds
BMC-RemoteAttacksurface
BMC-RemoteAttacksurface
IPMISpecification, V2.0,Rev.1.1
1
2
3 4
1
2
3
SHAREDorDEDICATEDNIC
SERIAL/MODEM
IPMBRemote management Card
4
4 ICMBBridge
HP iLO4 auth
bypass and
RCE
Multiplevulnsincluding
trivialauthbypass: curl
-H"Connection:
AAAAAAAAAAAAAAAAA
AAAAAAAAAAAA"
2018
SMC PSBlock
password file
vulnerability
Zachary Wikholmdiscoveredthat
Supermicro BMCshaveplaintext
passwordfilewhichcould be
retrievedremotely withoutauth,
32koninternet
2014
Many BMC/IPMI
vulnerabilities
published
Dan Farmer andHDMoore
foundover 300kBMCs
connected totheinternet,53k
vulnerabletocipher-zeroauth
bypass
2013
IPMI v2.0
spec
NewfeaturesincludingSerial
over LAN,Enhanced
Authentication,Firmware
Firewall, andVLANsupport
2004
IPMI v1.5 spec
Manyenhancementstobase
specification includingIPMI
over LANandIPMIover
Serial/Modem
IPMI v1.0 spec
BaseversionofIPMI
specification released
1998
BMC/IPMIhistory
2001
BMC-RemoteAttacksurface
ME/AMTRemoteAttacksurface
- CodeloadedfromplatformSPI
- Coderunning indedicatedCPUinchipset
- UsesdedicatedRAM&mainRAM
ME/AMTRemoteAttacksurface
Manageability Ports
16992 Intel(R)AMTHTTP
16993 Intel(R)AMTHTTPS
16994 Intel(R)AMTRedirection/TCP
16995 Intel(R)AMTRedirection/TLS
623 ASFRemoteManagement andControlProtocol(ASF-RMCP)
664 ASFSecureRemoteManagementandControlProtocol(ASF-RMCP)
5900 VNC(VirtualNetworkComputing)-remotecontrolprogram
https://software.intel.com/sites/manageability/AMT_Implementation_and_Reference_Guide
Multiple vulns
in AMT v8
through v11
PositiveTechnologies
foundmore vulnsinAMT
includingmultiple buffer
overflowsallowing LPE
andRCE
Also2017
Critical auth
bypass in AMT
v6 through v11
Embedi discovered that
you could logintoAMTas
admin withnopassword
on allvProsystemssince
2010
2017
AMT 6.0
Remote KVM support
added here
2010
AMT 4.0
Over-the-internet
provisioningcapabilities
2008
AMT 2.5
Wirelessnetwork
support added here
2007
AMT 1.0
FirstversionofIntelAMT
availableinCore 2Duo
vPro, includedembedded
web serverandfwupdate
capabilities
2006
IntelME/AMThistory
ME/AMTRemoteAttacksurface
BIOS-RemoteAttacksurface
- CodeloadedfrommainplatformSPI
- Coderunning inmainplatformCPU
- UsesmainRAM
Missing size
checks in
DHCP code
Topher Timzennoticed
thatDHCPcode used
untrustedlengthfrom
networkforcopy
withoutchecks
2016
UEFI 2.6
TLSimplementation
added based on
OpenSSL
2016
UEFI 2.5
WiFi,Bluetooth,HTTP,
andHTTPBOOT
functionalityadded
2015
UEFI 2.1
Cryptography,
network
authentication,andUI
infrastructureadded
2007
EFI 1.10
Intelreleased EFI1.10
standard and
contributeditto
UnifiedEFIForum
2002
EFI 1.02
Firstversionof
Extensible Firmware
Interfacestandard
writtenbyIntel
1998
UEFIhistory
BIOS-RemoteAttacksurface
BIOS-RemoteAttacksurface
• ReferenceCode
• Implementedfrom
scratch
• RunsbeforeOS
BIOS-RemoteAttacksurface
• Additionalfeatures
implementedbyvendor
• Extensionsontopof
UEFIstandard
• Somefeatures
eventuallygetpulled
intoUEFIstandard
UEFIBluetoothStackArchitecture
BIOS-RemoteAttacksurface
http://www.uefi.org/sites/default/files/resources/Tony%20Lo_UEFI_Plugfest_AMI_Spring_2017_Final.pdf
• Bluetoothfeature
createdbyAMI
• AllowstheuseofBT
devicesbefore
ExitBootService()
• BluetoothSMM
BIOS-RemoteAttacksurface
http://www.uefi.org/sites/default/files/resources/Tony%20Lo_UEFI_Plugfest_AMI_Spring_2017_Final.pdf
• AMIbuilttheirownWiFi
stackwithadditional
features
HTTPand PXEboot
BIOS-RemoteAttacksurface
• AllowsdownloadofUEFIbootloaderor
ISOviaHTTP(S)
• Checkssignaturebeforeexecutionto
allowSecureBoot
HPIntelligent Provisioning
BIOS-RemoteAttacksurface
• BuiltintoHPservers
• Allowsdownloadof
firmware/driversfrominternet
• Simpleconfigurationandinstallation
ofoperatingsystem
SMTPfromUEFI
BIOS-RemoteAttacksurface
● Sendsemailfrom BIOS
● CanmountNTFS partitions
● AttachanyfilefromHDto
email
● Couldbeusedmaliciously
Remote Diagnostics Download andExecute
BIOS-RemoteAttacksurface
● Downloads UEFI
executable from
remoteserverover
internet
● Candownload tool
fromHPorcustomURL
● Optionally upload
resultsbackto
customer-provided URL
BIOS-RemoteAttacksurface
● Downloadupdatesfromremote
serveroverinternet
● Multiplevendorshave
implementedthisontheirown
● Whatcouldgowrong?
UEFI updatesoverInternet
UEFI updatesoverInternet
BIOS-RemoteAttacksurface
● ASRock
implementation
UEFI updatesoverInternet
BIOS-RemoteAttacksurface
● ASUS
implementation
● Essentiallythe
samefunctionality,
implemented
differently
● Canspecifycheckfrequency
● Canconfigureautomatic
downloadandinstallation
BIOS-RemoteAttacksurface
UEFI updatesoverInternet
RemoteUpdateVulnerabilities
Providefirmwareupdatesforallaffected systemsdisablingthisfunctionality
Basicallyallrecentmotherboardshadthisvulnerability
Affected models:
● Intel1151(Skylake,KabyLake,CoffeeLake):159uniquemodels
● Intel1150(Haswell,Haswell-WS,Broadwell):109uniquemodels
● AMDAM4(Excavator,Zen,Zen+):27uniquemodels
ASRock’sresponsetoourvulnerability report:
RemoteUpdateVulnerabilities
ASUS’sresponse toourvulnerability report:
RemoteUpdateVulnerabilities
ExploitWalkthrough
ExploitWalkthrough
ExploitWalkthrough
ExploitWalkthrough
ExploitWalkthrough
ExploitWalkthrough
ExploitWalkthrough
ExploitWalkthrough
ExploitWalkthrough
DebuggingSystemFirmwareExploits
● IntelHardwareDebugInterface
XDP (Old) CCA(Newer) DbC(Current)
$3000 $390 $15
ExploitWalkthrough
ExploitWalkthrough
DebuggingSystemFirmwareExploits
● IntelSystemDebugger
ExploitWalkthrough
DebuggingSystemFirmwareExploits
● IntelDebugAbstractionLayer
UEFIpost-exploitationenvironment
● “Normal”shellcodewon’twork
● Nooperatingsystem=nosyscalls
ExploitWalkthrough
UEFIpost-exploitationenvironment
● Runningasring0
● NoASLR
● Nostackcanaries
● Nomemoryprotection
● Executablestack
ExploitWalkthrough
UEFIpost-exploitationenvironment
● CanuseBootServicesUEFIfunctionality
● NeedtoknowhowUEFIworksinternally
ExploitWalkthrough
UEFIpost-exploitationenvironment
UEFIprotocols
● Inter-componentOOPmechanism
● IdentifiedbyGUID
● Oneapplication/driverregistersprotocolinterfaceusingGUID
● Anotherapp/driverfindsprotocolinterfaceusingGUIDand
callsfunctionsinobject
ExploitWalkthrough
GUID
PROTOCOLINTERFACE
PRIVATEDATA
FUNCTIONPOINTER1
FUNCTIONPOINTER2
FUNCTIONPOINTER3
FUNCTIONPOINTERN
UEFIpost-exploitationenvironment
UsefulBootServicesfunctions
● LocateProtocol()
○ FindsaprotocolbyGUID
● LoadImage()
○ LoadsaUEFIimageintomemory
● StartImage()
○ Transferscontroltoaloadedimage’sentrypoint.
ExploitWalkthrough
NOPNOPNOPNOPNOPNOPNOPNOPNOPNOPNOPNOPNOPNOPNOPNOPNOPNOPNOPNOP EGGHUNTERSHELLCODE RETURNADDRESS
ONTHESTACK
8-BYTETAG LOAD&STARTIMAGESHELLCODE ARBITRARYUEFIAPPLICATION
ONTHEHEAP
COPY&DECODESTUB
ExploitWalkthrough
NOPNOPNOPNOPNOPNOPNOPNOPNOPNOPNOPNOPNOPNOPNOPNOPNOPNOPNOPNOP EGGHUNTERSHELLCODE RETURNADDRESS
ONTHESTACK
8-BYTETAG LOAD&STARTIMAGESHELLCODE ARBITRARYUEFIAPPLICATION
ONTHEHEAP
COPY&DECODESTUB
LOAD&STARTIMAGESHELLCODE ARBITRARYUEFIAPPLICATION
COPIEDFROMHEAPTO SAFELOCATION
ExploitWalkthrough
Potential UEFIsecurityhardening
● Hardenedpagingconfiguration
● Stackcanaries
● ASLR
● NX/DEP
Mitigations
DetectingtheASRockbufferoverflowwithYARA
ruleASRockUpdateOverflow
{
strings:
$liveupdate="LiveUpdate"
$urln=/<URL[0-9]+?.+?</URL[0-9]+?/
condition:
$liveupdateandforanyiin(1..#urln):(!urln[i]>260)
}
Mitigations
DetectingtheASUSbufferoverflowwithYARA
ruleASUSUpdateOverflow
{
strings:
$prod="<product>"
$desc=“<~description>”
$ver=/<version>.+?</
condition:
$prodand$descandforanyiin(1..#ver):(!ver[i]>260)
}
Mitigations
DetectingUEFI/BIOSmodificationwithCHIPSEC
ExtractBIOS SPIflash fromplatform andcreatewhitelist fromcontents:
# chipsec_main -m tools.uefi.whitelist
Generate whitelist fromcontents ofuefi.rom:
# chipsec_main -i -n -m tools.uefi.whitelist -a generate,efilist.json,uefi.rom
Checkcontents of uefi.romagainst whitelist:
# chipsec_main -i -n -m tools.uefi.whitelist -a check,efilist.json,uefi.rom
Detection
● Systemfirmwareiscomplex andhighlyprivileged
● BIOSishardtoupdate,sodonerarely
● Networkfunctionalityisbeingaddedinnewandexcitingplaces
● Newfeaturestomakeupdateseasierarealsoaddingnewexploitvectors
Conclusions
Questions?

More Related Content

What's hot

LCU14 302- How to port OP-TEE to another platform
LCU14 302- How to port OP-TEE to another platformLCU14 302- How to port OP-TEE to another platform
LCU14 302- How to port OP-TEE to another platform
Linaro
 
HKG15-505: Power Management interactions with OP-TEE and Trusted Firmware
HKG15-505: Power Management interactions with OP-TEE and Trusted FirmwareHKG15-505: Power Management interactions with OP-TEE and Trusted Firmware
HKG15-505: Power Management interactions with OP-TEE and Trusted Firmware
Linaro
 
BIOS and Secure Boot Attacks Uncovered
BIOS and Secure Boot Attacks UncoveredBIOS and Secure Boot Attacks Uncovered
BIOS and Secure Boot Attacks Uncovered
Alex Matrosov
 
IBM System Storage TS7650 / TS7650G / TS7610 ProtecTIER Deduplication Applian...
IBM System Storage TS7650 / TS7650G / TS7610 ProtecTIER Deduplication Applian...IBM System Storage TS7650 / TS7650G / TS7610 ProtecTIER Deduplication Applian...
IBM System Storage TS7650 / TS7650G / TS7610 ProtecTIER Deduplication Applian...
IBM India Smarter Computing
 
HKG18-223 - Trusted FirmwareM: Trusted boot
HKG18-223 - Trusted FirmwareM: Trusted bootHKG18-223 - Trusted FirmwareM: Trusted boot
HKG18-223 - Trusted FirmwareM: Trusted boot
Linaro
 

What's hot (20)

Bootkits step by-step-slides-final-v1-release
Bootkits step by-step-slides-final-v1-releaseBootkits step by-step-slides-final-v1-release
Bootkits step by-step-slides-final-v1-release
 
Spectre meltdown performance_tests - v0.3
Spectre meltdown performance_tests - v0.3Spectre meltdown performance_tests - v0.3
Spectre meltdown performance_tests - v0.3
 
ALSF13: Xen on ARM - Virtualization for the Automotive Industry - Stefano Sta...
ALSF13: Xen on ARM - Virtualization for the Automotive Industry - Stefano Sta...ALSF13: Xen on ARM - Virtualization for the Automotive Industry - Stefano Sta...
ALSF13: Xen on ARM - Virtualization for the Automotive Industry - Stefano Sta...
 
Demo
DemoDemo
Demo
 
LCA14: LCA14-105: UEFI secure boot
LCA14: LCA14-105: UEFI secure bootLCA14: LCA14-105: UEFI secure boot
LCA14: LCA14-105: UEFI secure boot
 
LCU14 302- How to port OP-TEE to another platform
LCU14 302- How to port OP-TEE to another platformLCU14 302- How to port OP-TEE to another platform
LCU14 302- How to port OP-TEE to another platform
 
HKG15-505: Power Management interactions with OP-TEE and Trusted Firmware
HKG15-505: Power Management interactions with OP-TEE and Trusted FirmwareHKG15-505: Power Management interactions with OP-TEE and Trusted Firmware
HKG15-505: Power Management interactions with OP-TEE and Trusted Firmware
 
HKG15-505: Power Management interactions with OP-TEE and Trusted Firmware
HKG15-505: Power Management interactions with OP-TEE and Trusted FirmwareHKG15-505: Power Management interactions with OP-TEE and Trusted Firmware
HKG15-505: Power Management interactions with OP-TEE and Trusted Firmware
 
Fast Boot Times with InsydeH2O
Fast Boot Times with InsydeH2OFast Boot Times with InsydeH2O
Fast Boot Times with InsydeH2O
 
Initial router and switch configuration
Initial router and switch configurationInitial router and switch configuration
Initial router and switch configuration
 
BIOS and Secure Boot Attacks Uncovered
BIOS and Secure Boot Attacks UncoveredBIOS and Secure Boot Attacks Uncovered
BIOS and Secure Boot Attacks Uncovered
 
IBM System Storage TS7650 / TS7650G / TS7610 ProtecTIER Deduplication Applian...
IBM System Storage TS7650 / TS7650G / TS7610 ProtecTIER Deduplication Applian...IBM System Storage TS7650 / TS7650G / TS7610 ProtecTIER Deduplication Applian...
IBM System Storage TS7650 / TS7650G / TS7610 ProtecTIER Deduplication Applian...
 
LAS16-200: Firmware Summit - UEFI secure boot
LAS16-200: Firmware Summit - UEFI secure bootLAS16-200: Firmware Summit - UEFI secure boot
LAS16-200: Firmware Summit - UEFI secure boot
 
Open Source Firmware - FrOSCon 2019
Open Source Firmware - FrOSCon 2019Open Source Firmware - FrOSCon 2019
Open Source Firmware - FrOSCon 2019
 
HKG18-223 - Trusted FirmwareM: Trusted boot
HKG18-223 - Trusted FirmwareM: Trusted bootHKG18-223 - Trusted FirmwareM: Trusted boot
HKG18-223 - Trusted FirmwareM: Trusted boot
 
UEFI presentation
UEFI presentationUEFI presentation
UEFI presentation
 
Pfsense%20%20note
Pfsense%20%20notePfsense%20%20note
Pfsense%20%20note
 
LCU13: An Introduction to ARM Trusted Firmware
LCU13: An Introduction to ARM Trusted FirmwareLCU13: An Introduction to ARM Trusted Firmware
LCU13: An Introduction to ARM Trusted Firmware
 
HKG15-311: OP-TEE for Beginners and Porting Review
HKG15-311: OP-TEE for Beginners and Porting ReviewHKG15-311: OP-TEE for Beginners and Porting Review
HKG15-311: OP-TEE for Beginners and Porting Review
 
XPDDS17: EFI Secure Boot, Shim and Xen: Current Status and Developments - Da...
XPDDS17:  EFI Secure Boot, Shim and Xen: Current Status and Developments - Da...XPDDS17:  EFI Secure Boot, Shim and Xen: Current Status and Developments - Da...
XPDDS17: EFI Secure Boot, Shim and Xen: Current Status and Developments - Da...
 

Similar to Remotely Attacking System Firmware

Mr201309 automated on-execute_test_using_virtual_box_eng
Mr201309 automated on-execute_test_using_virtual_box_engMr201309 automated on-execute_test_using_virtual_box_eng
Mr201309 automated on-execute_test_using_virtual_box_eng
FFRI, Inc.
 
Bootkits: past, present & future
Bootkits: past, present & futureBootkits: past, present & future
Bootkits: past, present & future
Alex Matrosov
 

Similar to Remotely Attacking System Firmware (20)

Moksha - HTML5/CSS with Qt5+Snowshoe on AM335x
Moksha - HTML5/CSS with Qt5+Snowshoe on AM335xMoksha - HTML5/CSS with Qt5+Snowshoe on AM335x
Moksha - HTML5/CSS with Qt5+Snowshoe on AM335x
 
Tiny ML for spark Fun Edge
Tiny ML for spark Fun EdgeTiny ML for spark Fun Edge
Tiny ML for spark Fun Edge
 
44CON 2014 - Stupid PCIe Tricks, Joe Fitzpatrick
44CON 2014 - Stupid PCIe Tricks, Joe Fitzpatrick44CON 2014 - Stupid PCIe Tricks, Joe Fitzpatrick
44CON 2014 - Stupid PCIe Tricks, Joe Fitzpatrick
 
Soyo syd6iba
Soyo syd6ibaSoyo syd6iba
Soyo syd6iba
 
Building PoC ready ODM Platforms with Arm SystemReady v5.2.pdf
Building PoC ready ODM Platforms with Arm SystemReady v5.2.pdfBuilding PoC ready ODM Platforms with Arm SystemReady v5.2.pdf
Building PoC ready ODM Platforms with Arm SystemReady v5.2.pdf
 
Raspberry Pi tutorial
Raspberry Pi tutorialRaspberry Pi tutorial
Raspberry Pi tutorial
 
PCI Pass-through - FreeBSD VM on Hyper-V (MeetBSD California 2016)
PCI Pass-through - FreeBSD VM on Hyper-V (MeetBSD California 2016)PCI Pass-through - FreeBSD VM on Hyper-V (MeetBSD California 2016)
PCI Pass-through - FreeBSD VM on Hyper-V (MeetBSD California 2016)
 
Implementing SR-IOv failover for Windows guests during live migration
Implementing SR-IOv failover for Windows guests during live migrationImplementing SR-IOv failover for Windows guests during live migration
Implementing SR-IOv failover for Windows guests during live migration
 
OSDC 2014: Nat Morris - Open Network Install Environment
OSDC 2014: Nat Morris - Open Network Install EnvironmentOSDC 2014: Nat Morris - Open Network Install Environment
OSDC 2014: Nat Morris - Open Network Install Environment
 
Mr201309 automated on-execute_test_using_virtual_box_eng
Mr201309 automated on-execute_test_using_virtual_box_engMr201309 automated on-execute_test_using_virtual_box_eng
Mr201309 automated on-execute_test_using_virtual_box_eng
 
XPDDS17: PL011 UART Emulation in Xen on ARM - Bhupinder Thakur, Qualcomm Data...
XPDDS17: PL011 UART Emulation in Xen on ARM - Bhupinder Thakur, Qualcomm Data...XPDDS17: PL011 UART Emulation in Xen on ARM - Bhupinder Thakur, Qualcomm Data...
XPDDS17: PL011 UART Emulation in Xen on ARM - Bhupinder Thakur, Qualcomm Data...
 
hacking-embedded-devices.pptx
hacking-embedded-devices.pptxhacking-embedded-devices.pptx
hacking-embedded-devices.pptx
 
2022-05-03 SoC Interest Group Meeting - Deploying and testing firmware-softwa...
2022-05-03 SoC Interest Group Meeting - Deploying and testing firmware-softwa...2022-05-03 SoC Interest Group Meeting - Deploying and testing firmware-softwa...
2022-05-03 SoC Interest Group Meeting - Deploying and testing firmware-softwa...
 
Bootkits: past, present & future
Bootkits: past, present & futureBootkits: past, present & future
Bootkits: past, present & future
 
Embedding Linux On The Encore Simputer
Embedding Linux On The Encore SimputerEmbedding Linux On The Encore Simputer
Embedding Linux On The Encore Simputer
 
Larson Macaulay apt_malware_past_present_future_out_of_band_techniques
Larson Macaulay apt_malware_past_present_future_out_of_band_techniquesLarson Macaulay apt_malware_past_present_future_out_of_band_techniques
Larson Macaulay apt_malware_past_present_future_out_of_band_techniques
 
x86_64 Hardware Deep dive
x86_64 Hardware Deep divex86_64 Hardware Deep dive
x86_64 Hardware Deep dive
 
Using VPP and SRIO-V with Clear Containers
Using VPP and SRIO-V with Clear ContainersUsing VPP and SRIO-V with Clear Containers
Using VPP and SRIO-V with Clear Containers
 
Understanding kube proxy in ipvs mode
Understanding kube proxy in ipvs modeUnderstanding kube proxy in ipvs mode
Understanding kube proxy in ipvs mode
 
Slimline Open Firmware
Slimline Open FirmwareSlimline Open Firmware
Slimline Open Firmware
 

More from Priyanka Aash

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Remotely Attacking System Firmware