Készült a Fedora release partira.
Tárgyalja a ZFS fájlrendszer előnyeit a hagyományos fájlrendszerekkel, illetve hardware/software raid-el szemben.
Pár példát is tartalmaz ZFS fájlrendszer kezelésére, illetve bemutat két hardvert konkrét alkalmazási példával.
Készült a Fedora release partira.
Tárgyalja a ZFS fájlrendszer előnyeit a hagyományos fájlrendszerekkel, illetve hardware/software raid-el szemben.
Pár példát is tartalmaz ZFS fájlrendszer kezelésére, illetve bemutat két hardvert konkrét alkalmazási példával.
The document discusses security issues in mobile applications on iOS and Android. It provides an overview of iOS security features like sandboxing, the secure enclave, and full disk encryption. It also discusses potential risks like what data is stored in app bundles and sandboxes. For Android, it describes the more open ecosystem and risks of data storage on external storage or via backups. The document outlines threats like malware targeting banking apps and issues with permissions, exported app components, and inter-process communication.
The document provides an overview of privacy and anonymity on blockchains. It discusses how early Bitcoin users thought it was anonymous but exchanges required real identities. It describes analysis of Bitcoin transactions and better privacy with tools like coinjoins, Tornado Cash and future ideas like stealth addresses. It summarizes criminal cases where privacy failures led to arrests and emphasizes that blockchains provide a permanent record so one should not do illegal activities or link identities to addresses.
Cloud DFIR techniques and tools were discussed, including terminology, shared responsibility models, identity and access management, instance metadata services, various log sources, and traffic mirroring capabilities across AWS, Azure, and GCP cloud platforms. Key points covered include the different log types available, default configurations and retention periods, and tools like SOF-ELK that can help centralize and parse cloud logs. Challenges of cloud forensics such as non-standardized terminology, lack of default log collection, and limitations of traffic mirroring were also noted.
This document discusses hacking in Minecraft. It provides an overview of Minecraft's history and the author's history playing the game. It then covers topics like decompiling Minecraft, running your own server, scanning for servers like LiveOverflow, connecting to LiveOverflow, using mods like Fabric and mixins, coordinate exploits from 2018, and the 2021 Log4Shell vulnerability. The document concludes by discussing X-ray mods and expressing concern that Minecraft taught players it is okay to run random JAR files from servers.
HUN Hackersuli - How to hack an airplanehackersuli
This document discusses how to hack airplanes and get away with it. It provides an aviation security primer, describing security boundaries, certification requirements, and the "Swiss cheese model" of security. It also defines various aviation industry acronyms and terms. The document examines potential attack surfaces in different parts of an airplane system, including data loading interfaces. It presents a case study on portable data loaders used for updating airplane software, outlining the data loading process, attack surfaces, and potential threat scenarios involving the loader.
[Hackersuli] [HUN] Windows a szereloaknanhackersuli
This document discusses using the Autoruns tool to analyze startup programs and hidden files on a Windows system. It recommends using Autoruns to save a list of startup programs, copying files to a clean system for offline analysis, and notes that the SHIM database is not detected by Autoruns. The document also covers using alternate data streams to hide files like using "echo secret > test.txt:secret.txt" and provides the Streams.exe tool for viewing these hidden files.
[HUN] Hackersuli - Console and arcade game hacking – history, present, futurehackersuli
This document provides a history of console and arcade game hacking, from early consoles like the Sega Saturn and PlayStation 1 that were hacked through modchips and workarounds, to newer consoles like the PlayStation 4 and Nintendo Switch that require chaining software exploits to achieve jailbreaking. It discusses the motivation for game preservation and homebrew development. Security measures by companies like Capcom and techniques used by hackers to eventually break the protections are outlined. The current state of hacking modern consoles like the PlayStation 4 and Nintendo Switch through exploit chains is described, as well as challenges for hacking future systems.
Hackersuli - Linux game hacking with LD_PRELOADhackersuli
This document discusses using LD_PRELOAD and DYLD_INSERT_LIBRARIES to inject code into processes via shared object preloading on Linux and macOS respectively. It provides examples of modifying system calls and injecting code into applications at runtime. It also explains how to compile shared objects for injection and discusses some techniques for preventing injection, such as using setuid/setgid bits.
This document provides an overview of malware types, notable malware incidents, and techniques used by malware authors to evade detection. It discusses the Morris Worm in 1988, the transition of malware motives from fame to money, and exponential growth in new malware samples daily. Methods used by antivirus to detect malware and techniques used by malware to avoid detection are outlined. Cybercrime groups and interesting malware cases that were creative or exploited vulnerabilities are also summarized.
[Hackersuli][HUN]MacOS - Going Down the Rabbit Holehackersuli
This document discusses macOS privilege escalation techniques using benign App Store apps. It describes how dylib hijacking can be used to gain root privileges by subverting the installation process and dropping files in privileged locations. It provides a demonstration using a "Crontab Creator" app to drop a cronjob that executes a script with root privileges. The document also discusses monitoring tools and how Apple addressed the vulnerability in later macOS versions.
[HUN][Hackersuli] Androidos alkalmazássebészet, avagy gumikesztyűt fel és irá...hackersuli
A januári hackersulin belemerülünk az androidos alkalmazások nagyon mély lelkivilágába. Könyékig fogunk túrni az androidos "assembly"-ben és megnézzük, hogy mire lehet használni a szanaszéjjel cincált byte kódot, hogy lehet mókolni vele. Hónaljig merülünk a java compiler és a dalvik rejtelmeibe és a fejünk búbja is tocsogni fog a processzorregiszterek vakargatásától. Móka és kacagás az egész családnak!
Halálcsillag, pizza, süti, üccsi, gyakorlati példák, jó fej meetupra látogató, IT biztonság iránt érdeklődő emberkék és ultrajófej előadók mind várhatóak.
Gyertek és adjátok tovább!
[HUN][Hackersuli] iOS hekkelés, avagy egyik szemünk zokog, a másik meg kacagv...hackersuli
"Van publikus iBoot exploit az iOS-hez!"
Ha erre a mondatra nem vigyorogsz, gyere el és fogsz. Ha viszont zokognál, akkor arra is van okod - hogy miért, gyere el és megtudod :)
A decemberi első* Hackersuli meetupon iOS-ről fogunk beszélni mind alkalmazáshekkelési/penteszter szemszögből, mind pedig abból nézve, hogy most akkor beadhatod-e nyugodt szívvel az iPhone-odat kijelzőcserére az araboknak a Nyugatinál.
Kriptovaluták, hashbányászat és okoscicákhackersuli
Zoltan Balazs provides a simplified explanation of Ethereum smart contracts for a five-year-old audience. He begins by explaining blockchain and cryptocurrencies using metaphors involving math puzzles and a fictional currency called "moneZ". He then explains how smart contracts allow digital agreements to be "carved into stone" by encoding them as code on the blockchain. Smart contracts use a programming language called Solidity and run on Ethereum's virtual machine. While promising, smart contracts also introduce new hacking risks as code vulnerabilities cannot be fixed like legal contracts. Examples of past hacks involving The DAO and a Parity wallet library vulnerability are briefly described to illustrate this risk.
The document discusses security issues in mobile applications on iOS and Android. It provides an overview of iOS security features like sandboxing, the secure enclave, and full disk encryption. It also discusses potential risks like what data is stored in app bundles and sandboxes. For Android, it describes the more open ecosystem and risks of data storage on external storage or via backups. The document outlines threats like malware targeting banking apps and issues with permissions, exported app components, and inter-process communication.
The document provides an overview of privacy and anonymity on blockchains. It discusses how early Bitcoin users thought it was anonymous but exchanges required real identities. It describes analysis of Bitcoin transactions and better privacy with tools like coinjoins, Tornado Cash and future ideas like stealth addresses. It summarizes criminal cases where privacy failures led to arrests and emphasizes that blockchains provide a permanent record so one should not do illegal activities or link identities to addresses.
Cloud DFIR techniques and tools were discussed, including terminology, shared responsibility models, identity and access management, instance metadata services, various log sources, and traffic mirroring capabilities across AWS, Azure, and GCP cloud platforms. Key points covered include the different log types available, default configurations and retention periods, and tools like SOF-ELK that can help centralize and parse cloud logs. Challenges of cloud forensics such as non-standardized terminology, lack of default log collection, and limitations of traffic mirroring were also noted.
This document discusses hacking in Minecraft. It provides an overview of Minecraft's history and the author's history playing the game. It then covers topics like decompiling Minecraft, running your own server, scanning for servers like LiveOverflow, connecting to LiveOverflow, using mods like Fabric and mixins, coordinate exploits from 2018, and the 2021 Log4Shell vulnerability. The document concludes by discussing X-ray mods and expressing concern that Minecraft taught players it is okay to run random JAR files from servers.
HUN Hackersuli - How to hack an airplanehackersuli
This document discusses how to hack airplanes and get away with it. It provides an aviation security primer, describing security boundaries, certification requirements, and the "Swiss cheese model" of security. It also defines various aviation industry acronyms and terms. The document examines potential attack surfaces in different parts of an airplane system, including data loading interfaces. It presents a case study on portable data loaders used for updating airplane software, outlining the data loading process, attack surfaces, and potential threat scenarios involving the loader.
[Hackersuli] [HUN] Windows a szereloaknanhackersuli
This document discusses using the Autoruns tool to analyze startup programs and hidden files on a Windows system. It recommends using Autoruns to save a list of startup programs, copying files to a clean system for offline analysis, and notes that the SHIM database is not detected by Autoruns. The document also covers using alternate data streams to hide files like using "echo secret > test.txt:secret.txt" and provides the Streams.exe tool for viewing these hidden files.
[HUN] Hackersuli - Console and arcade game hacking – history, present, futurehackersuli
This document provides a history of console and arcade game hacking, from early consoles like the Sega Saturn and PlayStation 1 that were hacked through modchips and workarounds, to newer consoles like the PlayStation 4 and Nintendo Switch that require chaining software exploits to achieve jailbreaking. It discusses the motivation for game preservation and homebrew development. Security measures by companies like Capcom and techniques used by hackers to eventually break the protections are outlined. The current state of hacking modern consoles like the PlayStation 4 and Nintendo Switch through exploit chains is described, as well as challenges for hacking future systems.
Hackersuli - Linux game hacking with LD_PRELOADhackersuli
This document discusses using LD_PRELOAD and DYLD_INSERT_LIBRARIES to inject code into processes via shared object preloading on Linux and macOS respectively. It provides examples of modifying system calls and injecting code into applications at runtime. It also explains how to compile shared objects for injection and discusses some techniques for preventing injection, such as using setuid/setgid bits.
This document provides an overview of malware types, notable malware incidents, and techniques used by malware authors to evade detection. It discusses the Morris Worm in 1988, the transition of malware motives from fame to money, and exponential growth in new malware samples daily. Methods used by antivirus to detect malware and techniques used by malware to avoid detection are outlined. Cybercrime groups and interesting malware cases that were creative or exploited vulnerabilities are also summarized.
[Hackersuli][HUN]MacOS - Going Down the Rabbit Holehackersuli
This document discusses macOS privilege escalation techniques using benign App Store apps. It describes how dylib hijacking can be used to gain root privileges by subverting the installation process and dropping files in privileged locations. It provides a demonstration using a "Crontab Creator" app to drop a cronjob that executes a script with root privileges. The document also discusses monitoring tools and how Apple addressed the vulnerability in later macOS versions.
[HUN][Hackersuli] Androidos alkalmazássebészet, avagy gumikesztyűt fel és irá...hackersuli
A januári hackersulin belemerülünk az androidos alkalmazások nagyon mély lelkivilágába. Könyékig fogunk túrni az androidos "assembly"-ben és megnézzük, hogy mire lehet használni a szanaszéjjel cincált byte kódot, hogy lehet mókolni vele. Hónaljig merülünk a java compiler és a dalvik rejtelmeibe és a fejünk búbja is tocsogni fog a processzorregiszterek vakargatásától. Móka és kacagás az egész családnak!
Halálcsillag, pizza, süti, üccsi, gyakorlati példák, jó fej meetupra látogató, IT biztonság iránt érdeklődő emberkék és ultrajófej előadók mind várhatóak.
Gyertek és adjátok tovább!
[HUN][Hackersuli] iOS hekkelés, avagy egyik szemünk zokog, a másik meg kacagv...hackersuli
"Van publikus iBoot exploit az iOS-hez!"
Ha erre a mondatra nem vigyorogsz, gyere el és fogsz. Ha viszont zokognál, akkor arra is van okod - hogy miért, gyere el és megtudod :)
A decemberi első* Hackersuli meetupon iOS-ről fogunk beszélni mind alkalmazáshekkelési/penteszter szemszögből, mind pedig abból nézve, hogy most akkor beadhatod-e nyugodt szívvel az iPhone-odat kijelzőcserére az araboknak a Nyugatinál.
Kriptovaluták, hashbányászat és okoscicákhackersuli
Zoltan Balazs provides a simplified explanation of Ethereum smart contracts for a five-year-old audience. He begins by explaining blockchain and cryptocurrencies using metaphors involving math puzzles and a fictional currency called "moneZ". He then explains how smart contracts allow digital agreements to be "carved into stone" by encoding them as code on the blockchain. Smart contracts use a programming language called Solidity and run on Ethereum's virtual machine. While promising, smart contracts also introduce new hacking risks as code vulnerabilities cannot be fixed like legal contracts. Examples of past hacks involving The DAO and a Parity wallet library vulnerability are briefly described to illustrate this risk.
5. Bevezet´es
MCU
SBC
SDR
Vide´ok let¨olt´ese egy kev´esb´e n´epszer˝u megoszt´or´ol
Menek¨ul´es a szoftveres vil´agb´ol
SW konkl´uzi´o
Sebess´eg: gyors fejleszt´esi ciklusok
szerkeszt – futtat – debugol m´asodpercek alatt
K¨olts´eg: gyakorlatilag semmi
mindenkinek van PC-je
Szk´op: megl´ev˝o (legink´abb hardveres) infrastrukt´ura hat´arai
dnet / Veres-Szentkir´alyi Andr´as / HA5VSA vsza@vsza.hu Hardware hacking 1×1
6. Bevezet´es
MCU
SBC
SDR
Vide´ok let¨olt´ese egy kev´esb´e n´epszer˝u megoszt´or´ol
Menek¨ul´es a szoftveres vil´agb´ol
Els˝o akad´aly: k¨olts´egek
Szeretn´el hardvert hackelni? Kelleni fog . . .
egy development board
egy programoz´o
egy (in-circuit) debugger
egy oszcill´oszk´op
egy logikai analiz´ator
mindenf´ele, egym´assal inkompatibilis k´abelek
bloated, z´art, proprietary szoftvercsomagok
Emk´ekeztek DVD Jonra?
dnet / Veres-Szentkir´alyi Andr´as / HA5VSA vsza@vsza.hu Hardware hacking 1×1
7. Bevezet´es
MCU
SBC
SDR
Vide´ok let¨olt´ese egy kev´esb´e n´epszer˝u megoszt´or´ol
Menek¨ul´es a szoftveres vil´agb´ol
M´asodik akad´aly: tud´as
Siker¨ult p´enzt szerezni?
Akkor mind¨ossze meg kell ismerned . . .
p´ar
”
´erdekes” nyelvet
WTF BASIC, abnorm´alis C-vari´ansok
a fentieknek megfelel˝o ford´ıt´o haszn´alat´at
a kin´ezett hardver bels˝o m˝uk¨od´es´enek r´eszleteit
400 oldalas adatlap
p´ar proprietary perif´eri´at ´es drivert
. . . ugye?
dnet / Veres-Szentkir´alyi Andr´as / HA5VSA vsza@vsza.hu Hardware hacking 1×1
8. Bevezet´es
MCU
SBC
SDR
Vide´ok let¨olt´ese egy kev´esb´e n´epszer˝u megoszt´or´ol
Menek¨ul´es a szoftveres vil´agb´ol
Megold´asok a szoftveres vil´agban
Ezek a probl´em´ak m´ar ismertek a szoftveres vil´agban, ´es meg is
oldottuk ˝oket:
ingyenes ´es szabad, min˝os´egi ford´ıt´ok szuper nyelvekhez
keretrendszerek abszrakci´oja elrejti az als´obb r´etegeket
nem kell minden egyes dologra debugger, ha print is megteszi
Nem lehetne ezt hardverre is alkalmazni?
dnet / Veres-Szentkir´alyi Andr´as / HA5VSA vsza@vsza.hu Hardware hacking 1×1
10. Bevezet´es
MCU
SBC
SDR
Bevezet´es
Arduino vs. vil´ag
Mi ez?
Teljes ´ert´ek˝u ´altal´anos c´el´u mikrokontrolleres ´aramk¨or
Kezeld sz´am´ıt´og´epk´ent
Van CPU-ja: mikrokontrollernek h´ıvj´ak
Van mem´ori´aja: 1k RAM
Van t´arhelye
16k Flash (k´od)
512b EEPROM (adat)
Vannak portjai: USB, RS-232, I2C, SPI, . . .
dnet / Veres-Szentkir´alyi Andr´as / HA5VSA vsza@vsza.hu Hardware hacking 1×1
11. Bevezet´es
MCU
SBC
SDR
Bevezet´es
Arduino vs. vil´ag
Mi´ert nagy dolog?
Olcs´o (20 USD egy UNO, kl´onok 8 USD alatt)
A szoftver fut Linux, Mac ´es Windows platformokon
The driverek t´enyleg m˝uk¨odnek a fenti platformokon
A szoftver ´es hardver is szabad
A tanul´asi g¨orbe igen lank´as egy fa´ek egyszer˝us´eg˝u IDE-vel
(l´asd k¨ovetkez˝o slide)
Nem egy chipgy´art´o csin´alta (fontos!)
”
It is the Apple ][ of the open source prototyping movement –
the first successful device that was able to build a significant
following.”
dnet / Veres-Szentkir´alyi Andr´as / HA5VSA vsza@vsza.hu Hardware hacking 1×1
14. Bevezet´es
MCU
SBC
SDR
Bevezet´es
Arduino vs. vil´ag
Hardveres b˝ov´ıt´es: shieldek
”
A product transcends being a mere product and becomes the core
of an ecosystem when it’s easy to add things onto it and when the
interface between the two stays stable enough that people feel
comfortable committing resources to it over the long term. With
the early PCs, it was their slot connectors. With the iPod
it’s the dock connector. With the Arduino, it’s the shield
connector. I think we all know there are problems with its current
design, but the Arduino team is wise not to change it in an
incompatible way because that hurts the Arduino ecosystem.”
dnet / Veres-Szentkir´alyi Andr´as / HA5VSA vsza@vsza.hu Hardware hacking 1×1