Tech Conference Topic
DefCon24 V2V Communication
DefCon 24 BioHacking and Mortal Limitations
DefCon 24
Introduction to Car Hacking, Reverse Engineering and
exploitation of infotainment system
DefCon 25 Hunting GPS Jammers
DefCon 25 Abusing Smart cars with QR Codes
DefCon 25 Failsafe: Yet another SimplySafe Attack Vector
DefCon 25 GPS System Integrity
DefCon 25 POGSAG Amateur Paper Network
DefCon 25 Suitcase Repeater build for UHF
DefCon 25 Ethical Implications of Medical Devices
BlackHat Europe
Breaking Bad: Stealing Patient Data Through Medical
Devices
ESCAR- Japan Automotive Cyber Security
InfraGard- China Cloud Security
Spirent顧問於國際間發表的成果
Tech Conference Topic
InfraGard- PA Scada Security Panel
Toyo – Cyber Security
Summit- Japan
Cyber Range Attacks
Los Angeles - Cyber
Security Summit 2016
Emerging Threats to the California Economy
Block2TheFuture
– San Francisco
Blockchain – Is your Cryptocurrency secure?
CRESTCON & IISP Congress I know what you installed last summer
Hack NYC This penetration test isn’t the scan I asked for
Bloomberg – The future of
Cybersecurity
Are your corporate website and network really safe?
DefCon 26 Attacking Gotenna Networks
DefCon 26 A better bedside – The Blue Team needs a Plan B
DefCon 26 Jumping the Epidermal Barrier
DefCon 26 Skiptracer – Ghetto OSINT for broke hackers
CyberSecurity Chicago
Dealing with IoT Security – Don nothing, do simple
things, or do it RIGHT!
15.
Spirent securitylab資安弱點挖掘
Publications
• CVE-2019-18608
•CVE-2020-7688
The CVE-2020-7688 was found in the application which allows an attacker to execute remote
commands on the system
CVE-2019-18608, is a vulnerability that exists in the checkout page which allows an attacker to
send extra parameter values e.g. ‘paid’, which results in manipulating the order status to paid
(an attacker can check out without paying anything). These vulnerabilities were found through the
combination of black box and white box testing
https://github.com/mikaelbr/mversion/issues/56
https://github.com/418sec/cezerin/pull/1
16.
Spirent securitylab資安弱點挖掘
vulnerabilities (zeroday) 來源連結
MyMag wordpress theme Unrestricted File
Upload
https://cxsecurity.com/issue/WLB-
2017020238
Multiple XSS Vulnerabilities in BoxBilling: https://github.com/boxbilling/boxbilling/issu
es/596
Regular Expression Denial of Service
(ReDoS) in urlregex
https://github.com/nescalante/urlregex/issue
s/6
Regular Expression Denial of Service
(ReDoS) in url-regexp :
https://github.com/gajus/url-regexp/issues/8
Denial of Service in metascraper-helpers: https://github.com/microlinkhq/metascraper/
issues/281
Regular Expression Denial of Service
(ReDoS) in RestQL
https://github.com/418sec/huntr/pull/105
1-1. 外部網路滲透測試方式
程序與方法說明:
• SecurityLabs將對客戶的基礎架構進行被動偵察,以獲得有關其環境,公司業務流程和結構的知
識基礎。將發現的訊息提交審核和範圍批准後,Spirent將主動掃描已識別的範圍,來列舉活動的
IP地址和打開的端口。
• 分析目標IP地址上的所有打開的端口,以確定軟體,服務,版本和配置。 這是連續掃描過程的一
部分。利用以獲取對設備或服務的訪問權,然後再次掃描以繼續在被評估的網路中橫向移動。
i. 偵察–收集有關目標組織和相關網路的被動信息。
ii. 網路拓樸
iii. 自動化漏洞掃描
iv. 服務產品列表
v. 服務標語和版本列表
vi. 測試已發布的漏洞和配置錯誤,如認證項目不足或缺乏。協議弱點偵測及未修補之漏洞偵測
vii. 管理介面識別
viii.威脅測試
ix. 數據滲透測試
x. 復原