The report considers practical aspects of reliability of existing systems allowing authentication of photographic evidence originality. The reporter examines a vulnerability in the Canon Original Data Security system of image authenticity verification, which was designed to authenticate originality of images captured by the Canon digital reflex still cameras.
Positive Hack Days. Скляров. Уязвимости систем контроля подлинности цифровых ...Positive Hack Days
В докладе рассматриваются практические аспекты надежности существующих систем обеспечения подлинности фотографических улик. Рассматривается уязвимость в системе проверки аутентичности фотографий Canon Original Data Security, предназначенной для подтверждения подлинности изображений, сделанных зеркальными цифровыми фотокамерами Canon.
This document discusses various causes and classifications of intestinal obstruction, including intraluminal causes like impaction or foreign bodies, intramural causes like strictures or malignancy, and extramural causes like bands, adhesions or hernias. It describes the pathophysiology of obstruction including proximal bowel dilation and changes in motility and absorption. It also covers specific types like strangulation, closed-loop obstruction, internal hernias, enteric strictures, and bolus obstructions. Clinical features of different types of intestinal obstruction and specific causes like gallstones, bezoars, worms, adhesions, intussusception and volvulus are outlined.
Для всех популярных облачных провайдеров данных существуют сервисы, позволяющие анонимно загружать файлы в расшаренные пользователями хранилища. Примерами таких сервисов могут служить Dropittome, Balloon, Cloudwok, Sookasa. С учетом того, что конечные пользователи часто устанавливают клиенты для синхронизации с облаком, данный способ доставки зловредов на компьютер жертвы становится весьма действенным.
Метод машинного обучения для распознавания сгенерированных доменных именPositive Hack Days
Ведущий: Александр Колокольцев
Доклад посвящен использованию машинного обучения для выявления доменных имен, сгенерированных при помощи Domain Generation Algorithm. Для решения задачи предлагается N-грамм-анализ. Будет подробно описан анализатор доменных имен, при использовании которого была достигнута точность в 98,5%.
This document provides information about hernia surgery. It describes the different types of hernias including inguinal, incisional, femoral, umbilical, and epigastric hernias. It discusses the common presenting complaints of a hernia such as a lump or pain and precipitating factors. The document outlines the process of examining a patient for a hernia including inspection, palpation, and tests like the cough impulse and Zeimann's technique to determine the type of hernia. It also provides guidance on examining other related areas like abdominal muscles and performing a full systemic examination of the patient.
An inguinal hernia occurs when abdominal contents protrude through the abdominal wall in the groin region. There are two types - direct and indirect. Direct hernias develop through the posterior wall of the inguinal canal, while indirect hernias develop through the internal ring. Treatment involves surgical repair to remove the hernia sac and reinforce the abdominal wall defect to prevent recurrence. Other types of hernias include femoral, umbilical, epigastric, and incisional hernias which develop through weaknesses in the abdominal wall.
This document provides an overview of intestinal obstruction, including its classification, common causes, clinical features, investigations, and treatment options. Intestinal obstruction can result from mechanical blockage from structural abnormalities (dynamic obstruction) or paralysis without physical obstruction (ileus). Common causes of dynamic obstruction include adhesions, hernias, volvulus, and intussusception. Clinical features include colicky pain, vomiting, abdominal distention, and constipation. Investigations may include blood tests, abdominal x-rays, and CT scans. Treatment involves resuscitation, nasogastric decompression, IV fluids, and potentially surgery to resolve the obstruction. Complications can include bleeding, infection, leakage, and reoccurrence of obstruction
El documento describe los diferentes tipos de hernias, con un enfoque en la hernia inguinal. Explica la anatomía, fisiopatología, diagnóstico, clasificaciones, tratamientos quirúrgicos y complicaciones de las hernias inguinales. También cubre brevemente la hernia crural, describiendo su anatomía, síntomas, complicaciones y tratamiento quirúrgico.
Positive Hack Days. Скляров. Уязвимости систем контроля подлинности цифровых ...Positive Hack Days
В докладе рассматриваются практические аспекты надежности существующих систем обеспечения подлинности фотографических улик. Рассматривается уязвимость в системе проверки аутентичности фотографий Canon Original Data Security, предназначенной для подтверждения подлинности изображений, сделанных зеркальными цифровыми фотокамерами Canon.
This document discusses various causes and classifications of intestinal obstruction, including intraluminal causes like impaction or foreign bodies, intramural causes like strictures or malignancy, and extramural causes like bands, adhesions or hernias. It describes the pathophysiology of obstruction including proximal bowel dilation and changes in motility and absorption. It also covers specific types like strangulation, closed-loop obstruction, internal hernias, enteric strictures, and bolus obstructions. Clinical features of different types of intestinal obstruction and specific causes like gallstones, bezoars, worms, adhesions, intussusception and volvulus are outlined.
Для всех популярных облачных провайдеров данных существуют сервисы, позволяющие анонимно загружать файлы в расшаренные пользователями хранилища. Примерами таких сервисов могут служить Dropittome, Balloon, Cloudwok, Sookasa. С учетом того, что конечные пользователи часто устанавливают клиенты для синхронизации с облаком, данный способ доставки зловредов на компьютер жертвы становится весьма действенным.
Метод машинного обучения для распознавания сгенерированных доменных именPositive Hack Days
Ведущий: Александр Колокольцев
Доклад посвящен использованию машинного обучения для выявления доменных имен, сгенерированных при помощи Domain Generation Algorithm. Для решения задачи предлагается N-грамм-анализ. Будет подробно описан анализатор доменных имен, при использовании которого была достигнута точность в 98,5%.
This document provides information about hernia surgery. It describes the different types of hernias including inguinal, incisional, femoral, umbilical, and epigastric hernias. It discusses the common presenting complaints of a hernia such as a lump or pain and precipitating factors. The document outlines the process of examining a patient for a hernia including inspection, palpation, and tests like the cough impulse and Zeimann's technique to determine the type of hernia. It also provides guidance on examining other related areas like abdominal muscles and performing a full systemic examination of the patient.
An inguinal hernia occurs when abdominal contents protrude through the abdominal wall in the groin region. There are two types - direct and indirect. Direct hernias develop through the posterior wall of the inguinal canal, while indirect hernias develop through the internal ring. Treatment involves surgical repair to remove the hernia sac and reinforce the abdominal wall defect to prevent recurrence. Other types of hernias include femoral, umbilical, epigastric, and incisional hernias which develop through weaknesses in the abdominal wall.
This document provides an overview of intestinal obstruction, including its classification, common causes, clinical features, investigations, and treatment options. Intestinal obstruction can result from mechanical blockage from structural abnormalities (dynamic obstruction) or paralysis without physical obstruction (ileus). Common causes of dynamic obstruction include adhesions, hernias, volvulus, and intussusception. Clinical features include colicky pain, vomiting, abdominal distention, and constipation. Investigations may include blood tests, abdominal x-rays, and CT scans. Treatment involves resuscitation, nasogastric decompression, IV fluids, and potentially surgery to resolve the obstruction. Complications can include bleeding, infection, leakage, and reoccurrence of obstruction
El documento describe los diferentes tipos de hernias, con un enfoque en la hernia inguinal. Explica la anatomía, fisiopatología, diagnóstico, clasificaciones, tratamientos quirúrgicos y complicaciones de las hernias inguinales. También cubre brevemente la hernia crural, describiendo su anatomía, síntomas, complicaciones y tratamiento quirúrgico.
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...CODE BLUE
This document discusses the results of long-term scanning and analysis of Winnti 4.0 and ShadowPad malware command and control (C2) protocols. It finds that Winnti 4.0 C2s primarily use TLS, HTTPS, and HTTP, while ShadowPad variants primarily use TCP, HTTPS, and HTTP. Analysis of the protocols reveals encryption methods, packet structures, and server-side functionality. Over time, the number and distribution of active C2s changed, likely in response to research publications and incident response actions. The document advocates for anonymization techniques and merits and risks of future research publications.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2022/06/programming-vision-pipelines-on-amds-ai-engines-a-presentation-from-amd/
Kristof Denolf, Principal Engineer, and Bader Alam, Director of Software Engineering, both of AMD, present the “Programming Vision Pipelines on AMD’s AI Engines” tutorial at the May 2022 Embedded Vision Summit.
AMD’s latest generation of Adaptive Compute Acceleration Platforms (ACAP), Versal AI Core and Versal AI Edge, include an array of powerful AI Engines alongside other computation components, such as programmable logic and ARM cores. This array of AI Engines has high computational capability to address the workloads of diverse applications, including automotive solutions.
This presentation introduces the properties and capabilities of these AI Engines for image, video and vision processing. Denolf and Alam begin with a top-down look at how video data makes its way to the AI Engines. Then they delve into a detailed discussion of the compute properties of the VLIW vector architecture of the AI Engines and illustrate how it efficiently executes vision processing kernels. Next, they introduce the Vitis Vision Library and give an overview of its data movement and kernel processing capabilities. They conclude by showing how AMD’s Vitis tools support building a vision pipeline and analyzing its performance.
DEF CON 23 - Rodringo Almeida - embedded system design from electronics Felipe Prado
This document provides an overview of concepts related to developing an embedded system kernel. It discusses developing a custom kernel versus using alternatives like FreeRTOS. It covers key kernel design decisions like process and I/O management. The document outlines the approach taken in this course, which is to develop a microkernel that is non-preemptive, cooperative, and does not include memory management. It also discusses concepts important for kernel development like function pointers, structures, circular buffers, and temporal conditions.
The document provides an introduction to DirectX and its components for 3D graphics programming. DirectX includes Direct3D for 3D rendering, DXGI for managing graphics resources, and HLSL for writing shaders. Direct3D uses a graphics pipeline with stages like vertex shading, rasterization, and pixel shading. Programmers interface with Direct3D through COM objects and interfaces.
JS Fest 2018. Володимир Шиманський. Запуск двіжка JS на мікроконтролеріJSFestUA
JavaScript - усюди! Тільки нещодавно запускав один і той самий JS код в Browser, Node.js, та React Native, як уже новий виклик - Embedded системи… Спокійно, JS справиться! На цій доповіді ви дізнаєтесь, які двіжки JS працюють в дуже обмежених середовищах, хто і як це використовує в продакшні та наскільки весело розробляти софт під всякі залізяки на JS.
[Спойлер] Якщо все вийде, спробуємо відтворити мелодію Mario на звичайному Bluetooth-брелку для ключів :)
The document provides diagnostic information from a system error on an application. Key details include:
- The error number is 10100 and the message is "Invalid switch: 2".
- System information includes the version, OS, and invalid command line argument.
- Diagnostic information is provided for various system components including memory allocation, disk drives, file systems, and PCI devices/interrupts.
The document discusses developing an embedded system kernel project. It explains that a kernel manages processes, memory, and communication between hardware and processes. While developing one's own kernel allows for full control, it is also very time intensive. Alternatives like FreeRTOS are discussed. The document also covers the differences between monolithic and micro kernels. It states that this project will use a non-preemptive, cooperative microkernel that schedules processes and does not include memory management.
Presentation by Iain Richardson and Maja Bystrom at the Embedded Systems Convention, Boston, 2010. The problems with video codecs; MPEG's Reconfigurable Video Coding; fully configurable video coding.
OV7670 Camera interfacing-with-arduino-microcontrollerSomnath Sharma
This document discusses interfacing an OV7670 camera module with an Arduino microcontroller. It begins with an introduction and objectives. It then describes the hardware used, including specifications of the camera module and Arduino. It provides circuit diagrams and explains the serial camera control bus protocol. The document outlines the program flow, including initializing the camera, receiving image bytes in rows, and converting the pixel data to an image file. It also discusses handling multiple scans and converting images to PDF. Finally, it concludes the camera can provide a low-cost, configurable image acquisition solution for applications like security and time-lapse photography.
The system report summarizes the hardware and software configuration of a Windows XP system. It includes details about the processor, memory, graphics card, sound devices, and installed drivers. A Nvidia GeForce 9400 GT graphics card and Realtek audio devices are listed. The system has 2 GB of RAM and is running Windows XP SP3 in Spanish.
This document contains system information for a Windows 7 computer with an Intel Core i7 processor and ATI Radeon HD 5800 Series graphics card, including operating system details, hardware specifications, display configuration, and driver information.
CONFidence 2017: Hacking embedded with OpenWrt (Vladimir Mitiouchev)PROIDEA
More and more poorly designed devices are connected to Internet, often without basic security options such as changing password, or firmware updates [sic!]. Many of them are based on well-known SoC, such as Atheros AR9331, Ralink RT5350, or other popular chipsets. Have you ever wondered how to regain control over hardware *you* own? Prepare soldering iron and serial console and learn how to physically hack into embedded device. Tamper with bootloader to modify system. Extract and analyze firmware on various architectures. Eventually, flash device with customized OpenWrt build and modify hardware (eg. add sensors, buttons, LCD screen or USB port).
This talk will take us back to 2006 to understand the world of software development back then, and to realize how much it has changed, for the best or, in some cases unfortunately, for the worst.
A description of the next-gen rendering technique called Triangle Visibility Buffer. It offers up to 10x - 20x geometry compared to Deferred rendering and much higher resolution. Generally it aligns better with memory access patterns in modern GPUs compared to Deferred Lighting like Clustered Deferred Lighting etc.
Проведение криминалистической экспертизы и анализа руткит-программ на примере...Alex Matrosov
This document summarizes a presentation on analyzing the Win32/Olmarik(TDL4) rootkit through forensic examination and debugging techniques. It discusses the evolution of rootkits from x86 to x64 systems and techniques used by TDL rootkits to bypass security protections like driver signature enforcement. It also demonstrates tools like TdlFsReader that were developed to analyze the hidden TDL file system and decrypt encrypted files.
Positive Hack Days. Матросов. Мастер-класс: Проведение криминалистической экс...Positive Hack Days
В рамках мастер-класса будет рассмотрены следующие вопросы:
методы внедрения и работы руткита TDL4;
инструментарий и методы сбора данных для проведения криминалистической экспертизы зараженной машины;
отладка буткит-составляющей на ранней стадии загрузки системы с использованием эмулятора Bochs;
анализ зараженной машины при помощи WinDbg;
удаление руткита из системы после сбора всех необходимых данных.
This document discusses debugging multiple exceptions that occur across threads. It presents code with two threads that each cause an exception by dereferencing a null pointer. The crash report shows that thread 2 crashed with an EXC_BAD_ACCESS exception. GDB output shows examining the crashed thread 2 and disassembling the code where it crashed.
This document discusses troubleshooting mobile phone call issues on an Android device. It begins by describing the normal phone call process and current issues with only hearing noise. The author then takes steps to confirm the hardware design, quickly set up the phone call subsystem, and address new challenges. Key actions include analyzing the PCM format, adding capacitors, and testing that changes resolve click noise when using a new modem.
This system report summarizes the hardware and software configuration of a Windows 7 PC. It includes details about the processor, RAM, graphics card, display, audio, and other devices. The PC has an AMD FX-4100 Quad-Core processor, 8GB of RAM, an AMD Radeon HD 7800 Series graphics card, and additional components for sound, network connectivity, and storage.
This episode demonstrates GDB debugging and core dump analysis on Android platform. Discusses Android Linux processes and threads. Shows Invalid Pointer and Spiking Thread memory analysis patterns in the context of ARM assembly language.
Инструмент ChangelogBuilder для автоматической подготовки Release NotesPositive Hack Days
1. Основные понятия и определения: продукт, пакет, связи между ними.
2. Как узнать, какие изменения произошли в продукте?
3. Проблемы changelog и release note.
4. Решение: инструмент ChangelogBuilder для автоматической подготовки Release Notes
Как мы собираем проекты в выделенном окружении в Windows DockerPositive Hack Days
1. Обзор Windows Docker (кратко)
2. Как мы построили систему билда приложений в Docker (Visual Studio\Mongo\Posgresql\etc)
3. Примеры Dockerfile (выложенные на github)
4. Отличия процессов DockerWindows от DockerLinux (Долгий билд, баги, remote-регистр.)
More Related Content
Similar to Positive Hack Days. Sklyarov. Vulnerabilities in the Systems of Authenticity Control of Digital Photographic Images
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...CODE BLUE
This document discusses the results of long-term scanning and analysis of Winnti 4.0 and ShadowPad malware command and control (C2) protocols. It finds that Winnti 4.0 C2s primarily use TLS, HTTPS, and HTTP, while ShadowPad variants primarily use TCP, HTTPS, and HTTP. Analysis of the protocols reveals encryption methods, packet structures, and server-side functionality. Over time, the number and distribution of active C2s changed, likely in response to research publications and incident response actions. The document advocates for anonymization techniques and merits and risks of future research publications.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2022/06/programming-vision-pipelines-on-amds-ai-engines-a-presentation-from-amd/
Kristof Denolf, Principal Engineer, and Bader Alam, Director of Software Engineering, both of AMD, present the “Programming Vision Pipelines on AMD’s AI Engines” tutorial at the May 2022 Embedded Vision Summit.
AMD’s latest generation of Adaptive Compute Acceleration Platforms (ACAP), Versal AI Core and Versal AI Edge, include an array of powerful AI Engines alongside other computation components, such as programmable logic and ARM cores. This array of AI Engines has high computational capability to address the workloads of diverse applications, including automotive solutions.
This presentation introduces the properties and capabilities of these AI Engines for image, video and vision processing. Denolf and Alam begin with a top-down look at how video data makes its way to the AI Engines. Then they delve into a detailed discussion of the compute properties of the VLIW vector architecture of the AI Engines and illustrate how it efficiently executes vision processing kernels. Next, they introduce the Vitis Vision Library and give an overview of its data movement and kernel processing capabilities. They conclude by showing how AMD’s Vitis tools support building a vision pipeline and analyzing its performance.
DEF CON 23 - Rodringo Almeida - embedded system design from electronics Felipe Prado
This document provides an overview of concepts related to developing an embedded system kernel. It discusses developing a custom kernel versus using alternatives like FreeRTOS. It covers key kernel design decisions like process and I/O management. The document outlines the approach taken in this course, which is to develop a microkernel that is non-preemptive, cooperative, and does not include memory management. It also discusses concepts important for kernel development like function pointers, structures, circular buffers, and temporal conditions.
The document provides an introduction to DirectX and its components for 3D graphics programming. DirectX includes Direct3D for 3D rendering, DXGI for managing graphics resources, and HLSL for writing shaders. Direct3D uses a graphics pipeline with stages like vertex shading, rasterization, and pixel shading. Programmers interface with Direct3D through COM objects and interfaces.
JS Fest 2018. Володимир Шиманський. Запуск двіжка JS на мікроконтролеріJSFestUA
JavaScript - усюди! Тільки нещодавно запускав один і той самий JS код в Browser, Node.js, та React Native, як уже новий виклик - Embedded системи… Спокійно, JS справиться! На цій доповіді ви дізнаєтесь, які двіжки JS працюють в дуже обмежених середовищах, хто і як це використовує в продакшні та наскільки весело розробляти софт під всякі залізяки на JS.
[Спойлер] Якщо все вийде, спробуємо відтворити мелодію Mario на звичайному Bluetooth-брелку для ключів :)
The document provides diagnostic information from a system error on an application. Key details include:
- The error number is 10100 and the message is "Invalid switch: 2".
- System information includes the version, OS, and invalid command line argument.
- Diagnostic information is provided for various system components including memory allocation, disk drives, file systems, and PCI devices/interrupts.
The document discusses developing an embedded system kernel project. It explains that a kernel manages processes, memory, and communication between hardware and processes. While developing one's own kernel allows for full control, it is also very time intensive. Alternatives like FreeRTOS are discussed. The document also covers the differences between monolithic and micro kernels. It states that this project will use a non-preemptive, cooperative microkernel that schedules processes and does not include memory management.
Presentation by Iain Richardson and Maja Bystrom at the Embedded Systems Convention, Boston, 2010. The problems with video codecs; MPEG's Reconfigurable Video Coding; fully configurable video coding.
OV7670 Camera interfacing-with-arduino-microcontrollerSomnath Sharma
This document discusses interfacing an OV7670 camera module with an Arduino microcontroller. It begins with an introduction and objectives. It then describes the hardware used, including specifications of the camera module and Arduino. It provides circuit diagrams and explains the serial camera control bus protocol. The document outlines the program flow, including initializing the camera, receiving image bytes in rows, and converting the pixel data to an image file. It also discusses handling multiple scans and converting images to PDF. Finally, it concludes the camera can provide a low-cost, configurable image acquisition solution for applications like security and time-lapse photography.
The system report summarizes the hardware and software configuration of a Windows XP system. It includes details about the processor, memory, graphics card, sound devices, and installed drivers. A Nvidia GeForce 9400 GT graphics card and Realtek audio devices are listed. The system has 2 GB of RAM and is running Windows XP SP3 in Spanish.
This document contains system information for a Windows 7 computer with an Intel Core i7 processor and ATI Radeon HD 5800 Series graphics card, including operating system details, hardware specifications, display configuration, and driver information.
CONFidence 2017: Hacking embedded with OpenWrt (Vladimir Mitiouchev)PROIDEA
More and more poorly designed devices are connected to Internet, often without basic security options such as changing password, or firmware updates [sic!]. Many of them are based on well-known SoC, such as Atheros AR9331, Ralink RT5350, or other popular chipsets. Have you ever wondered how to regain control over hardware *you* own? Prepare soldering iron and serial console and learn how to physically hack into embedded device. Tamper with bootloader to modify system. Extract and analyze firmware on various architectures. Eventually, flash device with customized OpenWrt build and modify hardware (eg. add sensors, buttons, LCD screen or USB port).
This talk will take us back to 2006 to understand the world of software development back then, and to realize how much it has changed, for the best or, in some cases unfortunately, for the worst.
A description of the next-gen rendering technique called Triangle Visibility Buffer. It offers up to 10x - 20x geometry compared to Deferred rendering and much higher resolution. Generally it aligns better with memory access patterns in modern GPUs compared to Deferred Lighting like Clustered Deferred Lighting etc.
Проведение криминалистической экспертизы и анализа руткит-программ на примере...Alex Matrosov
This document summarizes a presentation on analyzing the Win32/Olmarik(TDL4) rootkit through forensic examination and debugging techniques. It discusses the evolution of rootkits from x86 to x64 systems and techniques used by TDL rootkits to bypass security protections like driver signature enforcement. It also demonstrates tools like TdlFsReader that were developed to analyze the hidden TDL file system and decrypt encrypted files.
Positive Hack Days. Матросов. Мастер-класс: Проведение криминалистической экс...Positive Hack Days
В рамках мастер-класса будет рассмотрены следующие вопросы:
методы внедрения и работы руткита TDL4;
инструментарий и методы сбора данных для проведения криминалистической экспертизы зараженной машины;
отладка буткит-составляющей на ранней стадии загрузки системы с использованием эмулятора Bochs;
анализ зараженной машины при помощи WinDbg;
удаление руткита из системы после сбора всех необходимых данных.
This document discusses debugging multiple exceptions that occur across threads. It presents code with two threads that each cause an exception by dereferencing a null pointer. The crash report shows that thread 2 crashed with an EXC_BAD_ACCESS exception. GDB output shows examining the crashed thread 2 and disassembling the code where it crashed.
This document discusses troubleshooting mobile phone call issues on an Android device. It begins by describing the normal phone call process and current issues with only hearing noise. The author then takes steps to confirm the hardware design, quickly set up the phone call subsystem, and address new challenges. Key actions include analyzing the PCM format, adding capacitors, and testing that changes resolve click noise when using a new modem.
This system report summarizes the hardware and software configuration of a Windows 7 PC. It includes details about the processor, RAM, graphics card, display, audio, and other devices. The PC has an AMD FX-4100 Quad-Core processor, 8GB of RAM, an AMD Radeon HD 7800 Series graphics card, and additional components for sound, network connectivity, and storage.
This episode demonstrates GDB debugging and core dump analysis on Android platform. Discusses Android Linux processes and threads. Shows Invalid Pointer and Spiking Thread memory analysis patterns in the context of ARM assembly language.
Similar to Positive Hack Days. Sklyarov. Vulnerabilities in the Systems of Authenticity Control of Digital Photographic Images (20)
Инструмент ChangelogBuilder для автоматической подготовки Release NotesPositive Hack Days
1. Основные понятия и определения: продукт, пакет, связи между ними.
2. Как узнать, какие изменения произошли в продукте?
3. Проблемы changelog и release note.
4. Решение: инструмент ChangelogBuilder для автоматической подготовки Release Notes
Как мы собираем проекты в выделенном окружении в Windows DockerPositive Hack Days
1. Обзор Windows Docker (кратко)
2. Как мы построили систему билда приложений в Docker (Visual Studio\Mongo\Posgresql\etc)
3. Примеры Dockerfile (выложенные на github)
4. Отличия процессов DockerWindows от DockerLinux (Долгий билд, баги, remote-регистр.)
Типовая сборка и деплой продуктов в Positive TechnologiesPositive Hack Days
1. Проблемы в построении CI процессов в компании
2. Структура типовой сборки
3. Пример реализации типовой сборки
4. Плюсы и минусы от использования типовой сборки
1. Что такое BI. Зачем он нужен.
2. Что такое Qlik View / Sense
3. Способ интеграции. Как это работает.
4. Метрики, KPI, планирование ресурсов команд, ретроспектива релиза продукта, тренды.
5. Подключение внешних источников данных (Excel, БД СКУД, переговорные комнаты).
Approof — статический анализатор кода для проверки веб-приложений на наличие уязвимых компонентов. В своей работе анализатор основывается на правилах, хранящих сигнатуры искомых компонентов. В докладе рассматривается базовая структура правила для Approof и процесс автоматизации его создания.
Задумывались ли вы когда-нибудь о том, как устроены современные механизмы защиты приложений? Какая теория стоит за реализацией WAF и SAST? Каковы пределы их возможностей? Насколько их можно подвинуть за счет более широкого взгляда на проблематику безопасности приложений?
На мастер-классе будут рассмотрены основные методы и алгоритмы двух основополагающих технологий защиты приложений — межсетевого экранирования уровня приложения и статического анализа кода. На примерах конкретных инструментов с открытым исходным кодом, разработанных специально для этого мастер-класса, будут рассмотрены проблемы, возникающие на пути у разработчиков средств защиты приложений, и возможные пути их решения, а также даны ответы на все упомянутые вопросы.
От экспериментального программирования к промышленному: путь длиной в 10 летPositive Hack Days
Разработка наукоемкого программного обеспечения отличается тем, что нет ни четкой постановки задачи, ни понимания, что получится в результате. Однако даже этом надо программировать то, что надо, и как надо. Докладчик расскажет о том, как ее команда успешно разработала и вывела в промышленную эксплуатацию несколько наукоемких продуктов, пройдя непростой путь от эксперимента, результатом которого был прототип, до промышленных версий, которые успешно продаются как на российском, так и на зарубежном рынках. Этот путь был насыщен сложностями и качественными управленческими решениями, которыми поделится докладчик
Уязвимое Android-приложение: N проверенных способов наступить на граблиPositive Hack Days
Немногие разработчики закладывают безопасность в архитектуру приложения на этапе проектирования. Часто для этого нет ни денег, ни времени. Еще меньше — понимания моделей нарушителя и моделей угроз. Защита приложения выходит на передний план, когда уязвимости начинают стоить денег. К этому времени приложение уже работает и внесение существенных изменений в код становится нелегкой задачей.
К счастью, разработчики тоже люди, и в коде разных приложений можно встретить однотипные недостатки. В докладе речь пойдет об опасных ошибках, которые чаще всего допускают разработчики Android-приложений. Затрагиваются особенности ОС Android, приводятся примеры реальных приложений и уязвимостей в них, описываются способы устранения.
Разработка любого софта так или иначе базируется на требованиях. Полный перечень составляют бизнес-цели приложения, различные ограничения и ожидания по качеству (их еще называют NFR). Требования к безопасности ПО относятся к последнему пункту. В ходе доклада будут рассматриваться появление этих требований, управление ими и выбор наиболее важных.
Отдельно будут освещены принципы построения архитектуры приложения, при наличии таких требований и без, и продемонстрировано, как современные (и хорошо известные) подходы к проектированию приложения помогают лучше строить архитектуру приложения для минимизации ландшафта угроз.
Доклад посвящен разработке корректного программного обеспечения с применением одного из видов статического анализа кода. Будут освещены вопросы применения подобных методов, их слабые стороны и ограничения, а также рассмотрены результаты, которые они могут дать. На конкретных примерах будет продемонстрировано, как выглядят разработка спецификаций для кода на языке Си и доказательство соответствия кода спецификациям.
The document discusses preventing attacks in ASP.NET Core. It provides an overview of topics like preventing open redirect attacks, cross-site request forgery (CSRF), cross-site scripting (XSS) attacks, using and architecture of cookies, data protection, session management, and content security policy (CSP). The speaker is an independent developer and consultant who will discuss built-in mechanisms in ASP.NET Core for addressing these security issues.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Things to Consider When Choosing a Website Developer for your Website | FODUUFODUU
Choosing the right website developer is crucial for your business. This article covers essential factors to consider, including experience, portfolio, technical skills, communication, pricing, reputation & reviews, cost and budget considerations and post-launch support. Make an informed decision to ensure your website meets your business goals.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Positive Hack Days. Sklyarov. Vulnerabilities in the Systems of Authenticity Control of Digital Photographic Images
1. Vulnerabilities in the Systems of Authenticity Control of Digital Photographic Images Positive Hack Days Dmitry Sklyarov
2. What is Original Decision Data It is too easy to edit photos… ODD is added to the image file by camera and expected to provide information to detect any image alteration Modified!
3.
4.
5.
6.
7.
8.
9. ODDv2: Guessing unknown s Field before regions definition Represents signature for the whole image file? Field inside region definition Hold signature of the particular region data? Signature length is always 20 bytes Too short for asymmetric , but matches SHA-1 length Symmetric SHA-1 based authentication? May be HMAC-SHA-1?
10.
11.
12.
13.
14.
15.
16.
17.
18. ODDv3: General structure ODDv3 Header Information Image information Area descriptors Padded with zeros Marker and Version Image file signature ODD Info signature
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29. Model name ODD version V2 key Announced EOS-1D 2001-09-25 EOS-1Ds probably 1 1 2002-09-24 EOS 10D 2003-02-27 EOS 300D 2003-08-20 EOS- 1D Mark II 2 2 2004-01-29 EOS 20D 2 3 2004-08-19 EOS- 1Ds Mark II 2 4 2004-09-21 EOS 350D 2005-02-17 EOS 5D 2 5 2005-08-22 EOS- 1D Mark II N 2 6 2005-08-22 EOS 30D 2 7 2006-02-21 EOS 400D 2006-08-24
30. Model name KeyID seen vHash Announced EOS-1D Mark III 1 2007-02-22 EOS-1Ds Mark III 1 2007-08-20 EOS 40D 1 1 2007-08-20 EOS 450D 2 1 2008-01-24 EOS 1000D 2 1 2008-06-10 EOS 50D 1 2 2008-08-26 EOS 5D Mark II 1 2 2008-09-17 EOS 500D 3 2 2009-03-25 EOS 7D 4 2 2009-09-01 EOS-1D Mark IV 2 2009-10-20 EOS 550D 4 2 2010-02-08 EOS 60D 4 3 2010-08-26
31.
32.
33.
34.
35.
36.
37.
38.
39.
40. Thank you! ;) Dmitry Sklyarov Уязвимости систем контроля подлинности цифровых фотографических изображений
Editor's Notes
Good morning, ladies and gentlemen! My name is Dmitry Sklyarov. I’m employed as Information Security analyst at ElcomSoft, security company based in Moscow, Russia. I’d like to present a speech on a subject “Forging Canon Original Decision Data”.
Nowadays editing digital images is a common task, and sometime it is very difficult to make sure that image was not altered. In 2002 Canon introduced O riginal I mage E valuation S ystem – combination of EOS 1Ds camera and Data Verification Kit able to detect any image alteration.
In December 2005 I’ve got my first Digital Single-Lens Reflex camera – Canon EOS 350D. Since that I like Canon’s cameras very much. Nearly at the same time I read about Canon’s Origin Image Verification system for the fist time and discovered that my camera does not support such features :(
After couple of years I’ve upgraded to EOS 30D, and finally got the chance to check how secure Original Verification System is. Most of Canon’s DSLR has Custom Function which enables ODD in the menu.
I just made several images in close conditions without ODD and with adding ODD, and compared them. There were only two differences: additional 160 bytes at the end of file and offset of the added data within one of the EXIF tags.
Analyzing of the ODD data shows that some fields are always the same (highlighted in green), some other are easy-to-understand (blue and yellow), but all other data looks like random binary values. Variable fields that were easy to understand are holds offsets and length of some regions within the image file.
That regions are covers whole file except values for image rotation, ODD offset and ODD itself.
C-like notation of ODD structure is displayed, and it still has unknowns in areas, always 20 bytes in length.
Trying to guess what that unknown areas could mean leads to the idea that signature for each region and the whole file is stored in ODD, SHA-1 is involved in calculations and most probably Hash-based Message Authentication Code is used.
The only way to verify guesses was looking into camera’s firmware. In general, analyzing firmware is not as simple as reverse-engineering, for example, Windows application. No file to analyze. No public documentation. No way to run debugger… Fortunately, Canon’s cameras are popular and got attention of smart peoples many years ago. There is great project named CHDK exist, and using information provided by people involved in it you could make a fast start. Another great tool that makes code analysis much easier is, of cause, IDA Pro.
Making deep research of dumped firmware confirmed all guesses. Early unknown areas contain HMAC-SHA-1 values.
Data for each region is hashed with MD5. Resulting value repeated 4 times and processed with HMAC to calculate value stored in ODD for each region.
Value for the whole file is calculated in similar way, but MD5 values for all 4 regions are processed with HMAC.
But calculating HMAC requires not only data but also a secret key. In Canon EOS 30D that key is created dynamically from obfuscated values stored in camera’s memory. Last 32 bits of HMAC key are equal to camera’s BodyID – kind of unique 32-bits camera’s ID.
Additional analysis shows that all camera of the same models uses identical HMAC key (with exception of BodyID bits), but each model uses its own key. The main problem for the Origin Image Verification security it that HMAC key at some moment is resides in camera’s RAM in de-obfuscated form and could be extracted. At least I was able to do so for several camera models ;) Another way to get the key – find obfuscated values in Flash ROM and de-obfuscate them manually. And, finally, knowing the key for the particular model means possibility to calculate proper ODD values for arbitrary image data using the same way as camera does.
After finishing with EOS 30D I’ve asked one of my friends who owns EOS 40D to make several shots with ODD turned on and detected that Canon has changed ODD format. ODD is now more flexible, implements version 3, stored within EXIF, occupies more space and holds more values.
Now image file is treated as a set of areas, depending on type of the data inside it. Main image and thumbnail image data, orientation data, user comment and some check marks areas are processed independently as contiguous regions. Area #2 covers all other bytes of the image file except ODD data and padding bytes between Thumbnail and Main image that added to align main image on 32-bit boundary. Area #2 constructed as a set of contiguous regions.
ODDv3 for JPG files occupies 512 (0x200) bytes, some of them are unused, Generally, ODDv3 consists of header and information parts. Header holds ODD marker, version and calculated signature values for the whole image and ODD Information part. Information part itself contains some data related to image in whole and area descriptors. Unused space in Information part is filled with zeros.
Here is C-like description of the ODDv3 header. As you can see it can hold signatures of variable length, but in all real files signature length is always 20 bytes.
Each area has sequential 1-based ID, plus Salt and Signature values associated with it. Length of Salt is always 4 bytes, and length of Signature is always 20 bytes. Area description defines list of contiguous ranges that completely covers area’s data. Number of ranges within area affects structure size, so it is not a constant.
And, finally, here is general structure of ODDv3 information part. HMAC for the whole information part is calculated (to check its integrity) and stored in ODD header. Again, Salt value of variable length is present, and its length is always 4 in real-life images. File length is stored in ODD too. Interesting member is vHash – version of hash algorithm used to process ranges data before passing resulting hash value to HMAC. As you remember, in ODDv2 it was MD5.
In early models with ODDv3 hash is MD5 too, but after calculating 16-byte value some Pseudo-Random generator seeded by Salt was used to extend 16 bytes into 32. Such version of hashing algorithm has number 1. In August 2008 Canon releases new camera EOS 50D based on new operating system – DryOS. And since that data is hashed with SHA-256 and Salt is not used at all. Such hashing versions has number 2 and 3 (both uses the same algorithm).
Salt values in ODDv3 are obtained from weak (invertible) PRNG. PRNG is seeded with Shutter Counter value. So, actual Shutter Counter value (which neither written to EXIF nor available through camera’s menu system) could be recovered from ODD.
There are three more members of the Information structure that are requires to pay attention too. They are KeyID, BoardID and KeySalt. Actually, KeyID and BoardID are never involved in any calculation inside the camera. But there is some unknown (for me) function exists that converts that pair of 32-bit values into 256-bit key KBoardID. That value is stored in camera’s memory in obfuscated form and, again, could be extracted from there. De-obfuscated value of KBoardID is merged with KeySalt and BodyID, processed with 256-bit hash function which based on SHA-1 and HMAC key is produced as a result. So, in ODDv3 HMAC key is different for every camera (due to KeyID, Board ID and BodyID which are never the same all together). And even shots from one camera are signed by different HMAC keys due to KeySalt.
Value of KeyID is always within the range from 1 to 9. Originality Verification tool does not checks any relation between camera model, KBoardID, KeyID and BoardID. So, knowing one triplet of values is enough to sign images for any ODDv3 camera.
Now several words about verification devices. First version of verifier supports only one camera model – EOS-1Ds
Next version of verification device supports all ODDv2 enabled models
The most recent device supports all cameras and also could be used to encrypt and decrypt images in top Canon’s cameras. After ElcomSoft spent moneys for this tiny piece of hardware I finally got the chance to verify if my finding correct or not. And I was not surprised when all images signed by me successfully passed originality verification.
Here is summary of Canon’s DSLR cameras developed before year 2007. There are three models marked by green. I’ve got a chance to get such cameras in my hands and extracted keys from them. Models marked by red still uses keys which are unknown for me. All other cameras does not supports ODD. V2 Key number is internal model number that used during verification of image originality.
These cameras appears on the market in year 2007 or later. All of them supports ODDv3. For models marked in green BoardID, KeyID and KBoardID were extracted from dump. For models marked in yellow KeyID was obtained from ODD-enables images. For 1D cameras no images with ODD available but hashing algorithm version could be derived from firmware update. KeyID is not stored in firmware. So, it is possible that cameras of the same model would have different KeyID.