Peach is a smart and widely used fuzzer, which has lots of advantages like cross-platform, aware of file format, extend easily and so on. But when AFL fuzzer has appeared, peach seems to be out of date, since it doesn't have coverage feedback and run slowly. Due to peach is a flexible fuzzer framework and AFL is not, I extended peach with AFL advantages, making it more smarter.Just like AFL, I use LLVM Pass to add coverage feedback, with that I can see which mutation is interesting viz. explores new paths. The resultant effect is that the modified version is more effective.
Toni de la Fuente - Automate or die! How to survive to an attack in the Cloud...RootedCON
Â
Los procedimientos relacionados con Respuesta a Incidentes y AnĂĄlisis Forense son diferentes en la nube respecto a cuando se realizan en entornos tradicionales, locales. Veremos las diferencias entre el anĂĄlisis forense digital tradicional y el relacionado con sistemas en la nube de AWS, Azure o Google Compute Platform. Cuando se trata de la nube y nos movemos en un entorno totalmente virtual nos enfrentamos a desafĂos que son diferentes al mundo tradicional. Lo que antes era hardware, ahora es software. Con los proveedores de infraestructura en la nube trabajamos con APIs, creamos, eliminamos o modificamos cualquier recurso con una llamada a su API. Disponemos de balanceadores, servidores, routers, firewalls, bases de datos, WAFs, sistemas de cifrado y muchos recursos mĂĄs a sin abrir una caja y sin tocar un cable. A golpe de comando. Es lo que conocemos como Infraestructura como cĂłdigo. Si lo puedes programar, lo puedes automatizar. ÂżComo podemos aprovecharnos de ello desde el punto de vista de la respuesta a incidentes, anĂĄlisis forense o incluso hardening automatizado?
How vulnerable are your systems after the first line of defense? Do attackers get a stronger foothold after each compromise? How valuable is the data your systems can leak?
âDeath Starâ security describes a system that relies entirely on an outermost security layer and fails catastrophically when breached. As services multiply, they shouldnât all run in a single, trusted virtual private cloud. Sharing secrets doesnât scale either, as systems multiply and partners integrate with your product and users.
David Strauss explores security methods strong enough to cross the public Internet, flexible enough to allow new services without altering existing systems, and robust enough to avoid single points of failure. David covers the basics of public key infrastructure (PKI), explaining how PKI uniquely supports security and high availability, and demonstrates how to deploy mutual authentication and encryption across a heterogeneous infrastructure, use capability-based security, and use federated identity to provide a uniform frontend experience while still avoiding monolithic backends. David also explores JSON Web Tokens as a solution to session woes, distributing user data and trust without sharing backend persistence.
A good written summary of the key talking points: https://www.infoq.com/news/2016/04/oreilysacon-day-one
"A rootkits writerâs guide to defense" - Michal PurzynskiPROIDEA
Â
Michal will take you on a journey all the way to 90âs and back, sharing the Mozilla detection framework - a systematic way to detect and hunt down threat actors. Why did we spend hours digging through some old Phrack issues? How does a blue team's member approach writing rootkits? What is better - a fail negative or a false positive? I will share answers to these questions plus a lot of alerting and evil-doing code.
Toni de la Fuente - Automate or die! How to survive to an attack in the Cloud...RootedCON
Â
Los procedimientos relacionados con Respuesta a Incidentes y AnĂĄlisis Forense son diferentes en la nube respecto a cuando se realizan en entornos tradicionales, locales. Veremos las diferencias entre el anĂĄlisis forense digital tradicional y el relacionado con sistemas en la nube de AWS, Azure o Google Compute Platform. Cuando se trata de la nube y nos movemos en un entorno totalmente virtual nos enfrentamos a desafĂos que son diferentes al mundo tradicional. Lo que antes era hardware, ahora es software. Con los proveedores de infraestructura en la nube trabajamos con APIs, creamos, eliminamos o modificamos cualquier recurso con una llamada a su API. Disponemos de balanceadores, servidores, routers, firewalls, bases de datos, WAFs, sistemas de cifrado y muchos recursos mĂĄs a sin abrir una caja y sin tocar un cable. A golpe de comando. Es lo que conocemos como Infraestructura como cĂłdigo. Si lo puedes programar, lo puedes automatizar. ÂżComo podemos aprovecharnos de ello desde el punto de vista de la respuesta a incidentes, anĂĄlisis forense o incluso hardening automatizado?
How vulnerable are your systems after the first line of defense? Do attackers get a stronger foothold after each compromise? How valuable is the data your systems can leak?
âDeath Starâ security describes a system that relies entirely on an outermost security layer and fails catastrophically when breached. As services multiply, they shouldnât all run in a single, trusted virtual private cloud. Sharing secrets doesnât scale either, as systems multiply and partners integrate with your product and users.
David Strauss explores security methods strong enough to cross the public Internet, flexible enough to allow new services without altering existing systems, and robust enough to avoid single points of failure. David covers the basics of public key infrastructure (PKI), explaining how PKI uniquely supports security and high availability, and demonstrates how to deploy mutual authentication and encryption across a heterogeneous infrastructure, use capability-based security, and use federated identity to provide a uniform frontend experience while still avoiding monolithic backends. David also explores JSON Web Tokens as a solution to session woes, distributing user data and trust without sharing backend persistence.
A good written summary of the key talking points: https://www.infoq.com/news/2016/04/oreilysacon-day-one
"A rootkits writerâs guide to defense" - Michal PurzynskiPROIDEA
Â
Michal will take you on a journey all the way to 90âs and back, sharing the Mozilla detection framework - a systematic way to detect and hunt down threat actors. Why did we spend hours digging through some old Phrack issues? How does a blue team's member approach writing rootkits? What is better - a fail negative or a false positive? I will share answers to these questions plus a lot of alerting and evil-doing code.
Cryptography 101 for Java Developers - JavaZone2019Michel Schudel
Â
So you're logging in to your favorite crypto currency exchange over https using a username and password, executing some transactions, and you're not at all surprised that, security wise, everything's hunky dory...
Ever wondered about the amount of cryptography begin used here? No? Let's dive into the key concepts of cryptography then, and see how the JDK supports this using the standard cryptography API's: JCA (Java Cryptography Architecture) and JCE (Java Cryptography Extension)! We'll be exploring message digests, encryption, and digital signatures, and see how they'are used in password checks, https, and block chain technology.
After this session, you'll have a better understanding of basic cryptography, its applications, and how to use the cryptography APIs in Java.
Cryptography 101 for Java Developers - Devoxx 2019Michel Schudel
Â
So you're logging in to your favorite crypto currency exchange over https using a username and password, executing some transactions, and you're not at all surprised that, security wise, everything's hunky dory...
The amount of cryptography to make all this happen is staggering. In order to appreciate and understand what goes on under the hood, as a developer, it's really important to dive into the key concepts of cryptography.
In this session, we discover what cryptography actually is, and will use the JCA (Java Cryptography API) en JCE (Java Cryptography Extensions) in the JDK to explain and demo key concepts such as: - Message digests (hashing) - Encryption, both symmetric and asymmetric - Digital signatures, both symmetric and asymmetric.
Furthermore, we'll show how these concepts find their way into a variety of practical applications such as: - https and certificates - salted password checking - block chain technology After this session, you'll have a better understanding of basic cryptography, its applications, and how to use the cryptography APIs in Java.
Nick Anderson, Facebook
Just as Microsoft grows to embrace the open source community more and more, we must use open source tools to help us grow as a community. In this talk we'll explore the various advanced detection techniques we employ at Facebook using osquery for Windows. Specifically, we will examine instrumenting Windows Event Log data, inspecting detailed attack patterns on processes such as path hijacking, and mapping operating system state to detect deviations of a healthy system - all at Facebook scale. Building on these detection capabilities, we will then consider different response features currently available in osquery and how one can extend these capabilities to suit the needs of their own enterprise. By striving to make these advanced detection capabilities more approachable we hope to raise the bar of defenses employed by companies everywhere and encourage the security community to take a more proactive role in developing detection features used to catch advanced exploitation.
In the last few years, a number of new security features have become available to web developers (e.g. Content Security Policy, Strict Transport Security) and a few more are coming up (e.g. Referrer Policy, Subresource Integrity).
As a browser vendor and a member of the W3C WebAppSec working group, Mozilla is busy extending the web platform to provide the tools and features that developers and users need in 2016. In addition to that, the non-profit behind Firefox is experimenting with new ways to protect its users, building on Google's Safe Browsing technology to defend users against tracking.
This talk will introduce developers to the security features of the web platform they can use today and show end-users how they can harden their Firefox browser.
https://www.linuxfestnorthwest.org/2016/sessions/security-and-privacy-web-2016
Cryptography 101 for_java_developers, Fall 2019Michel Schudel
Â
So youâre logging in to your favorite crypto currency exchange over https using a username and password, executing some transactions, and youâre not at all surprised that, security wise, everythingâs hunky doryâŚ
The amount of cryptography to make all this happen is staggering. In order to appreciate and understand what goes on under the hood, as a developer, itâs really important to dive into the key concepts of cryptography.
In this session, we discover what cryptography actually is, and will use the JCA (Java Cryptography API) en JCE (Java Cryptography Extensions) in the JDK to explain and demo key concepts such as:
â Message digests (hashing)
â Encryption, both symmetric and asymmetric
â Digital signatures, both symmetric and asymmetric
Furthermore, weâll show how these concepts find their way into a variety of practical applications such as:
â https and certificates
â salted password checking
â block chain technology
After this session, youâll have a better understanding of basic cryptography, its applications, and how to use the cryptography APIs in Java.
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Rob Fuller
Â
This talk (hopefully) provides some new pentesters tools and tricks. Basically a continuation of last yearâs Dirty Little Secrets they didnât teach you in Pentest class. Topics include; OSINT and APIs, certificate stealing, F**king with Incident Response Teams, 10 ways to psexec, and more. Yes, mostly using metasploit.
2018 ecuador deconstruyendo y evolucionando la seguridad en servicios restCĂŠsar HernĂĄndez
Â
La curva de aprendizaje para la seguridad es severa e implacable. Las especificaciones prometen una flexibilidad infinita y habitualmente dan nuevos nombres a los conceptos antiguos. Esta sesiĂłn profundiza el estado actual y evoluciĂłn que la seguridad en arquitecturas basadas en servicios REST han requerido con conceptos competitivos como OAuth 2.0 en el mundo mobile y HTTP signatures utilizado por Amazon en API's B2B. Finalmente, se analiza un nuevo borrador de Internet lanzado este aĂąo que los combina a ambos en el sistema perfecto de dos factores que podrĂa proporcionar una consolidaciĂłn para los escenarios de REST mobile y de negocios.
"Revenge of The Script Kiddies: Current Day Uses of Automated Scripts by Top ...PROIDEA
Â
Banking Trojans have been part of the financial cybercrime landscape for over a decade, causing losses measured in billions of dollars. On the flip side, the constant evolution of defenses against this type of malware has forced Trojan operators to adjust to security controls designed to keep them out. As a result, many Trojan operators have either disappeared or considerably narrowed their activity scope, but more interestingly, are using novel techniques to achieve their goals. In this talk, we will present three top malware operators active in the wild and their use of automated scripts to tackle their challenges: The notorious Gozi (ISFB) malware used to run its own executable files. Nowadays, it avoids storing malicious payloads on disk and instead, writes a Powershell script to the Windows registry and executes it using a special regex-based run-key. Ramnit, a dated foe that focuses on UK banks, encrypts its payload using a Windows API function with a device-unique key. In every system reboot, it decrypts the payload in-memory and runs it with a Visual Basic script that runs Powershell. This allows Ramnit to avoid running a detectable, executable file as it used to do in the past. BackSwap is a new banking Trojan that attacks financial institutions in Spain. Its dropper is a JavaScript Encoded (JSE) file. When decoded, the dropper results in a 30k lines-of-code script which downloads a binary sample from a remote Command-and-Control server. Together with our audience, we will walk through the research process and share our findings along with our (sometimes) quick-and-dirty solutions. We aim to enhance our participantsâ knowledge of todayâs bankers and help them get deeper into current-day scripting-related techniques cybercriminals use.
End-to-End Analysis of a Domain Generating Algorithm Malware FamilyCrowdStrike
Â
Select malware families have used Domain Generating Algorithms (DGAs) over the past few years in an effort to evade traditional domain blacklists, allow for fast-flux domain registration and usage, and evade analystsâ abilities to predict attackersâ control servers. While novel work has been done by both private industry and academia with respect to detecting DGA-related network traffic, this presentation demonstrates end-to-end analysis of a DGA malware family, from binary deobfuscation to DGA analysis, to sinkholing, to domain registrant research, to attribution of the malwareâs author and accomplices.
The malware family discussed in this presentation has thousands of active variants currently running on the Internet and has managed to stay off of the radar of all antivirus firms. Missed this presentation at Black Hat 2013? Take a look at the slides from Jason Geffner's session. This presentation brought to light how this malware is tied to an underground campaign that has been active for at least the past six years.
Powershella lubiÄ admini, programiĹci, a najbardziej hakerzy. BÄdÄ c natywnÄ powĹokÄ systemĂłw Windows nie rzuca siÄ w oczy, jednoczeĹnie dajÄ c ogromne moĹźliwoĹci ofensywne. Podczas prelekcji PaweĹ zaprezentuje zarĂłwno skuteczne one-linery jak i wielolinijkowe skrypty, ktĂłre mogÄ siaÄ spustoszenie w nieprzygotowanej organizacji. PojawiÄ siÄ ciekawe kanaĹy C2, malware napisany w caĹoĹci w Powershellu, wyszukiwanie i eksploitacja sĹabo skonfigurowanych serwerĂłw MSSQL etc.100% miÄsa.
Webinar: Securing your data - Mitigating the risks with MongoDBMongoDB
Â
In this webinar, we walked through examples of the general security threats to databases. And we looked at how you can mitigate them for MongoDB deployments.
Why isn't infosec working? Did you turn it off and back on again?Rob Fuller
Â
BruCon 2019 Keynote -=> My name is Rob Fuller, I've been around a bit, not as long as some but longer than others. From the US military to government contracting, consulting, large companies, tiny startups and silicon valley behemoths, from podcasting to television, I've had a storied and humbling career in infosec. Letâs get past complaining about blinky lights and users. Letâs talk about what actually works and what doesn't.
This is part 1 of fuzzing, an introduction to the subject. This presentation covers some of theory and thought process behind the subject, as well as an introduction to environment variable fuzzing and file format fuzzing.
This presentation is a part of the COP2272C college level course taught at the Florida Polytechnic University located in Lakeland Florida. The purpose of this course is to introduce students to the C++ language and the fundamentals of object orientated programming..
The course is one semester in length and meets for 2 hours twice a week. The Instructor is Dr. Jim Anderson.
Cryptography 101 for Java Developers - JavaZone2019Michel Schudel
Â
So you're logging in to your favorite crypto currency exchange over https using a username and password, executing some transactions, and you're not at all surprised that, security wise, everything's hunky dory...
Ever wondered about the amount of cryptography begin used here? No? Let's dive into the key concepts of cryptography then, and see how the JDK supports this using the standard cryptography API's: JCA (Java Cryptography Architecture) and JCE (Java Cryptography Extension)! We'll be exploring message digests, encryption, and digital signatures, and see how they'are used in password checks, https, and block chain technology.
After this session, you'll have a better understanding of basic cryptography, its applications, and how to use the cryptography APIs in Java.
Cryptography 101 for Java Developers - Devoxx 2019Michel Schudel
Â
So you're logging in to your favorite crypto currency exchange over https using a username and password, executing some transactions, and you're not at all surprised that, security wise, everything's hunky dory...
The amount of cryptography to make all this happen is staggering. In order to appreciate and understand what goes on under the hood, as a developer, it's really important to dive into the key concepts of cryptography.
In this session, we discover what cryptography actually is, and will use the JCA (Java Cryptography API) en JCE (Java Cryptography Extensions) in the JDK to explain and demo key concepts such as: - Message digests (hashing) - Encryption, both symmetric and asymmetric - Digital signatures, both symmetric and asymmetric.
Furthermore, we'll show how these concepts find their way into a variety of practical applications such as: - https and certificates - salted password checking - block chain technology After this session, you'll have a better understanding of basic cryptography, its applications, and how to use the cryptography APIs in Java.
Nick Anderson, Facebook
Just as Microsoft grows to embrace the open source community more and more, we must use open source tools to help us grow as a community. In this talk we'll explore the various advanced detection techniques we employ at Facebook using osquery for Windows. Specifically, we will examine instrumenting Windows Event Log data, inspecting detailed attack patterns on processes such as path hijacking, and mapping operating system state to detect deviations of a healthy system - all at Facebook scale. Building on these detection capabilities, we will then consider different response features currently available in osquery and how one can extend these capabilities to suit the needs of their own enterprise. By striving to make these advanced detection capabilities more approachable we hope to raise the bar of defenses employed by companies everywhere and encourage the security community to take a more proactive role in developing detection features used to catch advanced exploitation.
In the last few years, a number of new security features have become available to web developers (e.g. Content Security Policy, Strict Transport Security) and a few more are coming up (e.g. Referrer Policy, Subresource Integrity).
As a browser vendor and a member of the W3C WebAppSec working group, Mozilla is busy extending the web platform to provide the tools and features that developers and users need in 2016. In addition to that, the non-profit behind Firefox is experimenting with new ways to protect its users, building on Google's Safe Browsing technology to defend users against tracking.
This talk will introduce developers to the security features of the web platform they can use today and show end-users how they can harden their Firefox browser.
https://www.linuxfestnorthwest.org/2016/sessions/security-and-privacy-web-2016
Cryptography 101 for_java_developers, Fall 2019Michel Schudel
Â
So youâre logging in to your favorite crypto currency exchange over https using a username and password, executing some transactions, and youâre not at all surprised that, security wise, everythingâs hunky doryâŚ
The amount of cryptography to make all this happen is staggering. In order to appreciate and understand what goes on under the hood, as a developer, itâs really important to dive into the key concepts of cryptography.
In this session, we discover what cryptography actually is, and will use the JCA (Java Cryptography API) en JCE (Java Cryptography Extensions) in the JDK to explain and demo key concepts such as:
â Message digests (hashing)
â Encryption, both symmetric and asymmetric
â Digital signatures, both symmetric and asymmetric
Furthermore, weâll show how these concepts find their way into a variety of practical applications such as:
â https and certificates
â salted password checking
â block chain technology
After this session, youâll have a better understanding of basic cryptography, its applications, and how to use the cryptography APIs in Java.
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Rob Fuller
Â
This talk (hopefully) provides some new pentesters tools and tricks. Basically a continuation of last yearâs Dirty Little Secrets they didnât teach you in Pentest class. Topics include; OSINT and APIs, certificate stealing, F**king with Incident Response Teams, 10 ways to psexec, and more. Yes, mostly using metasploit.
2018 ecuador deconstruyendo y evolucionando la seguridad en servicios restCĂŠsar HernĂĄndez
Â
La curva de aprendizaje para la seguridad es severa e implacable. Las especificaciones prometen una flexibilidad infinita y habitualmente dan nuevos nombres a los conceptos antiguos. Esta sesiĂłn profundiza el estado actual y evoluciĂłn que la seguridad en arquitecturas basadas en servicios REST han requerido con conceptos competitivos como OAuth 2.0 en el mundo mobile y HTTP signatures utilizado por Amazon en API's B2B. Finalmente, se analiza un nuevo borrador de Internet lanzado este aĂąo que los combina a ambos en el sistema perfecto de dos factores que podrĂa proporcionar una consolidaciĂłn para los escenarios de REST mobile y de negocios.
"Revenge of The Script Kiddies: Current Day Uses of Automated Scripts by Top ...PROIDEA
Â
Banking Trojans have been part of the financial cybercrime landscape for over a decade, causing losses measured in billions of dollars. On the flip side, the constant evolution of defenses against this type of malware has forced Trojan operators to adjust to security controls designed to keep them out. As a result, many Trojan operators have either disappeared or considerably narrowed their activity scope, but more interestingly, are using novel techniques to achieve their goals. In this talk, we will present three top malware operators active in the wild and their use of automated scripts to tackle their challenges: The notorious Gozi (ISFB) malware used to run its own executable files. Nowadays, it avoids storing malicious payloads on disk and instead, writes a Powershell script to the Windows registry and executes it using a special regex-based run-key. Ramnit, a dated foe that focuses on UK banks, encrypts its payload using a Windows API function with a device-unique key. In every system reboot, it decrypts the payload in-memory and runs it with a Visual Basic script that runs Powershell. This allows Ramnit to avoid running a detectable, executable file as it used to do in the past. BackSwap is a new banking Trojan that attacks financial institutions in Spain. Its dropper is a JavaScript Encoded (JSE) file. When decoded, the dropper results in a 30k lines-of-code script which downloads a binary sample from a remote Command-and-Control server. Together with our audience, we will walk through the research process and share our findings along with our (sometimes) quick-and-dirty solutions. We aim to enhance our participantsâ knowledge of todayâs bankers and help them get deeper into current-day scripting-related techniques cybercriminals use.
End-to-End Analysis of a Domain Generating Algorithm Malware FamilyCrowdStrike
Â
Select malware families have used Domain Generating Algorithms (DGAs) over the past few years in an effort to evade traditional domain blacklists, allow for fast-flux domain registration and usage, and evade analystsâ abilities to predict attackersâ control servers. While novel work has been done by both private industry and academia with respect to detecting DGA-related network traffic, this presentation demonstrates end-to-end analysis of a DGA malware family, from binary deobfuscation to DGA analysis, to sinkholing, to domain registrant research, to attribution of the malwareâs author and accomplices.
The malware family discussed in this presentation has thousands of active variants currently running on the Internet and has managed to stay off of the radar of all antivirus firms. Missed this presentation at Black Hat 2013? Take a look at the slides from Jason Geffner's session. This presentation brought to light how this malware is tied to an underground campaign that has been active for at least the past six years.
Powershella lubiÄ admini, programiĹci, a najbardziej hakerzy. BÄdÄ c natywnÄ powĹokÄ systemĂłw Windows nie rzuca siÄ w oczy, jednoczeĹnie dajÄ c ogromne moĹźliwoĹci ofensywne. Podczas prelekcji PaweĹ zaprezentuje zarĂłwno skuteczne one-linery jak i wielolinijkowe skrypty, ktĂłre mogÄ siaÄ spustoszenie w nieprzygotowanej organizacji. PojawiÄ siÄ ciekawe kanaĹy C2, malware napisany w caĹoĹci w Powershellu, wyszukiwanie i eksploitacja sĹabo skonfigurowanych serwerĂłw MSSQL etc.100% miÄsa.
Webinar: Securing your data - Mitigating the risks with MongoDBMongoDB
Â
In this webinar, we walked through examples of the general security threats to databases. And we looked at how you can mitigate them for MongoDB deployments.
Why isn't infosec working? Did you turn it off and back on again?Rob Fuller
Â
BruCon 2019 Keynote -=> My name is Rob Fuller, I've been around a bit, not as long as some but longer than others. From the US military to government contracting, consulting, large companies, tiny startups and silicon valley behemoths, from podcasting to television, I've had a storied and humbling career in infosec. Letâs get past complaining about blinky lights and users. Letâs talk about what actually works and what doesn't.
This is part 1 of fuzzing, an introduction to the subject. This presentation covers some of theory and thought process behind the subject, as well as an introduction to environment variable fuzzing and file format fuzzing.
This presentation is a part of the COP2272C college level course taught at the Florida Polytechnic University located in Lakeland Florida. The purpose of this course is to introduce students to the C++ language and the fundamentals of object orientated programming..
The course is one semester in length and meets for 2 hours twice a week. The Instructor is Dr. Jim Anderson.
Leveraging Structured Data To Reduce Disk, IO & Network BandwidthPerforce
Â
Most of the data that is pulled out of an SCM like Perforce Helix is common across multiple workspaces. Leveraging this fact means only fetching the data once from the repository. By creating cheap copies or clones of this data on demand, it is possible to dramatically reduce the load on the network, disks and Perforce servers, while making near-instant workspaces available to users.
Corporate-informatica-training-in-mumbaiUnmesh Baile
Â
Vibrant Technologies is headquarted in Mumbai,India.We are the best Informatica training provider in Navi Mumbai who provides Live Projects to students.We provide Corporate Training also.We are Best Informatica classes in Mumbai according to our students and corporates
Corporate-informatica-training-in-mumbaiUnmesh Baile
Â
Vibrant Technologies is headquarted in Mumbai,India.We are the best Informatica training provider in Navi Mumbai who provides Live Projects to students.We provide Corporate Training also.We are Best Informatica classes in Mumbai according to our students and corporates
Solving real world data problems with JerakiaCraig Dunn
Â
This is the talk I gave at Config Management Camp 2016 in Ghent introducing Jerakia as a lookup tool that can be used in place of, or along side of hiera to solve some of the edge cases around data separation
Modern Reconnaissance Phase on APT - protection layerShakacon
Â
This presentation will show how APT actors are evolving and how the reconnaissance phase is changing to protect their valuable 0-day exploit or malware frameworks. This talk will mainly focus on the usage of Office documents and watering hole attacks designed to establish if the target is the intended one (we will mention campaigns against political or military organizations). The techniques and the obfuscation put in place by these actors will be described in detail (techniques based on Macro, JavaScript, PowerShell, Flash or Python). At the end of the presentation, we will show different mitigations to help attendees protect their users.
(ATS3-PLAT07) Pipeline Pilot Protocol Tips, Tricks, and ChallengesBIOVIA
Â
This session will dive deep into the bowels of the pro client. You will learn how to get the most out of recent enhancements such as design mode and protocol comparison. Protocol authors will also learn about best practices for the use of subprotocols, shortcuts, and search. Protocol developers will also get a better understanding of important but not widely known features in the pro client for deployment, collaboration, and validation. If you want to take your protocol development skills to the next level this is the session to attend!
Hacker Halted 2014 - RDP Fuzzing And Why the Microsoft Open Protocol Specific...EC-Council
Â
Over the past year, Tripwire Security Researchers Tyler Reguly and Andrew Swoboda have invested numerous hours into understanding the Microsoft Remote Desktop Protocol, specifically the pre-authentication portions of RDP. The Microsoft Open Protocol Specifications were heavily utilized for this projected and, while both researchers had used the specifications before, neither had fully realized their usefulness to security researchers. This session will be a discussion of The Microsoft Open Protocol Specification with RDP as the example. The culmination of the session will be the release of a new RDP Fuzzer and a discussion around the vulnerabilities it has already discovered.
Attendees can expect to walk away with a strong understanding of the Microsoft Open Protocol Specifications and how they can leverage them to build protocol implementations and fuzzers, as well as investigate inherent flaws and discover new vulnerabilities. Attendees will have a better understanding of the pre-authentication RDP connection sequence and exactly what data is exchanged and what an attacker can deduce from this communication. Finally, attendees will gain insight into new RDP vulnerabilities.
Dev Dives: Train smarter, not harder â active learning and UiPath LLMs for do...UiPathCommunity
Â
đĽ Speed, accuracy, and scaling â discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Miningâ˘:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing â with little to no training required
Get an exclusive demo of the new family of UiPath LLMs â GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
đ¨âđŤ Andras Palfi, Senior Product Manager, UiPath
đŠâđŤ Lenka Dulovicova, Product Program Manager, UiPath
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Â
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Â
Clients donât know what they donât know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clientsâ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Â
Are you looking to streamline your workflows and boost your projectsâ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, youâre in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part âEssentials of Automationâ series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Hereâs what youâll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
Weâll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Donât miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Â
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Â
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
DevOps and Testing slides at DASA ConnectKari Kakkonen
Â
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
Â
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Â
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But thereâs more:
In a second workflow supporting the same use case, youâll see:
Your campaign sent to target colleagues for approval
If the âApproveâ button is clicked, a Jira/Zendesk ticket is created for the marketing design team
Butâif the âRejectâ button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
Â
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
⢠The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
⢠Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
⢠Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
⢠Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
Â
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Yihan Lian & Zhibin Hu - Smarter Peach: Add Eyes to Peach Fuzzer [rooted2017]
1. Smarter Peach: Add Eyes to
Peach Fuzzer
Yihan Lian && Zhibin Hu/Qihoo 360 Gear Team
2. About us
Yihan Lian
⢠security researcher at Gear team of Qihoo 360
⢠focused on vulnerability discovery of Open-Source-Software.
⢠got more than a dozen CVE last year (e.g. qemu, ntp, ffmpeg)
⢠Fan of Xavi.
Zhibin Hu
⢠security researcher at Gear team of Qihoo 360
⢠last several years mainly focus on vulnerability discovery and analysis on windows, and receive msrc top 19 in 2014.
⢠recent two years interested in cloud security.
3. Agenda
⢠Motivation
⢠Peach fuzzer framework
⢠Strengths and weaknesses of Peach fuzzer
⢠Add eyes to Peach fuzzer
⢠Performance comparison and conclusion
⢠Demo
⢠Questions
4. motivation
⢠Stop re-inventing the wheel.
⢠Peach is mature, high stability and strong expandability etc.
⢠Coverage-feedback make traditional fuzzer more efficient.
⢠The mutate strategy of AFL is a little crude, not aware of file format.
5. Comparison of mainstream fuzzers
FOE Peach AFL
Coverage feedback â
Source Code Agnostic â â
Aware of file format â
aware of protocol format â
7. Peach fuzzer framework
⢠Original Peach core framework
Switch Iteration
Test Case output to target
Monitor
Log Fault
Normal
File Format
File Database
OriginalCase
Mutate
8. Strengths and weaknesses of Peach fuzzer
⢠Strengths
⢠Aware of file format, mutation strategies are more flexible
⢠Smarter when communicating with target
⢠Cross platform
⢠weaknesses
⢠Fat and complex
⢠No Coverage Feedback
9. aware of file format 1/5
⢠Basic elements: Number, String and Blob etc
⢠âxABxCDâ is hex Number
⢠âABCDâ is String
⢠âABxCDâ is Blob
⢠Describe relationships in the data: Relation, Fixup and Hint etc
⢠Relation: 32 is the numbers of bits of âx41x41x41x41â
⢠Fixup: 0x9B0D08F1 is CRC-32 of âx41x41x41x41â
⢠Hint: Assign a more exquisite mutate strategy
10. aware of file format 2/5
⢠If we need to fuzz a function like this:
if(data_head is "PNG"){
switch(data_tag){
case ("IHDR"):
if(check_CRC)
{
Parse(data);
core_code;
}
else
return;
case ...
}
}
11. aware of file format 3/5
⢠Example:
⢠PNG head
⢠Elem_0 = data[0-7] type = Blob mutator = Blob mutators
⢠Elem_1 = data[8 â 0xB] type = Number_hex mutator = hex mutators
⢠//Elem_1 is the length of Elem_3 ~ elem_9.
⢠Elem_2 = data[0xC â 0xF] type = String mutator = ASCII or UNICODE ⌠mutators
⢠Elem_3 = data[0x10 â 0x13] type = Number_hex
⢠Elem_4 = data[0x14 â 0x17] type = Number_hex
⢠Elem_5 = data[0x18] type = Number_hex
⢠âŚ...
⢠Elem_10 = data[0x1D - 0x21] type = Number_CRC_of_elem_2-9 fixup = calculate CRC
⢠//Elem_10 is the CRC of Elem_2 ~ Elem_9.
13. aware of file format 5/5
⢠The mutated file still triggers core code.
14. Smarter when communicating with target 1/3
⢠Most of fuzzers send mutated-data to target application,
but can not receive valuable data from it.
⢠They are hard to fuzz servers which need to communicate
client.
15. Smarter when communicating with target 2/3
⢠Action: Send commands through Publisher. Read and write data from target.
⢠Publisher: I/O interfaces. it could be a file or a traffic data.
17. Cross platform
⢠Peach supports all major Operating-Systems.
⢠Windows
⢠Install Microsoft.NET v4 Runtime
⢠Install Debugging Tools for Windows
⢠Unzip Peach binary distribution to a working folder
⢠OS X
⢠Install latest Mono packages
⢠Install Crash Wrangler (download)
⢠Unzip Peach binary distribution to a working folder
⢠Linux
⢠Install latest Mono packages
⢠Ubuntu/Debian: mono-complete package
⢠SUSE: See download instructions
⢠Unzip Peach binary distribution to a working folder
⢠Remote fuzz
18. weaknesses
⢠Fat and complex
⢠Needs to parse the seed file once in every fuzz-iteration.
⢠Need to store too many data models and actions.
⢠No Coverage Feedback
⢠Peach belongs to Black-Box-Fuzzer.
⢠Cannot distinguish which mutated file is more valuable.
21. Problems
⢠How to detect code coverage
⢠How to return coverage info better
⢠How to store valuable files
⢠How to reproduce valuable files
⢠How to select a valuable file for next fuzz circle
22. How to detect code coverage 1/3
⢠Use LLVM Pass to insert codes in Basic Block
⢠Source code: IDA output:
23. How to detect code coverage 2/3
⢠IDA after inserting codes
⢠llcov_pcov_block_call is inserted into the Basic-Block of target program.
24. How to detect code coverage 3/3
⢠llvm_pcov_block_call:
llvm_pcov_block_call function is used to mark
whether this Basic-Block was run before,
and message to Peach the amount of
New-Basic-Block in this fuzz iteration.
25. How to return coverage info better
⢠We need to insert codes in a lot of basic-blocks. In order to be more efficiency, we
pass info between llvm_proc_block_call and Peach through shared memory.
26. How to store valuable files 1/3
⢠We cannot store valuable files directly, since the valuable files does not match the
File-Format in most cases, and this could raise a Peach exception.
⢠Just like this:
[*] Test 'Default' finished.
Error, failed to crack â**datapngtest.png" into "PNGTest":
Block 'PNGTest.chunk' has length of 1744830496 bits
but buffer only has 168 bits left.
27. How to store valuable files 2/3
⢠I choose to store the Fuzz status.
28. How to store valuable files 3/3
⢠What is Fuzz status
⢠Name of seed file â file used to be mutated.
⢠Random status â some numbers used to generate a random number.
⢠Action name â action used to generate this I-File.
⢠Mutator name â mutation strategy name used before.
⢠Etc.
29. How to reproduce valuable files 1/2
⢠On every switch-teration, Peach will store lots of information about each seed file to a Original-
Data-Model object. All of the mutated data is mutated on this object.
30. How to reproduce valuable files 2/2
⢠What we should to do is modify the original-Data-Model before this iteration
beginning.
File Format
File Database
File choice and parse
31. How to select a valuable file for next fuzz circle 1/2
⢠There will be many valuable files after fuzzing a period of time.
⢠Valuable files info:
fileNameIs0::***bin/data/mov/test_1.mov
33
lastMutatorList
lastMutatorRun_1.Initial.Action....
fileNameIs1::***/bin/data/mov/test_1.mov
32
lastMutatorList
lastMutatorRun_1.Initial.Action....
lastMutatorList
lastMutatorRun_1.Initial.Action....
fileNameIs2::***bin/data/mov/test_2.mov
...
32. How to select a valuable file for next fuzz circle 2/2
⢠If a valuable file gets more New_Block_Counts, it will get more weight. And if the mutated files
mutated from it get New_Block_Counts else, the weight of it will increase at the same time.
Whereas: the weight will decrease. This strategy decrease or increase the weight in linear.
34. Performance comparison and conclusion
⢠After fuzzing FFMPEG with mutating MOV-file 24 hours by Peach-original, Peach-cov and AFL , the
difference between the amount of triggered source code related with MOV-file is very clear.
⢠For the AFL case, it will trigger other code which is not relevant with MOV-file, so we only calculate relevant part.
0
5
10
15
20
25
30
35
40
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
triggeredcodepercentage
hours
original
have_weight
afl
35. Performance comparison and conclusion
⢠Preponderance:
⢠Is more efficient than original Peach fuzzer
⢠Is more efficient than AFL when comparing the depth of triggered source code.
⢠Future work:
⢠Strategy of valuable-file chosen
⢠use Markov chain like AFL-FAST
⢠add weight on mutators
⢠Performance improvement
⢠use fork-server like AFL
⢠Automatic learn the format
⢠use machine learning like: https://arxiv.org/pdf/1701.07232.pdf