1. archive.org41 min

    #HITB2016AMS - D2T1 - Forging a Wireless Time Signal to Attack NTP Servers - Y. Zheng & H. Shan : Hack In The Box Security Conference

    Radio timing service , such as GPS , BPC , JJY , WWVB , DCF77 , WWVH have been widely used as a basic time source for industry or individual systems . These signals are used by millions of people to synchronize consumer electronic products like wall clocks , clock radios , and wristwatches . NTP sever also use these signals to get a precise time . In this presentation we show how these signals can be forg . . .

  2. archive.org53 min

    #HITB2016AMS D2T2 - Breaking Naive ESSID/WPA2 Key Generation Algorithms - Peter 'Blasty' Geissler : Hack In The Box Security Conference

    It’s 2016 . WiFi is more widespread than ever . Every average household has one or several WiFi access points , often provided by their Internet Service Provider . Sadly , after many years . . many of these router/modem/access points ship with a default set of WiFi credentials (that is unique to the specific box) that can be recovered by clever attackers . In this talk we’ll walk you through how th . . .

  3. archive.org49 min

    #HITB2016AMS D1T1 - TeLeScope: Peering Into The Depths Of TLS Traffic In Real Time - Radu Caragea : Hack In The Box Security Conference

    Analyzing network traffic is a task that comes up often in the context of malware analysis: both before infection , in malware delivery from sites and after infection , in the communication with the C&C servers . Having this information is vital when doing dynamic analysis . However , the current solutions to this issue involve either adding a root CA (certificate authority) to the machine , splitting t . . .

  4. archive.org21 min

    #HITB2016AMS CommSec Track D2 - Facebook Presents Capture The Flag - Paul Marinescu : Hack In The Box Security Conference

    CTF contests are designed to serve as an educational exercise to give participants experience in securing machines , as well as conducting and reacting to the sort of attacks found in the real world . Reverse-engineering , network sniffing , protocol analysis , system administration , programming , and cryptanalysis are all skills which are generally refined and tested through CTFs . Facebook has recently . . .

  5. archive.org60 min

    #HITB2016AMS D2T1 - In Plain Sight: The Perfect Exfiltration Technique - Itzik Kotler and Amit Klein : Hack In The Box Security Conference

    In this session , we will reveal and demonstrate perfect exfiltration via indirect covert channels (i . e . the communicating parties don’t directly exchange network packets) . This is a family of techniques to exfiltrate data (low throughput) from an enterprise in a manner indistinguishable from genuine traffic . Using HTTP and exploiting a byproduct of how some websites choose to cache their page . . .

  6. archive.org33 min

    #HITB2016AMS CommSec Track D1 - Pentesting Chatops - Melanie Rieback : Hack In The Box Security Conference

    ChatOps , a concept originating from Github , is chatroom-driven DevOps for distributed teams , using chatbots (like Hubot) to execute custom scripts and plugins . We have applied the concept of ChatOps to the penetration testing workflow , and found that it fits outstandingly – for everything from routine scanning to spearphishing to pentest gamification . This talk discusses the tools that we use (R . . .

  7. archive.org50 min

    #HITB2016AMS CommSec Track D1 - Exploiting GLIBC: Hacking Everything - Gal De Leon and Nadav Markus : Hack In The Box Security Conference

    On Feb 16th , Google published CVE-2015-7547: glibc getaddrinfo vulnerability that affects all SW compiled with GLIBC for many versions . As this vulnerability is in the code used to parse network addresses it is possible , in theory , to remotely exploit it . The Google team published a crashing POC but chose not to disclose an exploit . Our team has been studying the vulnerability and developed a t . . .

  8. #HITB2016AMS D2T2 - Go Speed Tracer Guided Fuzzing - Richard Johnson : Hack In The Box Security Conference

    The past few years have seen a leap in fuzzing technology . The original paradigm established a decade ago resulted in two widely deployed approaches to fuzzing: sample based mutation and model based generation . Thanks to ever-increasing computational performance and better engineering , newer guided fuzzing approaches have proven to be supremely effective with a low cost of deployment . This talk wi . . .

  9. archive.org54 min

    #HITB2016AMS D1T2 - Adaptive Android Kernel Live Patching - Tim Xia and Yulong Zhang : Hack In The Box Security Conference

    We have witnessed many kernel vulnerabilities of Android devices . They have already been utilized by underground businesses in malware and APTs . Unfortunately , some of these vulnerabilities remain unfixed for years , partly due to the time-consuming patching and verification procedures , or probably because the vendors care more about innovating new products than securing existing devices . As such , . . .

  10. archive.org52 min

    #HITB2016AMS D1T2 - Kernel Exploit Hunting And Mitigation - Broderick Aquilino and Wayne Low : Hack In The Box Security Conference

    In the era of cyberwarfare , it becomes a norm to see cyber criminals use multi-level attacks to penetrate a multi-layered protected network infrastructure . We often see APT attackers manipulate 0-day or N-day Windows kernel vulnerabilities in order to guarantee a successful full system compromise . It would be a surprise if we do not see Windows kernel exploit involved in such targeted attacks . . . .

  11. archive.org53 min

    #HITB2016AMS KEYNOTE 2 - The Future Has Arrived And It's Effin' Hilarious - Adam Laurie : Hack In The Box Security Conference

    Everything must be connected right now ! Go ! Do it ! It’ll be great… . Then I’ll be able to order my Iced Half Caff Ristretto Venti 4-Pump Sugar Free Cinnamon Dolce Soy Skinny Latte so I can pick it up on the way to work as I cycle past the coffeee shop without breaking a sweat… Marvelous ! Wait , did I say “I’ll be able to order”? Sorry , what I meant was: “My bicycle will be able . . .

  12. archive.org50 min

    #HITB2016AMS D1T1 - Using The Observer Effect And Cyber Feng Shui - Jacob Torrey : Hack In The Box Security Conference

    The observer effect (commonly confused with Heisenberg’s Uncertainty principle) tells us that in particle physics , the act of observing an event changes its behavior . This is true in computer systems as well , and can be used by an attacker to determine if they are being monitored or introspected upon from on high . This talk will begin by examining architectural “tells” that can be utilize . . .