2024年亞洲黑帽大會(Black Hat ASIA)嘉賓演講PPT合集(共32套打包)

2024年亞洲黑帽大會(Black Hat ASIA)嘉賓演講PPT合集(共32套打包)

更新時間:2025-03-03 報告數量:32份

毒蘋果行動:追蹤信用卡信息竊取至支付欺詐.pdf   毒蘋果行動:追蹤信用卡信息竊取至支付欺詐.pdf
攻擊 Android 生態系統中的調試模塊.pdf   攻擊 Android 生態系統中的調試模塊.pdf
從 BYOVD 到 0-day:揭露網絡招聘騙局中的高級漏洞利用.pdf   從 BYOVD 到 0-day:揭露網絡招聘騙局中的高級漏洞利用.pdf
跨緩存游戲:以更有效的方式贏得勝利.pdf   跨緩存游戲:以更有效的方式贏得勝利.pdf
總線故障:新型總線故障攻擊以破壞嵌入式系統中的可信執行環境.pdf   總線故障:新型總線故障攻擊以破壞嵌入式系統中的可信執行環境.pdf
Hack@DAC 的故事:組織全球最大硬件黑客競賽的經驗.pdf   Hack@DAC 的故事:組織全球最大硬件黑客競賽的經驗.pdf
URB 王者之劍:新型 VMware 全平臺虛擬機逃逸.pdf   URB 王者之劍:新型 VMware 全平臺虛擬機逃逸.pdf
遠程車輛控制的關鍵:自動駕駛域控制器.pdf   遠程車輛控制的關鍵:自動駕駛域控制器.pdf
揭露語音釣魚團伙:深入調查與曝光..pdf   揭露語音釣魚團伙:深入調查與曝光..pdf
LinkDoor:Android Netlink 內核模塊中的隱藏攻擊面.pdf   LinkDoor:Android Netlink 內核模塊中的隱藏攻擊面.pdf
突破 Azure 服務中的托管身份壁壘.pdf   突破 Azure 服務中的托管身份壁壘.pdf
如何讓 Hugging Face 擁抱蠕蟲:發現并利用預訓練大模型中心中的不安全 Pickle.loads..pdf   如何讓 Hugging Face 擁抱蠕蟲:發現并利用預訓練大模型中心中的不安全 Pickle.loads..pdf
Debug7:利用固件修改攻擊遠程調試西門子 S7 PLC.pdf   Debug7:利用固件修改攻擊遠程調試西門子 S7 PLC.pdf
Asia-24-Zhou-PrivacyDetective.pdf   Asia-24-Zhou-PrivacyDetective.pdf
Asia-24-Beery-BadRandomness.pdf   Asia-24-Beery-BadRandomness.pdf
Asia-24-Wood-Confused-Learning.pdf   Asia-24-Wood-Confused-Learning.pdf
Asia-24-Liu-The-Hole-in-Sandbox.pdf   Asia-24-Liu-The-Hole-in-Sandbox.pdf
Asia-24-Fitzl-Wojciech-Unlimited-ways-to-bypass-your-macOS-privacy-mechanisms.pdf   Asia-24-Fitzl-Wojciech-Unlimited-ways-to-bypass-your-macOS-privacy-mechanisms.pdf
Asia-24-VictorV-Unveiling-the-Cracks-in-Virtualization-Mastering-the-Host-System.pdf   Asia-24-VictorV-Unveiling-the-Cracks-in-Virtualization-Mastering-the-Host-System.pdf
Asia-24-Stott-The-Fault-in-Our-Metrics.pdf   Asia-24-Stott-The-Fault-in-Our-Metrics.pdf
Asia-24-Bernstein-How-to-Get-the-Most-Out-of-the-Python.pdf   Asia-24-Bernstein-How-to-Get-the-Most-Out-of-the-Python.pdf
Asia-24-Ye-One-Flip-Is-All.pdf   Asia-24-Ye-One-Flip-Is-All.pdf
Asia-24-Shi-A-Glimpse-Into-The-Protocol.pdf   Asia-24-Shi-A-Glimpse-Into-The-Protocol.pdf
Asia-24-Chudo-Bypassing-Entra-ID-Conditional-Access-Like-APT.pdf   Asia-24-Chudo-Bypassing-Entra-ID-Conditional-Access-Like-APT.pdf
Asia-24-Bohannon-CloudConsoleCartographer.pdf   Asia-24-Bohannon-CloudConsoleCartographer.pdf
Asia-24-Chen-Chinese-APT.pdf   Asia-24-Chen-Chinese-APT.pdf
Asia-24-WeiMinCheng-systemui-as-evilpip-the-hijacking-attacks-on-modern-mobile-devices.pdf   Asia-24-WeiMinCheng-systemui-as-evilpip-the-hijacking-attacks-on-modern-mobile-devices.pdf
Asia-24-Pinto-What-The-TrustZone-M-Doesnt-See.pdf   Asia-24-Pinto-What-The-TrustZone-M-Doesnt-See.pdf
Asia-24-Yair-magicdot-a-hackers-magic-show-of-disappearing-dots-and-spaces.pdf   Asia-24-Yair-magicdot-a-hackers-magic-show-of-disappearing-dots-and-spaces.pdf
bh-asia-2024-llm4shell.pdf   bh-asia-2024-llm4shell.pdf
Asia-24_Bar-EDREraseDataRemotelyReloaded.pdf   Asia-24_Bar-EDREraseDataRemotelyReloaded.pdf
Asia-24-Ding-CertifiedDCOM-The-Privilege-Escalation-Journey-to-Domain-Admin.pdf   Asia-24-Ding-CertifiedDCOM-The-Privilege-Escalation-Journey-to-Domain-Admin.pdf

報告合集目錄

報告預覽

  • 全部
    • 2024年亞洲黑帽大會(Black Hat ASIA)嘉賓演講PPT合集
      • 毒蘋果行動:追蹤信用卡信息竊取至支付欺詐.pdf
      • 攻擊 Android 生態系統中的調試模塊.pdf
      • 從 BYOVD 到 0-day:揭露網絡招聘騙局中的高級漏洞利用.pdf
      • 跨緩存游戲:以更有效的方式贏得勝利.pdf
      • 總線故障:新型總線故障攻擊以破壞嵌入式系統中的可信執行環境.pdf
      • Hack@DAC 的故事:組織全球最大硬件黑客競賽的經驗.pdf
      • URB 王者之劍:新型 VMware 全平臺虛擬機逃逸.pdf
      • 遠程車輛控制的關鍵:自動駕駛域控制器.pdf
      • 揭露語音釣魚團伙:深入調查與曝光..pdf
      • LinkDoor:Android Netlink 內核模塊中的隱藏攻擊面.pdf
      • 突破 Azure 服務中的托管身份壁壘.pdf
      • 如何讓 Hugging Face 擁抱蠕蟲:發現并利用預訓練大模型中心中的不安全 Pickle.loads..pdf
      • Debug7:利用固件修改攻擊遠程調試西門子 S7 PLC.pdf
      • Asia-24-Zhou-PrivacyDetective.pdf
      • Asia-24-Beery-BadRandomness.pdf
      • Asia-24-Wood-Confused-Learning.pdf
      • Asia-24-Liu-The-Hole-in-Sandbox.pdf
      • Asia-24-Fitzl-Wojciech-Unlimited-ways-to-bypass-your-macOS-privacy-mechanisms.pdf
      • Asia-24-VictorV-Unveiling-the-Cracks-in-Virtualization-Mastering-the-Host-System.pdf
      • Asia-24-Stott-The-Fault-in-Our-Metrics.pdf
      • Asia-24-Bernstein-How-to-Get-the-Most-Out-of-the-Python.pdf
      • Asia-24-Ye-One-Flip-Is-All.pdf
      • Asia-24-Shi-A-Glimpse-Into-The-Protocol.pdf
      • Asia-24-Chudo-Bypassing-Entra-ID-Conditional-Access-Like-APT.pdf
      • Asia-24-Bohannon-CloudConsoleCartographer.pdf
      • Asia-24-Chen-Chinese-APT.pdf
      • Asia-24-WeiMinCheng-systemui-as-evilpip-the-hijacking-attacks-on-modern-mobile-devices.pdf
      • Asia-24-Pinto-What-The-TrustZone-M-Doesnt-See.pdf
      • Asia-24-Yair-magicdot-a-hackers-magic-show-of-disappearing-dots-and-spaces.pdf
      • bh-asia-2024-llm4shell.pdf
      • Asia-24_Bar-EDREraseDataRemotelyReloaded.pdf
      • Asia-24-Ding-CertifiedDCOM-The-Privilege-Escalation-Journey-to-Domain-Admin.pdf
請點擊導航文件預覽
資源包簡介:

#BHASIA BlackHatEventsCertifiedDCOMThePrivilegeEscalationJourneytoDomainAdminwithDCOMTianze Ding(D1iv3)Tencent Security Xuanwu Lab#BHASIA BlackHatEventsWhoamiTianze Ding(D1iv3)Senior Security Researcher,Tencent Security Xuanwu Lab Focusing on Active Directory Security/Cloud Security/Web Security 2022 MSRC Most Valuable Researchers Black Hat/DEFCON/HITB Speaker#BHASIA BlackHatEventsAgenda COM/DCOM Basics Previous Research COM Attack Surface from Local to Remote CertifiedDCOM:Privilege Escalation EDR=Erase Data RemotelyTomer BarShmuel CohenThis talk is SafeBreachs 15th talk at Black Hat20 years experience in security researchMain focus in APT and vulnerability researchPresented at many global security conferencesSuch as:Black Hat USA 2020,2023,DEFCON 28-312Tomer BarVP of Security Research SafeBreach6 years experience in cybersecurityMain focus in vulnerability researchFormer malware researcher specializedIn APT groups3Shmuel CohenSecurity Researcher SafeBreachLABS4Research Goal and appro#BHASIA BlackHatEventsLLM4Shell:Discovering and Exploiting RCE Vulnerabilities in Real-World LLM-Integrated Frameworks and AppsSpeakers:Tong Liu,Yuekang LiContributors:Zizhuang Deng,Guozhu Meng,Kai Chen#BHASIA BlackHatEventsWhoami-Tong Liu First year PhD student from UCAS IIE CTF player Nu1L&Straw Hat AI+Security#BHASIA BlackHatEventsWhoami-Yuekang Li Lecturer(assistant professor)University of New South Wales Software testing+Security#BHASIA BlackHatEventsContributorsZizhuang DengPhD IIE UCASecurity Research Team Lead at SafeBreach6+years in security researchLinux,embedded and some Android research3 years Windows researchCreator of Aikido Wiper,DoubleDriveOr YairAgendaWindows Known Issue IntroductionResearch GoalsPost-Exploitation TechniquesVulnerabilitiesCVEs+FixesTakeawaysGitHub+Q&AWindows BackwardsCompatibilityMore than 1.4 billion active devicesMy first encounter with“MagicMicrosofts DocumentationDo not end a file or directory name with a space or a period.Although the und#BHASIA BlackHatEventsWhat the TrustZone-M Doesnt See,theMCU Does Grieve OverLessons Learned from Assessing a Microcontroller TEECristiano Rodrigues|Sandro Pinto,PhD(Centro ALGORITMI/LASI,Universidade do Minho)#BHASIA BlackHatEventsWhat the TrustZone-M Doesnt See,theMCU Does Grieve OverLessons Learned from Assessing a Microcontroller TEECristiano Rodrigues|Sandro Pinto,PhD(Centro ALGORITMI/LASI,Universidade do Minho)AGENDAIntroductionBackground and Motivation0102A Bumpy but Revealing JourneyWeak#BHASIA BlackHatEventsS SystemUIystemUI As As EvilPiPEvilPiPWeiMin Cheng()The Hijacking Attacks on Modern Mobile Device#BHASIA BlackHatEventsWhoAreWeWhoAreWeWeiMin ChengQI-ANXINGithub:MG1937Twitter:MGAldys4Yue LiuQI-ANXINGithub:lieanuMobile&AOSPBinary Researcher#BHASIA BlackHatEventsAgendaAgenda What is Activity Hijack Attack(AHA)Restrictions and Policies released by Google Bypass Security Policies Video Demo for Fullchain BAL Restriction Runtime State Leak Strictly LMKD#BHASIA BlackHatEvent#BHASIA BlackHatEventsChinese APT:A Master of Exploiting Edge DevicesCharles LiGreg Chen#BHASIA BlackHatEventsAgendanExploit Target ChangednCase Study of Weaponized Edge Device nMalware implanted in Edge DevicenMitigation&Response#BHASIA BlackHatEventsExploit Target Changed#BHASIA BlackHatEventsGood old days of spear phishing emails#BHASIA BlackHatEventsDocument exploitation were good exploit targets for spear phishing attack.Good old days of spear phishing emailsCVE-2011-0611CVE-2008-5353CVASIA 2024Cloud Console CartographerTapping Into Mapping Slogging Thru LoggingIntroductionCloud Logs for DefendersPROBLEM:Noisy Console LogsSOLUTION:Mapping for ClarityTool Demo+ReleaseANDI AHMETIASSOCIATE THREAT RESEARCHERSecEagleAnd1andi-ahmetiKosovoPermiso-io-tools/CloudGrapplerDANIEL BOHANNONPRINCIPAL THREAT RESEARCHERdanielhbohannondanielhbohannondanielbohannon/Invoke-Obfuscation/Invoke-CradleCrafter/Invoke-DOSfuscation/Revoke-ObfuscationUSA(5 yrs)(2 yrs)Role of Logs in Threat Hunting&IR#BHASIA BlackHatEventsBypassing Bypassing EntraEntra ID Conditional Access Like APTID Conditional Access Like APTA Deep Dive Into Device Authentication Mechanisms for Building Your Own PRT Cookie Speaker:Yuya ChudoContributor:Takayuki Hatakeyama#BHASIA BlackHatEventsWhoamiYuya ChudoSenior Advisor Secureworks Japan K.KProvides red teaming service for enterprises mainly in Japan#BHASIA BlackHatEventsAgendaIntroductionMicrosoft Entra ID Device Authentication Mechanism Device Authentication Internal#BHASIA BlackHatEventsA Glimpse Into The ProtocolFuzz Windows RDP Client For Fun And ProfitYingqi Shi(Mas0nShi),Mingjia Liu(cyberestro),Quan Jin(jq0904)DBAPPSecurity#BHASIA BlackHatEventsAbout UsYingqi ShiMas0nShiMingjia LiucyberestroQuan Jinjq0904Guoxian Zhong_p01arisZSiyuan Liu4nsw3r123#BHASIA BlackHatEventsAgendaMotivationIntroductionFuzzingCase StudyFuture#BHASIA BlackHatEventsMotivation#BHASIA BlackHatEventsMotivation Popular Remote Access Solution Legacy and Longevity And more?https:/www.s#BHASIA BlackHatEventsOne Flip is All It Takes:Identifying Syscall-Guard Variables for Data-Only Attacks Speaker:Hengkai YeThe Pennsylvania State UniversityOther Contributors:Hong Hu,Song Liu,Zhechang Zhang2TeamHengkai YePh.D.StudentPenn State UniversitySong LiuPh.D.StudentPenn State UniversityZhechang ZhangPh.D.StudentPenn State UniversityHong HuAssistant ProfessorPenn State University3Current Exploit Method:Control-Flow HijackingMemory-Access PrimitivesArbitrary ReadArbitrary WriteControl DataBlackHat Asia 2024/rockygnu.orgBlackHat Asia 2024/rockygnu.org-uncompyle6 and decompyle3:How to Read and Write a High-Level Bytecode Decompiler and:How to Read and Writea High-Level Bytecode DecompilerBlackHat Asia,2024Rocky Bernstein Slide text:uncompyle6decompyle3rockygnu.orghttps:/rocky.github.io/blackhat-asia-2024-additional/all-notes-printBlackHat Asia 2024/rockygnu.org-uncompyle6 and decompyle3:How to Read and Write a High-Level Bytecode DecompilerSurveyBlackHat Asia 2024/rockygnu.org-uncoThe Fault in Our MetricsRethinking How We Measure Detection&ResponseBoD meeting is coming up.Gonna need updated program metrics.Lets chat tomorrowyou got it bossBossmanTeam ChatBoD metrics.what have we presented in the past?oh nobad news,our last manager pretty much just made those upgood news,youre here and gonna do so much better;-)detection response metricsWhy should I care about metrics?Metrics:You Are What You Measure!Hauser&KatzThat which is measured,improves Karl PearsonMetrics reUnveiling the Cracks in Virtualization,Mastering the Host SystemVMware Workstation EscapeSpeaker:VictorV#BHASIA BlackHatEventsVMware Workstation Escape TianfuCup2018/2021/2023Zer0Con 2022HITB 2020Hyper-V EscapeCVE-2019-0887In 2021Bugs in SQLServer,RDP,QEMU,DNS,DHCP,Samba,ESXiTop 3 of MSRC 2023 Q3/Q4 LeaderboardAbout Me:VictorV(vv474172261)#BHASIA BlackHatEvents目錄CONTENTSVirtualization Basic InfoHistoric Bugs In UHCIExploit for TianfuCup 2023Summary#BHASIA BlackHatEventsVirtualization Basic Inf#BHASIA BlackHatEventsTHE FINAL*CHAPTERUNLIMITED WAYS TO BYPASS YOUR MACOS PRIVACY MECHANISMSCSABA FITZL&WOJCIECH REGUA#BHASIA BlackHatEventsNSFullUserName()Wojciech Regua Head of Mobile Security SecuRing Certified iOS Application Security Engineer(iASE)author Focused on iOS/macOS#appsec Blogger https:/wojciechregula.blog#BHASIA BlackHatEventsNSFullUserName()Csaba Fitzl Principal macOS Security Researcher Kandji Former creator of macOS Exploitation&Pentesting Training Ex red/blue teamer #BHASIA BlackHatEventsThe Hole in Sandbox:The Hole in Sandbox:EscapeEscape Modern WebModern Web-Based App Sandbox From Based App Sandbox From SiteSite-Isolation PerspectiveIsolation PerspectiveBohan Liu,Haibin ShiTencent Security Xuanwu Lab#BHASIA BlackHatEventsWho are weWho are weP4nda20371774Security Researcher at Tencent Security Xuanwu LabMainly Engaged in Browser SecurityGoogle Chrome Bug HunterBohan LiuHaibin ShiAryb1nSecurity Researcher at Tencent Security Xuanwu LabAndroid Security#BHASIConfused Learning:Supply Chain Attacks through Machine Learning ModelsThreat IntelligenceDropboxHello!Mary WalkerAdrian Wood Red Team DropboxThrelfallwhitehacksecMairebearmairebearIntroduction01Target Selection02WeaponizingModels03Attacker Observations04AgendaDeployment05Post Exploitation06Threat Research07Defense&Prevention08Introduction01Key ConceptsModified prediction algorithmsA lot can go wrong with modelsBackdoorsHijacksModels containing malware and much moreMalicious models wont execu#BHASIA BlackHatEventsBad Randomness:Protecting Against Cryptographys Perfect CrimeTal Beery,CTO&Co-Founder ZengoCo-Founder,CTO ZenGo20+years cyber security9th time BH Speaker1st time BHASIA speaker!talbeerysecHi,Im Tal BeeryAgenda The Perfect Crime:Why bad randomness is cryptos perfect crime?True Crime(s)Bad private key:Bitcoin,gone in millisecondsBad Nonce:Ethereum,gone in millisecondsBad DH parameters:TLS malware,even more powerful than previously known SolutionsAvoiding single point of f#BHASIA BlackHatEventsPrivacy DetectivePrivacy DetectiveSniffing Out Your Data Leaks for AndroidAbbie&MeggieAbbie&Meggie#BHASIA BlackHatEventsAbout usAbout usMeggie He,A security researcher at OPPO,specializes in security certification,security feature research,and security tool development.She leads in certification projects,leads the writing of OPPOs IoT security specifications,and development of this tool.Abbie Zhou,A security researcher and engineer,specializes in reverse,development

展開閱讀全文
客服
商務合作
小程序
服務號
折疊
午夜网日韩中文字幕,日韩Av中文字幕久久,亚洲中文字幕在线一区二区,最新中文字幕在线视频网站