Bio: Diretor e principal pesquisador em Segurança da Informação na Allele Security Intelligence
Resumo:Na perspectiva de Anderson Nascimento, ausência de uma metodologia rigorosa é um dos principais fatores que impedem o aprendizado e desenvolvimento de profissionais na área de segurança da informação. Nesta apresentação, ele irá compartilhar sua experiência realizando pesquisas de vulnerabilidades há mais de 10 anos, mostrando casos em que a metodologia foi um fator importante e como evitar erros comuns
Tópico geral: Kernel, Exploitation, Research
Bio: Security Researcher
Resumo: In this talk, I will present a step-by-step approach to binary exploitation, including reverse engineering techniques, execution flow analysis, and the identification of a buffer overflow vulnerability. Additionally, I will demonstrate an application of egg hunting technique to locate and execute payloads in memory. The session will conclude with the presentation of a functional exploit for the analyzed case, providing a practical perspective on the subject
Tópico geral: Binary Exploitation, Low Level, Reverse Engineering, Hacking
Bio: Doutorando em Ciência da Computação pela Unicamp. Participou como pesquisador do 2º Testes Públicos de Segurança do Sistema Eletrônico de Votação Brasileiro, ao obter local kernel access . Seus principais interesses de pesquisas incluem segurança em kernel, com enfase na exploração dos mecanismos de detecção e prevenção de ataques, kernel rootkits, reverse engineering e game cheating :)
Resumo: By utilizing the LSPosed SDK, Gaspar introduces a fast, reliable, and evasive argumentation framework that operates directly on Android Run Time (ART) through hooking and interposition abstraction. There will also be a public tool release granting access to the turbo features.
Tópico geral: Android, Mobile, Exploitation
Bio: With more than 10 years immersed in Information Security, he is an Information Security Engineer specializing in Red Team. His focus extends to best practices, encompassing application and infrastructure vulnerability assessments, code reviews, and a mix of static and dynamic analyzes to identify vulnerabilities. In addition to his main focus, he has a strong inclination to develop offensive tools. He has contributed more than 25 modules to the core Metasploit framework and registered several CVEs. Additionally, his knowledge covers the complex landscape of macOS security. His curiosity leads him to test non-trivial scenarios, from analyzing cranes that operate containers on ships, to delving into the complexities of embedded systems (SCADA/PLC) and executing advanced attacks on computer networks, that is, his hacker spirit runs through his veins. .
Resumo: If you use macOS in your daily life and rely on apps like Slack, Discord, GitHub, or VSCode—among dozens of others—chances are you're using an Electron app that might be vulnerable. Electron applications on macOS are often underestimated, yet they harbor vulnerabilities that can be exploited to significant effect. At the NullByte Conference, we’ll navigate through these risks, offering Red Teamers a unique insight into how these applications can be turned into potent attack vectors. In this session, we’ll explore how Electron apps can be exploited to bypass macOS's Transparency, Consent, and Control (TCC) framework, manipulate app entitlements for unauthorized access to cameras and microphones, and bypass the 'Privacy & Security' mechanisms to implant backdoors, escalate privileges, write in unauthorized locations, and maintain persistence. We'll delve into real-world cases, demonstrating these vulnerabilities in action and discussing how to prevent such attacks.
Tópico geral: MacOS, Research, Exploitation
Senior Threat Researcher at Conviso Application Security, with 8 years of experience in reverse engineering and vulnerability research. I have spoken at events such as H2HC and NullByte Security Conference. Currently, my focus is on research related to bypassing EDRs and antivirus software.
Resumo: In this presentation, we will explore various fuzzing strategies applicable to native libraries in Android applications. We will begin with a theoretical foundation, followed by the preparation of the necessary environment and the initial steps to take. Then, we will discuss different approaches to creating harnesses, as well as provide valuable tips for vulnerability researchers.
Tópico geral: Android, Fuzzing, Research, Exploitation
Bio: Zezadas is a dedicated security researcher with a strong passion for exploring the intricacies of hardware hacking. With a wide-ranging skill set and an unyielding curiosity. Exploring the inner workings of hardware systems brings immense joy, as it involves disassembly of devices and desoldering of chips. This hands-on approach has yielded invaluable insights into uncovering vulnerabilities and potential exploits within embedded systems. As a committed advocate for cybersecurity education, Zezadas frequently shares knowledge and experiences at renowned cybersecurity conferences worldwide. These include events such as BsidesLisbon, BsidesBangalore, BerlinSides, AlligatorCon, WarCon, 0xOPOSEC, and many others. Engaging across a broad spectrum of cybersecurity domains, Zezadas extends expertise to encompass web penetration testing, mobile application security assessments, and various other specialized areas. With a genuine desire to elevate cybersecurity awareness and expertise, Zezadas remains dedicated to fostering a more secure digital world through knowledge sharing and hands-on exploration.
Resumo:This presentation covers achieving root access on an embedded device without prior information by combining exploits and reverse engineering techniques. Throughout this presentation, you will learn methods to identify hardware specifications and conduct decompilation and analysis of Android Applications and Linux binaries. This acquired knowledge will be applied to uncover and exploit vulnerabilities within embedded systems. Together, they’ll showcase that hacking embedded devices isn’t as intimidating as it may seem and can be an adventure worthy of a time-traveling DeLorean. This unique approach showcases the ingenuity of hackers who can make the past and present converge in unexpected ways. Throughout the talk, you’ll gain valuable insights into the world of embedded device security, learning practical tips and techniques that can be applied to your own projects. Whether you’re an experienced security professional or intrigued by the blend of technology and time travel, this presentation promises to entertain, educate, and inspire.
Tópico geral: Hardware, Hacking
"Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for. I am a hacker, and this is my manifesto. You may stop this individual, but you can't stop us all... after all, we're all alike."