30 de
Novembro
2024

SALVADOR - BA
BRASIL

Faça sua inscrição

7 Palestrantes

200 Participantes

Anderson Nascimento
Anderson Nascimento aka AndersonCode
Github
TBD

Bio: Diretor e principal pesquisador em Segurança da Informação na Allele Security Intelligence

Resumo:

Tópico geral: Kernel, Exploitation, Research


Carolina Trigo
Carolina Trigo
Github
CPU Exploitation: leveraging math knowledge for hackademic purposes - an Spectre V2 Case Study Scenario

Bio: Security Researcher

Resumo: A talk trata sobre como utilizar abstração matemática na interseção entre modelagem, o conceito de exploit equivalence classes, execução simbólica com framework angr e exploração de CPUs modernas fazendo estudo de caso do Spectre V2 que abusa da execução especulativa através de BHI, Branch History Injection. Veremos um background dos principais componentes e funcionamentos da microarquitetura de processador, introdução à execução simbólica, explicação sobre o Spectre e Spectre V2 e BHI e uma demonstração de exploração na arquitetura Intel em processadores modernos.

Tópico geral: Exploitation, CPUs, Hardware, Hacking


Otavio Silva
Github
Improving the Gaspar Framework through Gaspar(Zinho): Expanding a Native Android Argumentation Framework for Android Runtime (ART)

Bio: Doutorando em Ciência da Computação pela Unicamp. Participou como pesquisador do 2º Testes Públicos de Segurança do Sistema Eletrônico de Votação Brasileiro, ao obter local kernel access . Seus principais interesses de pesquisas incluem segurança em kernel, com enfase na exploração dos mecanismos de detecção e prevenção de ataques, kernel rootkits, reverse engineering e game cheating :)

Resumo: By utilizing the LSPosed SDK, Gaspar introduces a fast, reliable, and evasive argumentation framework that operates directly on Android Run Time (ART) through hooking and interposition abstraction. There will also be a public tool release granting access to the turbo features.

Tópico geral: Android, Mobile, Exploitation


Roberto Espreto
Roberto Soares aka espreto
Github
Electron Orbits in The MacOS Universe: The Travel Experience for Red Teamers

Bio: With more than 10 years immersed in Information Security, he is an Information Security Engineer specializing in Red Team. His focus extends to best practices, encompassing application and infrastructure vulnerability assessments, code reviews, and a mix of static and dynamic analyzes to identify vulnerabilities. In addition to his main focus, he has a strong inclination to develop offensive tools. He has contributed more than 25 modules to the core Metasploit framework and registered several CVEs. Additionally, his knowledge covers the complex landscape of macOS security. His curiosity leads him to test non-trivial scenarios, from analyzing cranes that operate containers on ships, to delving into the complexities of embedded systems (SCADA/PLC) and executing advanced attacks on computer networks, that is, his hacker spirit runs through his veins. .

Resumo: If you use macOS in your daily life and rely on apps like Slack, Discord, GitHub, or VSCode—among dozens of others—chances are you're using an Electron app that might be vulnerable. Electron applications on macOS are often underestimated, yet they harbor vulnerabilities that can be exploited to significant effect. At the NullByte Conference, we’ll navigate through these risks, offering Red Teamers a unique insight into how these applications can be turned into potent attack vectors. In this session, we’ll explore how Electron apps can be exploited to bypass macOS's Transparency, Consent, and Control (TCC) framework, manipulate app entitlements for unauthorized access to cameras and microphones, and bypass the 'Privacy & Security' mechanisms to implant backdoors, escalate privileges, write in unauthorized locations, and maintain persistence. We'll delve into real-world cases, demonstrating these vulnerabilities in action and discussing how to prevent such attacks.

Tópico geral: MacOS, Research, Exploitation


Thiago Peixoto
Tiago Peixoto
Github
Android Native Library Fuzzing Strategies: Insights for Vulnerability Researchers

Senior Threat Researcher at Conviso Application Security, with 8 years of experience in reverse engineering and vulnerability research. I have spoken at events such as H2HC and NullByte Security Conference. Currently, my focus is on research related to bypassing EDRs and antivirus software.

Resumo: In this presentation, we will explore various fuzzing strategies applicable to native libraries in Android applications. We will begin with a theoretical foundation, followed by the preparation of the necessary environment and the initial steps to take. Then, we will discuss different approaches to creating harnesses, as well as provide valuable tips for vulnerability researchers.

Tópico geral: Android, Fuzzing, Research, Exploitation


Zezadas
Zezadas
Github
Hacking Embedded Devices - From Black Box to UID 0

Bio: Zezadas is a dedicated security researcher with a strong passion for exploring the intricacies of hardware hacking. With a wide-ranging skill set and an unyielding curiosity. Exploring the inner workings of hardware systems brings immense joy, as it involves disassembly of devices and desoldering of chips. This hands-on approach has yielded invaluable insights into uncovering vulnerabilities and potential exploits within embedded systems. As a committed advocate for cybersecurity education, Zezadas frequently shares knowledge and experiences at renowned cybersecurity conferences worldwide. These include events such as BsidesLisbon, BsidesBangalore, BerlinSides, AlligatorCon, WarCon, 0xOPOSEC, and many others. Engaging across a broad spectrum of cybersecurity domains, Zezadas extends expertise to encompass web penetration testing, mobile application security assessments, and various other specialized areas. With a genuine desire to elevate cybersecurity awareness and expertise, Zezadas remains dedicated to fostering a more secure digital world through knowledge sharing and hands-on exploration.

Resumo:This presentation covers achieving root access on an embedded device without prior information by combining exploits and reverse engineering techniques. Throughout this presentation, you will learn methods to identify hardware specifications and conduct decompilation and analysis of Android Applications and Linux binaries. This acquired knowledge will be applied to uncover and exploit vulnerabilities within embedded systems. Together, they’ll showcase that hacking embedded devices isn’t as intimidating as it may seem and can be an adventure worthy of a time-traveling DeLorean. This unique approach showcases the ingenuity of hackers who can make the past and present converge in unexpected ways. Throughout the talk, you’ll gain valuable insights into the world of embedded device security, learning practical tips and techniques that can be applied to your own projects. Whether you’re an experienced security professional or intrigued by the blend of technology and time travel, this presentation promises to entertain, educate, and inspire.

Tópico geral: Hardware, Hacking

"Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for. I am a hacker, and this is my manifesto. You may stop this individual, but you can't stop us all... after all, we're all alike."

+++The Mentor+++

Patrocinadores:

Hakai Security PurpleBird Security Google XSITE Segurança da Informação Bravul Blaze Information Security