COMMSEC: Hardware Backdooring an eScooter
In this talk, we are going to talk about ECU vulnerabilities in e-scooters. Our target is Indian OEM, though similar or same vulnerabilities can be found in other e-scooters, We are going to demonstrate the attack where we took control of an e-scooter with the help of a hardware implant attack. The devices used in […]
COMMSEC: B(l)utter – Reversing Flutter Applications by using Dart Runtime
There are currently only a few tools available for reverse engineering Flutter applications. Reading Dart snapshots, which are used to store all Dart objects, is a common problem because the format changes with each update. Updating the snapshot reader for each new release of the Flutter framework is a tedious task. Currently, “Reflutter” is the […]
HITB LAB: Build Your Own Drone Attacking Device
This is a two hrs intensive workshop about building a device to attack consumer drones. It includes the common attack vectors from internal to external and modules on understanding drone signals. Attack Vectors (common methods for drone hacking) Firmware – modify or obfuscate the firmware Applications – hijacking of the mobile devices or mal-application Radio […]
HITB LAB: Bring Your Own SOAR: Automated Incident Response
Incident response involves processes beyond investigations like alert management, tuning detections, communication, tracking incident-related metrics, handoffs, etc, that can be tedious, repetitive, and time consuming, especially considering our all-remote environment at GitLab. For that purpose, our incident response team has developed a set of (mostly) Slack-based tools to standardize the process for incident response management […]
COMMSEC: Shining a Light On Solar System Cyber Security
In this talk, I will present serious issues with residential & commercial hardware used to control critical elements of the power sector. A sustained attack on the energy sector would be catastrophic, to say the very least. With novel scenarios such as ripple detectors, negative power demand, automatic street transformer tap changers, and the risk […]
COMMSEC: Bugs in Blocks
Love it or hate it, blockchain has become a playground for techies. The chains also fuel criminal ecosystems through major hacking incidents. Blockchain bugs present unique challenges for developers and security testers. In this talk, we shed light on the most common bug types found in one of the main blockchain frameworks and provide insights […]
KEYNOTE 2: TBA
TBA
gVisor: Modern Linux Sandboxing Technology
Sandboxing is very important in information security and while the Linux world has a lot of sandbox solutions and also sandboxing primitives, there is no dominating sandbox solution, and every one has it’s own set of advantages and disadvantages. An ideal sandbox solution should be easy to use, security focused, and also offer “full observablity […]
Exploiting the Lexmark PostScript Stack
Lexmark printers implement a custom closed source PostScript stack called `pagemaker` that NCC Group’s Exploit Development Group exploited two different times during the Pwn2Own Toronto 2022 contest. This talk will cover some internals of the Lexmark PostScript stack, an introduction to the PostScript language and related functionality required to understand exploitation of the discovered bugs, […]
It Was Harder to Sniff Bluetooth Through My Mask During The Pandemic
During the pandemic I took up Bluetooth (BT) sniffing as a way to get out of the house. I didn’t know what was out there for BT devices, but it felt important to know what the implications were of the new over-the-air, no-auth, cross-device, firmware-level exploits on BT chips that my wife and others had […]