Loading…
Attending this event?
Streaming: https://mssvideo.vcu.edu/RVAsec
Technical [clear filter]
arrow_back View All Dates
Tuesday, June 4
 

11:00am EDT

That Shouldn't Have Worked - Payload Development
The game of bypassing defenses and detection continues to be a cat and mouse game. Attackers often find clever ways to use common tools and techniques to execute their code and the defenders continue to create detections and mitigations for these methods. As a red teamer, it is becoming increasingly difficult to get around these defenses and emulate those attackers. In this talk, I will cover some of the methods we use during engagements to thread the needle and bypass those defenses.

Speakers
avatar for Corey Overstreet

Corey Overstreet

Senior Security Consultant, Red Siege
Corey has been engaged with Fortune 500 organizations across a variety of industries, including financial services, government services, and healthcare and is widely recognized for his in-depth OSINT talks and workshops. Additionally, he is a Black Hat trainer and has spoken at conferences... Read More →


Tuesday June 4, 2024 11:00am - 11:50am EDT
Upstairs, Grand Ballroom F/G

1:00pm EDT

Some Assembly Required: Weaponizing Chrome CVE-2023-2033 for RCE in Electron
In this presentation, the development process of a remote code execution (RCE) exploit for CVE-2023-2033 is discussed. CVE-2023-2033 is an N-day type confusion vulnerability that affects Google Chrome for Windows, Mac, and Linux with which an attacker can exploit Chrome V8 engine to cause heap corruption via a crafted HTML page and gain RCE. Prior to this presentation, a public RCE exploit for this vulnerability did not exist. This exploit is based on publicly available proof of concept code that uses this vulnerability to implement v8 heap read/write/addrof primitives. This presentation focuses on weaponizing these primitives to achieve remote code execution consistently on an unsandboxed renderer process of an Electron version running a vulnerable version of Chrome. Methods to hijack the render process instruction pointer and to write and execute specially encoded chunks of shellcode using these primitives are discussed.

Speakers
avatar for Nick Copi

Nick Copi

AppSec Engineer, CarMax
Nick Copi, an application security engineer at CarMax, seamlessly balances his professional role with a fervent pursuit of security research. From architecting full-stack web applications to spearheading innovative security initiatives at CarMax, Nick's diverse background enriches... Read More →


Tuesday June 4, 2024 1:00pm - 1:50pm EDT
Upstairs, Grand Ballroom F/G

2:00pm EDT

Consumer Routers Still Suck
You know that little box in the corner of your house doing all the heavy lifting required to connect you (and, now that everyone is working from home, your company) with the rest of the world? Yeah, that one. It’s no secret that these things are oftentimes security nightmares for consumers, but have ISPs or the various networking vendors improved things over the years, or are they still just as terrible as we all think they are?

Over the last few years, we’ve done a deep dive into many of these devices to see what makes them tick and evaluate the risks posed to consumers. In this talk, we’ll provide a rapid fire assessment of a handful of these devices, showcase the commonalities between flaws discovered, shed some light on behind-the-scenes supply chain issues plaguing this industry, and discuss where we see things going from here.

Speakers
avatar for Evan Grant

Evan Grant

Staff Research Engineer, Tenable
Evan is based out of Halifax, Nova Scotia and works as a Security Researcher at Tenable. He got his start in infosec working with the Canadian Forces Reserves, and has been hooked ever since. Outside of work, he occasionally tries to climb rocks, at which he is definitely worse than... Read More →
avatar for Jimi Sebree

Jimi Sebree

Sr Staff Research Engineer, Tenable
Jimi Sebree is security researcher on Tenable’s Research team. With a strong background in software engineering and security, he bounces between research disciplines in an effort to appear knowledgeable about a variety of topics. Occasionally he succeeds in tricking someone into... Read More →


Tuesday June 4, 2024 2:00pm - 2:50pm EDT
Upstairs, Grand Ballroom F/G

3:00pm EDT

Hacking Exchange From The Outside In
Microsoft Exchange 2019 uses the Oracle Outside-In libraries to parse specific file types when attached to emails. This talk covers the process of discovering memory corruption vulnerabilities within the technology using AFL and Jackalope and the results of the fuzzing process.

Speakers
avatar for Ali Ahmad

Ali Ahmad

Senior Research Consultant, Atredis Partners
With over 5 years of experience in the information security industry, Ali has performed a wide variety of security assessments including network penetration testing, application security assessments, full-scope red team engagements, adversarial simulation, and physical penetration... Read More →


Tuesday June 4, 2024 3:00pm - 3:50pm EDT
Upstairs, Grand Ballroom F/G

4:00pm EDT

Orion's Quest: Navigating the Cyber Wilderness - Tales of Modern Penetration Testing
Focusing on real stories from the trenches, Orion's Quest walks through a series of modern application and API attacks Kevin and his team have pulled off.  The talk describes how we found and exploited the flaws and provides information so you can test yourself.

Speakers
avatar for Kevin Johnson

Kevin Johnson

CEO, Secure Ideas, LLC
Kevin Johnson is the Chief Executive Officer of Secure Ideas. Kevin has a long history in the IT field including system administration, network architecture and application development. He has been involved in building incident response and forensic teams, architecting security solutions... Read More →


Tuesday June 4, 2024 4:00pm - 4:50pm EDT
Upstairs, Grand Ballroom F/G
 
Filter sessions
Apply filters to sessions.
Filtered by Date -