Quick Overview: In this work, we present the novel results of our research on Intel CPU microcode. Building upon prior research on Intel Goldmont ... Breaking into secure facilities used to be possible by inserting a listening device (such as an ESPKey) behind an RFID card ... For too long, web race-condition attacks have focused on a tiny handful of scenarios. Their true potential has been masked thanks ...
Def Con 31 Backdoor In - Detailed Overview & Context
In this work, we present the novel results of our research on Intel CPU microcode. Building upon prior research on Intel Goldmont ... Breaking into secure facilities used to be possible by inserting a listening device (such as an ESPKey) behind an RFID card ... For too long, web race-condition attacks have focused on a tiny handful of scenarios. Their true potential has been masked thanks ... In this talk, we will present a 0-day vulnerability found in the Google Cloud Platform (GCP) affecting all Google users, which ... Complexity is increasing. Trust eroding. In the wake of Spectre and Meltdown, when it seems that things cannot get any darker for ... In this talk we will discuss the radio jailbreaking journey that enabled us to perform the first public disclosure and analysis of the ...
Who likes paying to ride the subway? Sure, you could hop the fare gates, but that can be athletically challenging and simply isn't ... The esoteric art of patching ELF binaries has a long and fascinating history who's roots are deep within the hacking subculture; ... When a Windows domain is compromised, an attacker has several options to create Spooky authentication at a distance outlines a new and innovative post-exploitation technique to proxy common authentication ... As our homes become smarter and more connected we come up with new ways of reasoning about our privacy and security. The hacking subculture's closest relative is that of the Darknet. Both have knowledgeable people, many of whom are highly ...
C2 servers of mobile and Windows malware are usually left to their own fate after they have been discovered and the malware is ... In 2018, a secure communications app called Anom started to gain popularity among organized criminals. Soon, top tier drug ... Wow, this took a LOT of editing time! While I'm glad that we recorded my talk in the TOOOL Lockpick Village, as you can see in the ...