In ~1h, weโll explore the awesome and clever DOOM.PDF!
www.youtube.com/live/t17joAi...
In ~1h, weโll explore the awesome and clever DOOM.PDF!
www.youtube.com/live/t17joAi...
I started with very simple concepts like: 'when were "files" being introduced to end-users?'. Then I 'connect' to my previous talk, showing that some old tricks still work in modern setup, such as remote hacking of cars in 2024 via a format from 1977. Then I introduce modern tools such as Mitra, as we move from funky PoCs to fearsome tools, to generate those PoCs. A mention of small format bugs at scale and the risk of privacy leaks: Acropalypse, SQLBuddy. Now it's time for more advanced stuff: near-polyglots, crypto-polyglots, hash collisions and hashquines. And finally, introducing a genuine use of AI in file format filtering at scale, with Magika, the open-source AI filter at Google.
I made my #38C3 talk on file formats (fearsome file formats) for all kinds of audience.
Here's how...
Hopefully, a little bit for all kinds of people!
I presented about file formats at #38C3.
Thanks for the feedback everyone!
speakerdeck.com/ange/fearsom...
Some Christmas cheer with @buffaloverflow.rw.md . A nice bug in the URL handler for Delinea Secret Server.
blog.amberwolf.com/blog/2024/de...
Sorry folks, I had to remove the Disconnected GPO project from GitHub... but never fear, it has returned as Disconnected RSAT since it now supports the Certificate Authority and Certificate Templates snap-ins in addition to Group Policy support.
github.com/CCob/DRSAT
Bug Bounty Tip
XSS Filter Bypass: mXSS
Cheers!
Is that a 257. IP address?
This hack is brilliant, APT28 hopping into a target environment over wifi by compromising neighbouring companies and finding a dual-homed host within range.
volexity.com/blog/2024/11...
And yet... they got caught doing this!