BH Mobile Security Summit
June 16-18, 2015
ExCeL London | London, UK
Black Hat USA
August 1-6, 2015
Mandalay Bay | Las Vegas, NV
Black Hat Europe
November 10-13, 2015
Amsterdam RAI | The Netherlands
7/29/2014
01:00 PM
Black Hat Staff
Black Hat Staff
Event Updates
50%
50%

Black Hat USA 2014: Virtual Reality Check

Virtualization is the future (and often the present) of large-scale IT, but like any technology, it has its share of flaws and shortcomings. Today, as we near the beginning of Black Hat USA 2014, we highlight three Briefings that explore the world of virtualized systems... more specifically, how to break and/or protect them.

Hypervisors are here to stay and promise to shrink the attack surfaces of exposed systems. But Rafal Wojtczuk has been breaking them for eight years, and, oh, does he have some tales to tell. Poacher Turned Gamekeeper: Lessons Learned from Eight Years of Breaking Hypervisors will begin with a trip down memory lane, revisiting major hypervisor breakouts and throwing in a few new exploits, too. Later, he'll examine hypervisor security; does it really live up to the promises? Not at all. In fact, he'll reveal why he believes most hypervisors aren't built with security in mind, as well as his suggestions to harden them.

OpenStack allows you to manage a cloud of VMs, and it has grown into a widely adopted platform. The issue with having a centralized IaaS is that, if you compromise the management cluster, you can attack everything it controls, which is a lot at Yahoo scale. How do you keep your OpenStack cluster safe? What do you do when a management system, hypervisor, or VM is compromised? OpenStack Cloud at Yahoo! Scale: How to Avoid Disaster will discuss how to harden your cluster and make large breaches less likely. And if a breach does occur, you'll find out how to contain it. Bonus: Examples will be drawn from Yahoo's massive deployments of OpenStack clusters.

Finally, it's an arms race between malware authors and forensics experts, and dynamic analysis (sandboxing) is one of good guys' best weapons. But malware authors are evading it in ever-increasing ways. What to do? Full System Emulation: Achieving Successful Automated Dynamic Analysis of Evasive Malware will be a 101, a 201, and possibly a 301 on leveraging full-system emulation, showing you the pros and cons of this methodology, as well as intel on the latest malware evasion techniques observed in the wild.

Regular registration ended July 26, which was a couple of days ago. What are you doing over there? Do you always procrastinate so much? Better visit Black Hat USA 2014's registration page to see what your options are.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-4403
Published: 2015-04-24
Multiple cross-site request forgery (CSRF) vulnerabilities in Zen Cart 1.3.9h allow remote attackers to hijack the authentication of administrators for requests that (1) delete a product via a delete_product_confirm action to product.php or (2) disable a product via a setflag action to categories.ph...

CVE-2012-2930
Published: 2015-04-24
Multiple cross-site request forgery (CSRF) vulnerabilities in TinyWebGallery (TWG) before 1.8.8 allow remote attackers to hijack the authentication of administrators for requests that (1) add a user via an adduser action to admin/index.php or (2) conduct static PHP code injection attacks in .htusers...

CVE-2012-2932
Published: 2015-04-24
Multiple cross-site scripting (XSS) vulnerabilities in TinyWebGallery (TWG) before 1.8.8 allow remote attackers to inject arbitrary web script or HTML via the (1) selitems[] parameter in a copy, (2) chmod, or (3) arch action to admin/index.php or (4) searchitem parameter in a search action to admin/...

CVE-2012-5451
Published: 2015-04-24
Multiple stack-based buffer overflows in HttpUtils.dll in TVMOBiLi before 2.1.0.3974 allow remote attackers to cause a denial of service (tvMobiliService service crash) via a long string in a (1) GET or (2) HEAD request to TCP port 30888.

CVE-2015-0297
Published: 2015-04-24
Red Hat JBoss Operations Network 3.3.1 does not properly restrict access to certain APIs, which allows remote attackers to execute arbitrary Java methos via the (1) ServerInvokerServlet or (2) SchedulerService or (3) cause a denial of service (disk consumption) via the ContentManager.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.