Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Black Hat Asia
May 10-13, 2022
Hybrid/Marina Bay Sands, Singapore
Black Hat USA
August 6-11, 2022
Las Vegas, NV, USA
Black Hat Europe
December 5-8, 2022
London
End of Bibblio RCM includes -->
3/4/2015
11:00 AM
Black Hat Staff
Black Hat Staff
Event Updates

Black Hat Asia 2015: Break All the Security

You can't spell 'exploit' without 'Black Hat.' Wait, that didn't come out right... how embarrassing. While our word engineers troubleshoot the aphorism we just fried, you might enjoy this latest round-up of Black Hat Asia 2015 Briefings. You'll note they focus on security exploits, not wordplay. Probably for the best.

RC4 is the most popular stream cipher in the world, and in particular is used to protect a significant portion of SSL/TLS sessions. In Bar-Mitzva Attack: Breaking SSL with 13-Year Old RC4 Weakness, Itsik Mantin will show how an old vulnerability of RC4 can be used to mount a partial plaintext recovery attack on SSL-protected data. This new attack is not limited to recovery of temporal session tokens, being capable of stealing parts of permanent secret data when it delivers as POST parameters. What's more, it's the first practical SSL attack that doesn't require man-in-the-middle. Pique your interest yet?

If you're looking for a more general overview of current exploits, Browsers Gone Wild will fit the bill. Angelo Prado and Xiaoran Wang will (deep breath) unveil and demo the latest developments in browser-specific weaknesses, including creative new mechanisms to compromise confidentiality, successfully perform login and history detection, serve mixed content, deliver malicious ghost binaries without a C&C server, exploit cache/timing side channels to extract secrets from third-party domains, and leverage new HTML5 features to carry out stealthier attacks.

Or let's talk cross-site scripting (XSS), one of the web's most severe security vulnerabilties. Browser vendors responded by creating client-side XSS filters, but their hasty protections are inadequate. In fact, Client-Side Protection Against DOM-Based XSS Done Right (TM) will begin with a dizzying 17 newfound flaws in Chrome's XSS Auditor, and that's just the start of the carnage. Luckily, the presenters will wrap with a new, superior approach to client-side XSS protection, which can potentially stop these attacks for good.

Lastly, Multicast Listener Discovery (MLD) and its successor MLDv2 are protocols in the IPv6 suite, and widely used in routers and operating systems like Windows, Linux, and FreeBSD. But have the security implications of MLD been studied enough? No, say Joel St. John and Nicolas Guigo, and in MLD Considered Harmful - Breaking Another IPv6 Subprotocol they'll hold forth on both existing and potential attacks, ending with recommendations on how to secure IPv6 networks to the current best possible extent.

Black Hat Asia 2015 takes place March 24 to 27 at the Marina Bay Sands in Singapore. There are only a few weeks left to register, so why wait?

Comment  | 
Print  | 
More Insights
//Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Practical Network Security Approaches for a Multicloud, Hybrid IT World
The report covers areas enterprises should focus on for their multicloud/hybrid cloud security strategy: -increase visibility over the environment -learning cloud-specific skills -relying on established security frameworks -re-architecting the network
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-30333
PUBLISHED: 2022-05-09
RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected.
CVE-2022-23066
PUBLISHED: 2022-05-09
In Solana rBPF versions 0.2.26 and 0.2.27 are affected by Incorrect Calculation which is caused by improper implementation of sdiv instruction. This can lead to the wrong execution path, resulting in huge loss in specific cases. For example, the result of a sdiv instruction may decide whether to tra...
CVE-2022-28463
PUBLISHED: 2022-05-08
ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.
CVE-2022-28470
PUBLISHED: 2022-05-08
marcador package in PyPI 0.1 through 0.13 included a code-execution backdoor.
CVE-2022-1620
PUBLISHED: 2022-05-08
NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.