Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Black Hat Asia
March 26-29, 2019
Singapore
Black Hat USA
August 3-8, 2019
Las Vegas, NV, USA
Black Hat Europe
December 2-5, 2019
London UK
6/17/2019
09:00 AM
Black Hat Staff
Black Hat Staff
Event Updates
100%
0%

Find Your Next Favorite Cybersecurity Tool at the Black Hat USA Arsenal

Learn new enterprise-grade techniques for identifying vulnerabilities, improving Active Directory security, and building trust with customers at Black Hat USA this summer.

On the hunt for new cybersecurity tools? Check out the Arsenal at Black Hat USA in Las Vegas this August, where all Black Hat passholders are invited to see live demonstrations of the latest open-source security tools.

For example, you could swing by the Arsenal (located in the Business Hall) and catch a demonstration of Smalien, a security tool for information flow analysis and information leakage detection on Android devices.

Once you give an application to Smalien, it understands the application thoroughly by executing static information flow analysis of Dalvik bytecode files extracted from the application. Smalien performs not only static analysis but also dynamic analysis, implicit information flow detection, and privacy policy enforcement at runtime by parasitizing the application.

You may also want to see a demo of Objection: Runtime Mobile Exploration, a runtime mobile exploration toolkit built with the aim of helping assess mobile applications and their security posture without the need for a jailbroken or rooted mobile device.

Objection allows for many common pentesting tasks to be performed such as disabling SSL inspection, interacting with the applicable platforms keystore/keychain as well as the ability to upload/download files from a device. Additionally, more advanced usages such as code path tracing and live Java object inspection is also possible.

Black Hat USA will also host a smorgasbord of complementary Briefings featuring expert speakers sharing tools and techniques that can help you put these tools to good use. Securing the System: A Deep Dive into Reversing Android Pre-Installed Apps is a good example. This 50-minute Briefing from Google will detail the differences in reversing and analyzing pre-installed Android applications compared to the user-space applications on which most security research focuses.

This will include detecting signals that the pre-installed app may be colluding with other components and be only one piece of the puzzle, and how bad behaviors can change when they are run in the more privileged context of a pre-installed application. You’ll also dive into case-studies of Android pre-installed security issues Google discovered in 2018 and 2019: malware, security misconfigurations, and remote code execution backdoors!

In New Vulnerabilities in 5G Networks you’ll get an in-depth look at the security features of 5G radio networks and new vulnerabilities affecting both the operator infrastructure and end-devices (including mobiles, NB-IoTand laptops). Plus, you’ll see how these new vulnerabilities in the 5G/4G security standards can be exploited using low-cost hardware and software platforms.

For more information about these Briefings and many more check out the Black Hat USA Briefings page, which is regularly updated with new content as we get closer to the event!

Black Hat USA returns to the Mandalay Bay in Las Vegas August 3-8, 2019. For more information on what’s happening at the event and how to register, check out the Black Hat website.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
US Turning Up the Heat on North Korea's Cyber Threat Operations
Jai Vijayan, Contributing Writer,  9/16/2019
MITRE Releases 2019 List of Top 25 Software Weaknesses
Kelly Sheridan, Staff Editor, Dark Reading,  9/17/2019
7 Ways VPNs Can Turn from Ally to Threat
Curtis Franklin Jr., Senior Editor at Dark Reading,  9/21/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16703
PUBLISHED: 2019-09-23
admin/infolist_add.php in PHPMyWind 5.6 has stored XSS.
CVE-2019-16704
PUBLISHED: 2019-09-23
admin/infoclass_update.php in PHPMyWind 5.6 has stored XSS.
CVE-2019-16702
PUBLISHED: 2019-09-23
Integard Pro 2.2.0.9026 allows remote attackers to execute arbitrary code via a buffer overflow involving a long NoJs parameter to the /LoginAdmin URI.
CVE-2019-16695
PUBLISHED: 2019-09-22
phpIPAM 1.4 allows SQL injection via the app/admin/custom-fields/filter.php table parameter when action=add is used.
CVE-2019-16696
PUBLISHED: 2019-09-22
phpIPAM 1.4 allows SQL injection via the app/admin/custom-fields/edit.php table parameter when action=add is used.