ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

DEF CON 23 - Shoshitaishvili and Wang - Angry Hacking: The next gen of binary analysis

Автор: DEFCONConference

Загружено: 2015-12-25

Просмотров: 13386

Описание: Security has gone from a curiosity to a phenomenon in the last decade. Fortunately for us, despite the rise of memory-safe, interpreted, lame languages, the security of binaries is as relevant as ever. On top of that, (computer security) Capture the Flag competitions have skyrocketed in popularity, with new and exciting binaries on offer for hacking every weekend.

This all sounds great, and it is. Unfortunately, the more time goes by, the older we get, and the more our skills fade. Whereas we were happy to stare at objdump a decade ago, today, we find the menial parts of reversing and pwning more and more tiring and more and more difficult. Worse, while security analysis tools have been evolving to make life easier for us hackers, the core tools that we use (like IDA Pro) have remained mostly stagnant. And on top of that, the term "binaries" have expanded to regularly include ARM, MIPS, PPC, MSP430, and every other crazy architecture you can think of, rather than the nice, comfortable x86 of yesteryear.

New tools are required, and we're here to deliver. Over the last two years, we have been working on a next-generation binary analysis framework in an attempt to turn back the tide and reduce our mounting noobness. The result is called angr.

angr assists in binary analysis by providing extremely powerful, state-of-the-art analyses, and making them as straightforward to use as possible. Ever wanted to know what freaking value some variable could take on in a function (say, can the target of a computed write point to the return address)? angr can tell you! Want to know what input you need to trigger a certain code path and export a flag? Ask angr! In the talk, we'll cover three of the analyses that angr provides: a powerful static analysis engine (able to, among other things, automatically identify potential memory corruption in binaries through the use of Value-Set Analysis), its symbolic execution engine, and dynamic emulation of various architectures (*super* useful for debugging shellcode).

On top of that, angr is designed to make the life of a hacker as easy as possible -- for example, the whole system is 98% Python, and is designed to be a breeze to interact with through iPython. Plus, it comes with a nifty GUI with nice visualizations for symbolically exploring a program, tracking differences between different program paths, and understanding value ranges of variables and registers. Finally, angr is designed to be easily extensible and embeddable in other applications. We'll show off a semantic-aware ROP gadget finder ("are there any gadgets that write to a positive offset of rax but don't clobber rbx" or "given this program state, what are the gadgets that won't cause a segfault") and a binary diffing engine, both built on angr.

We've used angr to solve CTF binaries, analyze embedded devices, debug shellcode, and even dabble in the DARPA Cyber Grand Challenge. We'll talk about our experiences with all of that and will release angr to the world, hopefully revolutionizing binary analysis and making everyone ANGRY!

Speaker Bios:
Yan and Fish are two members of Shellphish, a pretty badass hacking team famous for low SLA and getting the freaking exploit JUST A FREAKING MINUTE LATE. Their secret identities are those of PhD students in the security lab of UC Santa Barbara. When they're not CTFing or surfing, they're doing next-generation (what does that even mean?) security research. Their works have been published in numerous academic venues. For example, in 2013, they created an automatic tool, called MovieStealer, a tool to automatically break the DRM of streaming media services [1]. After taking 2014 to work on angr, in 2015, they followed this up with an analysis of backdoors in embedded devices [2].

Now, they've set their sights on helping the world analyze binaries faster, better, stronger, by revolutionizing the analysis tool landscape!

[1] https://www.usenix.org/conference/use...
[2] http://www.internetsociety.org/doc/fi...

Twitter: @zardus

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
DEF CON 23 - Shoshitaishvili and Wang - Angry Hacking: The next gen of binary analysis

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

DEF CON 23 - Chris Domas - Repsych: Psychological Warfare in Reverse Engineering

DEF CON 23 - Chris Domas - Repsych: Psychological Warfare in Reverse Engineering

DEF CON 32 - The Rise and Fall of Binary Exploitation - Stephen Sims

DEF CON 32 - The Rise and Fall of Binary Exploitation - Stephen Sims

Defcon 21 - A Password is Not Enough: Why Disk Encryption is Broken and How We Might Fix It

Defcon 21 - A Password is Not Enough: Why Disk Encryption is Broken and How We Might Fix It

DEF CON 23 - Robinson and Mitchell - Knocking my neighbors kids cruddy drone offline

DEF CON 23 - Robinson and Mitchell - Knocking my neighbors kids cruddy drone offline

Defcon 21 - The Secret Life of SIM Cards

Defcon 21 - The Secret Life of SIM Cards

DEF CON 23 - Zoz - And That's How I Lost My Other Eye...Explorations in Data Destruction (Fixed)

DEF CON 23 - Zoz - And That's How I Lost My Other Eye...Explorations in Data Destruction (Fixed)

DEF CON 23 - Cory Doctorow - Fighting Back in the War on General Purpose Computers

DEF CON 23 - Cory Doctorow - Fighting Back in the War on General Purpose Computers

Напали на Иран. Уничтожили весь мир.

Напали на Иран. Уничтожили весь мир.

Source Code vs Binary Analysis for SBOMs

Source Code vs Binary Analysis for SBOMs

Что не так с хакерами в кино? «Мистер Робот», «Пароль „Рыба-меч“» и «Киберсталкер»

Что не так с хакерами в кино? «Мистер Робот», «Пароль „Рыба-меч“» и «Киберсталкер»

Введение в символическую казнь с помощью Angr - JC

Введение в символическую казнь с помощью Angr - JC

Цепи Маркова — математика предсказаний [Veritasium]

Цепи Маркова — математика предсказаний [Veritasium]

БАЗА без которой ты зря тратишь время

БАЗА без которой ты зря тратишь время

I spoke to AI agent Claude

I spoke to AI agent Claude

DEF CON 23 - Колби Мур - Взлом спутниковой связи с использованием расширенного спектра

DEF CON 23 - Колби Мур - Взлом спутниковой связи с использованием расширенного спектра

DEF CON 23 - Tony Trummer and Tushar Dalvi - QARK: Android App Exploit and SCA Tool

DEF CON 23 - Tony Trummer and Tushar Dalvi - QARK: Android App Exploit and SCA Tool

Как взламывают любой Wi-Fi без пароля?

Как взламывают любой Wi-Fi без пароля?

Третья неделя конфликта: План Нетаньяху и ловушка для американцев | Ростислав Ищенко

Третья неделя конфликта: План Нетаньяху и ловушка для американцев | Ростислав Ищенко

everything is open source if you can reverse engineer (try it RIGHT NOW!)

everything is open source if you can reverse engineer (try it RIGHT NOW!)

Вся суть линейной алгебры: лекции #1-16 [3blue1brown]

Вся суть линейной алгебры: лекции #1-16 [3blue1brown]

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]