Главная
Study mode:
on
1
Intro
2
Hacking Virtual Appliances
3
What I'm Not Talking About
4
What is a Virtual Appliance?
5
Important Distinction
6
Popular Vendors
7
Pros/Cons for Bug Hunting
8
Entertainment
9
Why is security so bad?
10
Command Injection
11
Filesystem Analysis 101
12
Undocumented Accounts
13
Silent Patches
14
Format String Bug
15
Crazy SUID Binaries + Remote
16
Password Litter
17
Bootloader Access
18
Vendor Communication
19
Brief Disclosure Timelines
20
Recommendations for Vendors
21
Playing Defense
22
Esoteric Thoughts
23
Things are heating up
24
Conclusion
25
The End
Description:
Explore the world of virtual appliance security in this 51-minute conference talk from Derbycon 2015. Delve into the intricacies of hacking virtual appliances, covering topics such as command injection, filesystem analysis, undocumented accounts, and silent patches. Learn about format string bugs, SUID binaries, and bootloader access vulnerabilities. Gain insights into vendor communication, disclosure timelines, and recommendations for improving security. Discover defensive strategies and contemplate esoteric thoughts on the evolving landscape of virtual appliance vulnerabilities.

Hacking Virtual Appliances

Add to list
0:00 / 0:00