Главная
Study mode:
on
1
Intro
2
What will you gain?
3
Set "Milestones"
4
Obtaining the Lexmark Firmware
5
Dynamic Analysis - General Approach
6
Dynamic Analysis - Lexmark Approach
7
Static Analysis - General Approach
8
Lexmark Static Analysis
9
Lessons Learned
10
Security as a Cost Center
11
Language and Framework Safety
12
Application Security Tools
13
Reverse Shell
14
Dump Credentials
15
Play Mario Brothers
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Learn how two security researchers discovered and exploited a command injection vulnerability in Lexmark printers to win $20,000 at Pwn2Own 2023 in this DEF CON 31 conference talk. Follow their methodical approach to firmware analysis, including both dynamic and static analysis techniques, as they break down how they identified a basic but critical remote code execution vulnerability that affected nearly all Lexmark printer models. Gain practical insights into vulnerability research, understand why common security tools missed this flaw, and explore the released proof-of-concept exploits for both remote code execution and credential dumping. The presentation demonstrates how breaking complex security challenges into manageable milestones can lead to successful outcomes, while also discussing broader lessons about enterprise software security, programming language safety, and the state of application security tools.

New Isn't Always Novel - Finding Basic Vulnerabilities in Enterprise Software

DEFCONConference
Add to list
0:00 / 0:00