Главная
Study mode:
on
1
Intro
2
Why Unicode
3
Unicode History
4
Encodings
5
Encoding Examples
6
UTF-16 Encoding
7
Mojibake!
8
Find Your Character
9
Typing Unicode
10
Classic Phishing Obfuscations
11
Homographs
12
Problem: DNS is ASCII
13
What about Homoglyphs in Unicode?
14
Likely Sources for Homoglyphs
15
Slashes?
16
Protections Implemented by Browsers
17
Defenses by Registrar
18
Approach
19
Test Strings
20
Outlook 2010
21
Facebook
22
Fonts Matter
23
Steganography
24
Stego Examples
25
Examples: "It worked?"
26
Name Spoofing
27
Right to left?
28
What about file names?
29
Non Visual
30
Canonicalization Errors?
31
Other Transforms
32
UTF-8 Exploits
33
Text Comparison (Normalization)
34
Real-life Example: Spotify
35
Thwart Searches/Obscenity Filters
36
Complexities With Buffer Overflows
Description:
Explore the intricacies of Unicode and its potential for character assassination in this comprehensive conference talk. Delve into Unicode history, encodings, and examples, including UTF-16 encoding and Mojibake. Learn about classic phishing obfuscations, homographs, and the challenges they pose to DNS. Examine browser protections, registrar defenses, and test various platforms like Outlook 2010 and Facebook. Investigate steganography techniques, name spoofing, right-to-left text manipulation, and file name vulnerabilities. Analyze non-visual attacks, canonicalization errors, and UTF-8 exploits. Discover real-life examples, such as the Spotify case, and understand how Unicode can be used to thwart searches and obscenity filters. Finally, explore the complexities of buffer overflows in relation to Unicode characters.

Character Assassination Fun and Games with Unicode - Adrian Crenshaw

Add to list