Главная
Study mode:
on
1
Introduction
2
What are algorithmic complexity vulnerabilities
3
Decompression bombs
4
ASCII hex decode
5
Demo
6
Impact
7
Unauthenticated Vulnerability
8
Demonstration
9
Bonus vulnerability
10
Impacts
11
Password Strength Estimation Tool
12
Impact on Enterprise Software
13
Demo of Attack
14
What You Can Do
15
Common Themes
16
Tools
17
Audience
18
Outro
Description:
Explore algorithmic complexity (AC) vulnerabilities in this Black Hat conference talk. Learn how attackers can exploit algorithms to cause significant server workload with minimal input. Discover the mechanics behind decompression bombs and ASCII hex decoding attacks. Witness live demonstrations of unauthenticated vulnerabilities and their impacts on enterprise software. Understand the implications for password strength estimation tools. Gain insights into common themes in AC vulnerabilities and acquire tools to identify and mitigate these risks. Suitable for security professionals and developers interested in enhancing application resilience against denial-of-service attacks.

Denial of Service with a Fistful of Packets - Exploiting Algorithmic Complexity Vulnerabilities

Black Hat
Add to list