Главная
Study mode:
on
1
Intro
2
Today's topic: bug bounties
3
Introducing Adobe Flash
4
Embedding Flash code
5
Flash security sandboxes
6
Local by definition - Flash
7
Escaping the local sandbox (2/2)
8
Exfiltrating files out of sandbox
9
SMB authentication
10
SMB Relay attack (2008)
11
NTLMv2 hashes
12
Attack variant: SMBTrap
13
CVE-2016-4271: discussion (1/2)
14
The (revised) remote sandbox
15
SMB attacks, revisited (1/2)
16
Testing for susceptibility: basic idea
17
Testing for susceptibility: first try
18
Side track: cross-domain policy file
19
Testing for susceptibility: second try
20
CVE-2017-3085: discussion (1/3)
21
CVE-2017-3085: discussion (3/3)
22
Concluding remarks
23
Want to break stuff?
Description:
Explore the intricacies of bypassing Adobe Flash input validation in this 39-minute conference talk recorded at Radboud Universiteit, Nijmegen. Delve into sandboxing techniques used by vendors to restrict application trust boundaries and minimize potential system damage. Examine two sandbox escape vulnerabilities in Adobe Flash, CVE-2016-4271 and CVE-2017-3085, which enable local data exfiltration and obtaining Windows user credentials. Analyze the underlying causes, including arbitrary definitions of "remote" and "local," insufficient input validation schemes, and unmitigated platform-specific vulnerabilities. Gain insights into the importance of Flash as an attack vector and object of study, despite recent deprecation efforts. Learn about embedding Flash code, security sandboxes, SMB authentication, and NTLMv2 hashes. Discover testing methods for susceptibility and explore cross-domain policy files. Conclude with remarks on the significance of understanding these vulnerabilities and an invitation to engage in ethical hacking. Read more

Playing in the Sandbox - Bypassing Adobe Flash Input Validation

Cooper
Add to list