Главная
Study mode:
on
1
Introduction
2
Agenda
3
ZeroDay Racing Game
4
ZeroDay Monitoring Pipeline
5
ZeroDay Monitoring Problem 1
6
ZeroDay Monitoring Process
7
ZeroDay Example
8
Ingram Payload Matching
9
Command Ejection
10
File Upload
11
Directory Traversal
12
Real Fortnite Defense Story
13
Timeline of Impulse Miner
14
Defense Rules
15
Example
16
RCE Zero Day
17
Monitoring Method
18
Common digitalization vulnerabilities
19
Summary
Description:
Explore a Black Hat conference talk detailing the automatic capture of 0-day attack payloads without prior vulnerability knowledge. Delve into real-world cases demonstrating model performance and 0-day monitoring results. Follow the speakers as they guide you through the ZeroDay Racing Game, monitoring pipeline, and problem-solving processes. Examine specific examples of payload matching, command ejection, file upload vulnerabilities, and directory traversal. Learn from a real Fortnite defense story, including the timeline of the Impulse Miner and implemented defense rules. Gain insights into monitoring methods for RCE Zero Day attacks and common digitalization vulnerabilities. This 23-minute presentation by Xiaokun Huang and Yue Xu offers valuable technical details for cybersecurity professionals and enthusiasts alike.

Win the 0-Day Racing Game Against Botnet in Public Cloud

Black Hat
Add to list
00:00
00:00