A demystification of the exploit development lifecycle
There’s a certain allure to zero-day exploits. At the apex of the security industry, these elusive technologies are engineered by a persistent few to open doors of software systems that were never meant to exist. We go behind-the-scenes to provide an inside look at the zero-day development lifecycle, breaking common misconceptions regarding this increasingly difficult tradecraft.
In this talk, we will discuss the engineering process behind a zero-day that was used to exploit Apple Safari at PWN2OWN 2018. Rather than placing an intense focus on the technical challenges required to weaponize this particular chain of vulnerabilities, we reflect on this experience as a case-study of the analytical approach we employ to attack unfamiliar software targets. In addition to these methods, we will contrast how this process differs from CTF/Wargame challenges, highlighting the path one can take to graduate from casual enthusiast to security professional.
Markus Gaasedelen Amy (itszn)
- 35C3 ChaosWest – Freitagsfoo gestern, heute, morgen - 22.04.2019
- 35C3 ChaosWest – Chaos-Familien-Duell - 22.04.2019
- Easterhegg 2019 – Infrastruktur-Review - 22.04.2019
- Easterhegg 2019 – Die Zwiebelfreunde/Riseup Durchsuchungen - 22.04.2019
- Easterhegg 2019 – Jetzt ist Ende :-) - 22.04.2019