CrikeyCon 2021 - CTF results
7:17
3 жыл бұрын
Droppy's Back! Crikeycon VII
0:31
3 жыл бұрын
Пікірлер
@steiner254
@steiner254 Жыл бұрын
Interesting <3
@steiner254
@steiner254 Жыл бұрын
An interesting dude <3
@grndcntrl
@grndcntrl 2 жыл бұрын
Great talk thank you! It makes me wonder... why would an attacker would be unable to ask the tang server to encrypt some data and use the response to get the tang private key in order to decrypt their target?
@charlieosko4151
@charlieosko4151 3 жыл бұрын
Great talk Alice, thanks!
@MarekCiupak
@MarekCiupak 3 жыл бұрын
Hi, thank you for the presentation. I have one small comment here: kzbin.info/www/bejne/fGXHc3imi8-Cq6s - I think origin and relaying party id are hashed but NOT signed at that point, right? Besides that I have one question about registration. What kind of signature did you mean at kzbin.info/www/bejne/fGXHc3imi8-Cq6s? I'm asking because, I think during registration ceremony, the data that comes back from the authenticator (such as origin, relaying party id, challenge) is NOT signed by the public/private key. They may be signed if the attestation is used and they would be signed by attestation credential. But, I think people usually use "none" attestation method (to not prompt for user's agreement in the web browser) and then authenticator responds with empty "response.attestation_object.att_stmt" field. I checked the official documentation and I don't see any other step with reliable verification (besides "response.attestation_object.att_stmt") of data on the relaying party side during registration ceremony. So, I think that with "none" attestation method, we can not trust that the data sent back from the authenticator to the relaying party during registration ceremony is integral. For example, inspired by your debugging on webauthn.io/, I tested this case in JS console there. I was able to change the challenge in JS console, just before sending it to the authenticator. Afterwards I changed the response (I updated only the challenge without touching the public key) from the authenticator just before sending it to the back-end. The response was accepted. So, in the other words, I was able to send fake challenge to the authenticator. I believe I would be able to use a stale response from the authenticator just by replacing the challenge in that response., etc. Or, without signed origin, user could successfully register their authenticator in relaying party via my fake site (as I as man-in-the-middle could replace the origin before sending it to the real relaying party, without having to change other part of the data). Of course, this is true only during registration, as during authentication ceremony the data is signed by the private key. But during your presentation it sounded like this data is always signed. Maybe I'm missing something? thanks
@user-daddy69
@user-daddy69 3 жыл бұрын
Robert Winkel is my Dad🙋‍♂️ look at my last name
@alexandercain2055
@alexandercain2055 3 жыл бұрын
Shoutout to my American University friends!
@Yaxqb
@Yaxqb 4 жыл бұрын
insanely dank aussie dude spitting tha truth
@kristi_h
@kristi_h 4 жыл бұрын
I keep coming back to this video. It's pure awesomeness. Thank you!
@virtualallocex1062
@virtualallocex1062 4 жыл бұрын
Very nice talk about EDR Mechanisms, learned a lot, thx!
@SaeedAlFalasi
@SaeedAlFalasi 4 жыл бұрын
great talk and thanks so much for educating us newbies happy hacking
@yahyaalgasser2012
@yahyaalgasser2012 4 жыл бұрын
I have experience in IDA PRO - but I want to learn about this
@BelowAverageRazzleDazzle
@BelowAverageRazzleDazzle 4 жыл бұрын
I found your explanation to be helpful, but WE NEED TO SEE YOUR SCREEN!!! Also links to the references you mention.
@SaeedAlFalasi
@SaeedAlFalasi 4 жыл бұрын
Have a look at buffer overflows made easy by The cyber mentor on youtube if Justin Stevens talk lost you
@ersinakakobe
@ersinakakobe 5 жыл бұрын
Hey There, I really like this presentation. Are the slides shared anywhere?
@TheRedTeam
@TheRedTeam 5 жыл бұрын
user: context NTLM: 17b6c6ef9b7f3a6e1f0727789c27988d. TIME: 48:29
@TecnoCaveman
@TecnoCaveman 5 жыл бұрын
This is an amazing talk that needs to be shared more it sucks that this is an issue but I see it all the time and I will be calling it out from now on
@TheSliderW
@TheSliderW 5 жыл бұрын
Thank you !
@AnthonyDavid59
@AnthonyDavid59 5 жыл бұрын
Well done Jess. This needs to be said, it needs to be listened to, and it needs to change.
@noconcept5735
@noconcept5735 5 жыл бұрын
Yeah I'd rather watch his face while he types commands and describes things on the screen too
@stryker2k2
@stryker2k2 4 жыл бұрын
Agreed. It's a GREAT talk... but HORRIBLE video capture decision by CrikeyCon.
@bentton7311
@bentton7311 5 жыл бұрын
This was very entertaining.
@aissatmohamed5221
@aissatmohamed5221 5 жыл бұрын
okay, this is epic
@craigwaterhouse8009
@craigwaterhouse8009 6 жыл бұрын
the best
@qpart
@qpart 6 жыл бұрын
nice
@aussieklutz
@aussieklutz 6 жыл бұрын
Https://github.com/aussieklutz/hd-mitm/ for the project files.
@lordparody8692
@lordparody8692 6 жыл бұрын
Winner winner, chicken dinner! :D
@AlphaZeroOmega
@AlphaZeroOmega 6 жыл бұрын
Starts at 0:00 ;D 7:40 Gunter Ollmann - Cloud effects on security professionals *Edited with adjusted times
@CrikeyCon
@CrikeyCon 6 жыл бұрын
Thanks, we've trimmed some of the start off. It was our first live stream, there was a bit more waiting around than expected.
@AlphaZeroOmega
@AlphaZeroOmega 6 жыл бұрын
All good. I understand live streams don't always go according to plan. :) Are there more to come? I noticed all sessions seemed to be recorded today. I didn't get to see some myself.
@CrikeyCon
@CrikeyCon 6 жыл бұрын
Yes, more talks will go up in the next few weeks.
@dirtdogscrapping3267
@dirtdogscrapping3267 7 жыл бұрын
Guy seams more like a comedian then a lock picker!!
@32-dt7er
@32-dt7er 7 жыл бұрын
Audio is a let down.
@logicstv
@logicstv 8 жыл бұрын
would love see the keylogger one
@NetPwn
@NetPwn 9 жыл бұрын
Great Vid!