Pegasus internals (33c3)

  Рет қаралды 27,089

media.ccc.de

media.ccc.de

Күн бұрын

media.ccc.de/v...
Technical Teardown of the Pegasus malware and Trident exploit chain
This talk will take an in-depth look at the technical capabilities and vulnerabilities used by Pegasus. We will focus on Pegasus’s features and the exploit chain Pegasus used called Trident. Attendees will learn about Pegasus’s use of 0-days, obfuscation, encryption, function hooking, and its ability to go unnoticed. We will present our detailed technical analysis that covers each payload stage of Pegasus including its exploit chain and the various 0-day vulnerabilities that the toolkit was using to jailbreak a device. After this talk attendees will have learned all of the technical details about Pegasus and Trident and how the vulnerabilities we found were patched.
['Max Bazaliy']

Пікірлер
The World’s Most Terrifying Spyware | Investigators
10:20
VICE News
Рет қаралды 1,3 МЛН
Hackers Abuse Zero-Day Exploit for CrushFTP
31:49
John Hammond
Рет қаралды 69 М.
Running With Bigger And Bigger Lunchlys
00:18
MrBeast
Рет қаралды 125 МЛН
Watermelon magic box! #shorts by Leisi Crazy
00:20
Leisi Crazy
Рет қаралды 80 МЛН
Bootstraping a slightly more secure laptop (33c3)
47:43
media.ccc.de
Рет қаралды 9 М.
The Spy in Your Phone | Al Jazeera World
47:07
Al Jazeera English
Рет қаралды 5 МЛН
Detect Hackers & Malware on your Computer (literally for free)
16:38
Tactics of Physical Pen Testers
44:17
freeCodeCamp Talks
Рет қаралды 905 М.
Invisible surveillance: How spyware is secretly hacking smartphones
9:31
Malware development 101: Creating your first ever MALWARE
28:00
Leet Cipher
Рет қаралды 356 М.
Catching NSO Group's Pegasus spyware
45:04
media.ccc.de
Рет қаралды 16 М.
The Tragedy of systemd
47:18
linux.conf.au
Рет қаралды 1,1 МЛН
Running With Bigger And Bigger Lunchlys
00:18
MrBeast
Рет қаралды 125 МЛН