Articles with tag: Exploitation
POSTED BY: census / 05.12.2018

Black Hat Europe 2018

CENSUS is participating at this year's Black Hat Europe conference with a presentation by researcher Zisis Sialveras on VMWare guest-to-host exploitation entitled Straight Outta VMware: Modern Exploitation of the SVGA Device for Guest-to-Host Escapes.


POSTED BY: census / 01.10.2018

Microsoft BlueHat v18

CENSUS participated in the Microsoft BlueHat v18 Security Conference with a presentation on a VMware guest-to-host escape methodology. The presentation was delivered by CENSUS researcher Zisis Sialveras and was entitled "Straight Outta VMware: Modern exploitation of the SVGA device for guest-to-host escapes".


POSTED BY: argp / 11.01.2018

iOS kernel exploitation archaeology (34th Chaos Communication Congress)

On December 27th 2017 I presented at the 34th Chaos Communication Congress (34C3) a talk on the technical details and the process of reverse engineering and re-implementation of the evasi0n7 jailbreak's main kernel exploit, titled "iOS kernel exploitation archaeology". Actually, I gave the same talk at the WarCon private event earlier in 2017 (June), but since there were no proceedings or slides published there, I thought it would be a good talk for 34C3! Both events, 34C3 and WarCon, were very well organized, but also very different both in content and of course size. Many thanks to the organizers and volunteers of both these awesome European conferences!


POSTED BY: argp / 22.08.2017

shadow v2 public release

About four months ago (April 2017), Vasilis Tsaousoglou and myself presented our work on exploiting Android's libc allocator at the 2017 INFILTRATE conference (Miami, Florida). Since version 5.0, Android has adopted the jemalloc allocator as its default libc malloc(3) implementation. For our talk we extended our previously released jemalloc heap exploration and exploitation tool called 'shadow' to support Android (both ARM32 and ARM64), and demonstrated its use on understanding the impact of libc heap corruption vulnerabilities. We also presented new jemalloc/Android-specific exploitation techniques for double free and arbitrary free vulnerabilities.