DeepSec 2011: The security of non-executable files

Speaker: Daniel Pistelli

This talk presents an overview of the security risks in non-executable files such as PDF, rich media and office documents. The extent and the roots of the issues (not only in terms of infection).

The approaches to store and hide, in order to avoid detection, malicious data inside these file formats and what can be done in terms of prevention. Also, ramifications for the embedded sector. The talk aims to range from global considerations to individual cases.

Main category

Information security & security management

Subcategory

Information security

Subcategory

Security management

Main category

Disclosure & vulnerability

Subcategory

Vulnerability

Be surprised

I know what I'm looking for

Related videos

NOTACON 3: Network printer hacking

NOTACON 3: Network printer hacking

This presentation will cover techniques that can be used to control and extract data from network printers.

Building the DEF CON Network

Building the DEF CON Network

We will cover on how the DEF CON network team builds a network from scratch, in three days with very little budget.

Rootkits: What they are, and how to find them

Rootkits: What they are, and how to find them

This class will focus on understanding how rootkits work, and what tools can be used to help find them.

28C3: Towards a single secure European cyberspace?

28C3: Towards a single secure European cyberspace?

The “European Great Firewall” was the way that European civil rights organizations has addressed the proposal to create a “single European cyberspace”. This lecture will describe a vulnerability that the proposal reveals in the power structures of the European and world governance.

RFID hacking

RFID hacking

Learn about the security and social aspects of RFID technology

DEF CON 20: Demorpheus: Getting rid of polymorphic shellcodes in your network

DEF CON 20: Demorpheus: Getting rid of polymorphic shellcodes in your network

In this presentation we propose an approach and hybrid shellcode detection method, aimed at early detection and filtering of unknown 0-day exploits at the network level.

DEF CON 19: Hacking and forensicating an Oracle database server

DEF CON 19: Hacking and forensicating an Oracle database server

David Litchfield is recognized as one of the world’s leading authorities on database security.

DeepSec 2013: Mobile Fail: Cracking open “secure” Android containers

DeepSec 2013: Mobile Fail: Cracking open “secure” Android containers

I will discuss specific design flaws in the security of “secure” Applications that promise to keep your data / password safe and sound should the device fall into the wrong hands.

Remote hack on Damn Vulnerable Linux

Remote hack on Damn Vulnerable Linux

This video is made by EXALT and shows a reenactment of a remote hack he did on a Damn Vulnerable Linux (DVL) box.

DEF CON 14: US-VISIT: Raping personal privacy since 2004

DEF CON 14: US-VISIT: Raping personal privacy since 2004

In this talk, the technology and capabilities of US-VISIT will be explained in detail; weaknesses in the system will be explored, and the consequences of such a system will be considered.

DeepSec 2013: Uncovering your trails

DeepSec 2013: Uncovering your trails

The presenters showed that Bluetooth is alive and kicking, exploit-wise. A new tool called Bluedriving is presented to capture and store the position and information of bluetooth devices.

OWASP AppSecUSA 2011: Ghosts of XSS past, present and future

OWASP AppSecUSA 2011: Ghosts of XSS past, present and future

This talk will discuss the past methods used for XSS defence that were only partially effective. Learning from these lessons, will also discuss present day defensive methodologies that are effective, but place an undue burden on the developer.

DeepSec 2011: The security of non-executable files

DeepSec 2011: The security of non-executable files

This talk presents an overview of the security risks in non-executable files such as PDF, rich media and office documents. The talk aims to range from global considerations to individual cases.

Toying with barcodes

Toying with barcodes

Ever wondered what is in these blocks of squares on postal packages, letters and tickets?

OWASP AppSecUSA 2011: Simplifying threat modelling

OWASP AppSecUSA 2011: Simplifying threat modelling

Architects and developers often perceive threat modeling as being too difficult. During this talk, we’ll attempt to bust these myths and show how organizations can incrementally obtain better results.

22C3: Attacking the IPv6 protocol suite

22C3: Attacking the IPv6 protocol suite

After a short introduction on the differences of IPv4 to IPv6, the weaknesses in IPv6 will be shown. Highlight of the talk is the presentation of the THC-IPV6 Attack Toolkit.

DeepSec 2010: Circumventing common Pitfalls when auditing sourcecode for security vulnerabilities

DeepSec 2010: Circumventing common Pitfalls when auditing sourcecode for security vulnerabilities

This presentation describes the technologies behind advanced static and dynamic vulnerability analysis tools. We conclude with a discussion of new ways to ensure that bugs get fixed before it’s too late.

ICS Cybersecurity Advanced Training Day 4

ICS Cybersecurity Advanced Training Day 4

The vlog about the fourth day of the 2011 International ICS Cybersecurity Advanced Training. This day is what it’s all about, the Blue Team / Red Team exercise.

Introduction to Trusted Computing

Introduction to Trusted Computing

This course is an introduction to the fundamental technologies behind Trusted Computing. You will learn what Trusted Platform Modules (TPMs) are and what capabilities they can provide both at an in-depth technical level and in an enterprise context.

Hacking WPA2 key: Evil Twin method

Hacking WPA2 key: Evil Twin method

We deauthenticate the victim from his own wireless network and wait until he connects to our access point. When the victim connects, he is redirected to a service page asking for the WPA-2 key.

OWASP AppSecUSA 2012: Bug bounty programs

OWASP AppSecUSA 2012: Bug bounty programs

A panel discussion with Michael Coates (Mozilla), Chris Evans (Google), Jeremiah Grossman (WhiteHat Security), Adam Mein (Google), Alex Rice (Facebook)

DeepSec 2007: Browser hijacking

DeepSec 2007: Browser hijacking

This talk introduces Trabbler, the first highly versatile “cross site scripting Trojan”. In the talk, we will discuss Trabbler ́s architecture and code and give practical examples of its application.

ShmooCon 2014: ISP’s unauthenticated SOAP service

ShmooCon 2014: ISP’s unauthenticated SOAP service

This presentation is meant to encourage individuals to put the applications and software that they may use on their own home or small business networks under the research microscope.

SOURCE Boston 2009: Splunk

SOURCE Boston 2009: Splunk

Learn how Fortune 500 and government organizations are using Splunk to protect themselves against fraud and misuse, and as a valuable tool in their network security and compliance reporting toolboxes.

Secure code reviews magic or art? A simplified approach to secure code reviews

Secure code reviews magic or art? A simplified approach to secure code reviews

This presentation will delve into the science and process behind secure code review and will continue to discuss a simplified approach to secure code review

DeepSec 2009: Building the next generation IDS engine

DeepSec 2009: Building the next generation IDS engine

This talk is about the project to build the next generation IDS engine. The engine has been released under the name Suricata and can be downloaded from the Open Information Security Foundation (OISF) web site.

Share This