2008 Presentations


  1. Security Applications for Emulation - Silvio Cesare
  2. Intelligent Web Fuzzing - Neil Archibald
  3. Attacking the Vista Heap - Ben Hawkes
  4. Targetted OLE2 Attacks, The New Black - Peter Taylor
  5. Attacking Rich Internet Applications - Kuza55, Stefano Di Paola
  6. Introduction to Reverse Engineering - Ashley Fox
  7. Now you see it, now you don't! - Obfuscation '08 style... - Nishad Herath
  8. Heaps about Heaps - Brett Moore
  9. Uninitialized Variables - Finding, Exploiting, Automating - Daniel Hodson
  10. JavaScript is Harder than you Think - Paul Ducklin
  11. Enterprise Security, Softer than the foam on my Frappuccino - LUMC Crew
  12. Pimping: Forensic Style - Adam Daniel
  13. SCADA Penetration Testing: Hacking Modbus Enabled Devices - Daniel Grzelak
  14. Browser Memory Protection Bypasses in Vista - Mark Dowd
  15. None More Black: The Dark Side of SEO - Roberto Suggi Liverani
  16. Ghost Recon: Subverting Local Networks - Berne Campbell
  17. Browser Rider: Your way to Fun Browsing - Nik Mijatovic, Ben Mosse
  18. GPU Powered Malware - Daniel Reynaud
  19. googless - Christian Heinrich
  20. Netscreen of the Dead: Developing A Trojaned Firmware for Juniper Netscreen Appliances - Graeme Neilson

top ^

Presentation Details

This is the current list of presentations for Ruxcon 2008

Security Applications for Emulation - Silvio Cesare

Silvio will talk about some applications of emulation in computer security, having spent several months developing an automated malware unpacker using a machine and OS level emulator written from scratch. He will also talk about other applications of emulation, including a fork of an existing whole system emulator, QEMU, which in the spirit of Valgrind detects out of bounds heap access in the Linux Kernel, and will be released at Ruxcon.

Bio:

Silvio Cesare is a computer security enthusiast. Living in his home of Australia, he has previously worked in the field of security, in France and America. His interests are in systems level security. Silvio has spoken at security conferences including CanSecWest, Blackhat and Ruxcon 2003 on the topics of Reverse Engineering and Opensource Kernel Auditing. At present, Silvio is completing a degree in IT and is due to graduate this year.

top ^

Intelligent Web Fuzzing - Neil Archibald

Technology has existed to fuzz test Web applications for a while now. However, a common problem exists with all of the current solutions. Some vulnerabilities are easily visible with fuzz testing, however what about the bugs which aren't? These can easily slip through the cracks.

This presentation proposes technology which can be used to monitor a web application while the fuzz testing is in progress. This way typically non visible bugs can be detected and exploited (or fixed).

During this talk, a virtual machine will be demoed and released which implements this technology.


Bio:

Neil Archibald is a security researcher from Sydney, Australia. He has spoken at Ruxcon for the past few years on a variety of topics as well as at Syscan/Securecon and several other conferences. In the past he has released a few papers on technical content, as well as co-authored 2 books. He holds a strong interest in software security and system internals.

top ^

Attacking the Vista Heap - Ben Hawkes

This presentation explores the cutting edge of heap exploitation theory and practice on Windows Vista. The focus is on finding previously unknown attack vectors resulting from memory corruption on the heap. These include techniques for controlling execution flow by attacking only the heap implementation and not the application itself, and techniques for attacking the application in conjunction with the heap. Additionally, several design changes to further improve the security of the Vista heap will be suggested.

The heap is the userland component in charge of dynamic memory management. It is present and used to some extent in every Windows Vista process. Memory corruption on the heap (heap overflow) is common, seen in nearly every application and making up a large portion of reported vulnerabilities. With Windows Vista, Microsoft introduced several security features to the heap, effectively hardening it from classic heap overflow exploit techniques.


Bio:

Ben Hawkes is an independent researcher and contractor from New Zealand specializing in computer security and cryptanalysis. He is studying mathematics and computer science at Victoria University of Wellington, New Zealand and has previously spoken at both Black Hat USA and Ruxcon.

top ^

Targetted OLE2 Attacks, The New Black - Peter Taylor

Macros are dead, but exploited word docs are on the rise. Targetted OLE2 is the new black, managing to evade AV scanners, pass thru gateway mail scanners, mingle amongst the documents of regular business use and can be crafted to look particularly enticing to the intended victim.

New exploits appear to be being discovered almost on a monthly basis making perimeter scanning an ongoing game of catchup. The underlying idea is simple - deliver a malicious object to an intended victim, compromise their account in as stealthy manner as possible and then erase all trace.

This presentation will give a detailed analysis of how such an attack is structured and demonstrate some exploit-independent methods for verifying the integrity of suspect documents.


Bio:

Peter is a senior virus researcher at Sophos. Pete has been reversing mainly x86 code for more than a decade, and now focuses primarily on unpackers, pro-active detection and other "interesting" malware trends.

top ^

Attacking Rich Internet Applications - Kuza55, Stefano Di Paola

In recent years rich internet applications (RIAs) have become the mainstay of large internet applications and are becoming increasingly attractive to the industry due to their similarity to desktop applications. Furthermore their user of exsting web technologies such as HTTP, HTML/XML and Javascript/Actionscript make them attractive options to companies with existing web developers.

Unfortunately the use of existing technologies brings with it the burden of existing ways to write vulnerable code, but adds yet more ways. This presentation will examine the largely under-researched topic of RIA security in the hopes of illustrating how the complex interactions with their executing environment, and general bad security practices, can lead to exploitable applications. Specifically we will focus on Javascript, Google Gears, AIR and Flash applications.


Bio:

Alex "kuza55" K. has been an active member of the Web application security research community for the past several years, publishing several well-regarded papers and presenting his findings recently at the 24th Chaos Communications Congress computer security conference in Berlin and at Microsoft's Bluehat conference in Seattle. Alex is an Associate at SIFT where he gets paid to break things, and in his spare time as an independent security researcher, breaks things for the fun of it.

Stefano Di Paola is the CTO and a cofounder of Minded Security, where he is responsible for Research and Development Lab. Prior to founding Minded Security, Stefano was a freelance security consultant, working for several private and public companies. He also worked in collaboration with University of Florence at the Faculty of Computer Engineering. In the past years he released several advisories including the ones that are not publicly disclosed but patched and several open source tools (such as SWFIntruder). He has also contributed to OWASP testing guide and is also the Research & Development Director of OWASP Italian Chapter. Stefano has participated to several international talk as speaker @ 23rd CCC,Owasp Appsec2k7 S.Jose, Google Tech Talk and others.

top ^

Introduction to Reverse Engineering - Ashley Fox

Reverse Engineering has many beneficial applications in addressing today's security problems. Reverse Engineering can however be a difficult field to break into and apply productively. The presentation will cover introductory material on reversing tools and techniques with a focus on current real world security problems.

Bio:

Ashley Fox is a security professional living in Canberra. Ashley is interested computer security research in areas such as reverse engineering, malware analysis, exploit development and vulnerability discovery.

top ^

Now you see it, now you don't! - Obfuscation '08 style... - Nishad Herath

In a new twist to an old tale, we will explore the bleeding edge of spy vs. spy obfuscation battlefront in this exciting presentation.

Sure, we know all about the usual suspects who pop up wherever there's obfuscated code. Say packed and encrypted PE sections, tons of hostility towards poor little debuggers, on-demand runtime decryption, seemingly absent imports that are runtime redirected, SEH gymnastics, crazy kernel mode trickery, replicated API voodoo and last but not the least, much dreaded virtual machine implementations; all seasoned players, growing wiser with age (it seems).

So yes, we do need bigger and better tools to deal with these guys, especially some elaborate VM implementations and clever ring-0 trickery. But we're not going to talk about these guys here. Well, not too much anyway (okay, fine, enough already - so we might show a trick or two that we use to deal with some of these guys). But really, all these techniques are designed to prevent the reconstruction of original code that is executed at runtime. Now tell us please, what's the point of reconstructing original code if we can't make a reasonable approximation as to it's intended functionality?

Well, that's exactly what we'll be talking about! We're going to talk about some interesting ideas that throw a spanner in the works when it comes to any "reasonable comprehension of the intended functionality of a given chunk of code". Both from static and dynamic analysis standpoints no less! We will also explore some tools and techniques that will assist us in cutting through to the essence of such code that doesn't want to be comprehended, to boot.

Now all the glitz and glam aside, why do we think all this is important? Well for starters, more and more bad guys are relying on increasingly sophisticated obfuscation techniques to keep their evil plans secret from the good guys. Better analysis tools can never really hurt in this department. Besides, let's face it, even good guys have things they want to keep secret (or so I've been told). Turns out obfuscation can help! Better the obfuscation, the safer it feels apparently. Yes, it is a strange world we live in. But it's a really fun place to be!

So if you feel like hearing our thoughts or sharing your thoughts, or perhaps even both, the presentation is the place to be. And yes, it is better than day time TV for sure. We don't judge, so everyone is welcome; even the DRM boys :-p


Bio:

top ^

Heaps about Heaps - Brett Moore

This presentation will briefly explain old heap exploitation techniques, but focus on detailing various new methods that can be used when overwriting heap structures. Including; Improved lookaside list manipulation Is the write 4 really, really dead? Tricks to flip the heap and stack Factors in heap layout It will be technical and an understanding of the heap is advised. It will include a step by step demonstration of working a published advisory through to a working exploit. Including; Reproducing the vulnerability Locating the cause of the vulnerability Overwriting a function pointer Turning off DEP and gaining execution flow

Bio:

Having conducted vulnerability assessments, network reviews, and penetration tests for the majority of the large companies in New Zealand, Insomnia founder Brett Moore brings with him over six years experience in information security. During this time, Brett has also worked with companies such as SUN Microsystems, Skype Limited and Microsoft Corporation by reporting and helping to fix security vulnerabilities in their products. Brett has released numerous whitepapers and technical postings related to security issues and has spoken at security conferences both locally and overseas, including BlackHat, Defcon, Ruxcon, and the invitation only Microsoft internal security conference called BlueHat.

top ^

Uninitialized Variables - Finding, Exploiting, Automating - Daniel Hodson

Easy to spot vulnerabilities are slowly becoming extinct in large code bases. As such, security researchers need to have more tools in their arsenal when conducting a code audit. This talk covers a bug class known as "Uninitialized Variables" and focuses on the common code constructs they can appear in. It will explain relatively new methodologies to determine the exploitability of such bugs, and generalize exploit development. Finally a look at automating the identification and testing phases is given (with the bonus of a new tool release!!).

Bio:

Daniel Hodson likes to spend his spare time with a beer in one hand and... a beer in the other. He's been known to bust out the robot in break dance off's and likes rocking out to metal. A little more professionally, Daniel likes to spend his free time learning exploitation techniques and contributing to online community projects (http://www.overthewire.org). FM rocks his sockets.

top ^

JavaScript is Harder than you Think - Paul Ducklin

Everyone knows that reversing Windows malware can be really hard. One of the problems is that you just have a stream of binary machine code. You almost never have source -- unless you have friends in low places, of course -- and you don't even get debug symbols to help you along.

In contrast, it seems that browser-borne malware written in JavaScript should be easy in comparison. There is no standardised JavaScript VM, so you never get bytecode. You always have the source! So how hard can it be to analyse and to understand?

The answer is that JavaScript can be absurdly complex, and often it is. Indeed, web-borne JavaScript can very easily use cryptographic obfuscation tricks which are impossible to unravel without knowing the specific context in which the code appears, each and every time it appears.

For example, have a crack at this one (the code is deformatted to make it dysfunctional here):

+--------------------+
|h=location[unescape(|
|'%68%72e%66')];e="es|
|arhpyekehtsisiht".sp|
|lit("").reverse().jo|
|in("");p="";for(i=0x|
|b;i<0x1d;i++){k=h.ch|
|arCodeAt(i+11);if(k>|
|96&&k<123){k+=e.char|
|CodeAt(i-11)-97;if(k|
|>122)k-=26}p+=String|
|.fromCharCode(k)}doc|
|ument.write('\74h1\7|
|6'+p+'\74\x2Fh1\76')|
+--------------------+

Can you tell what it is yet? How do you decide whether it's good or bad? How do you unravel it in a reasonable time?

Easy. Come to this talk and find out.


Bio:

Paul Ducklin is Head of Technology, Asia Pacific at Sophos in Sydney. He has been part of the anti-malware research scene for almost 20 years. He joined Sophos in 1995 from the South African Council for Scientific and Industrial Research (similar to Australia's CSIRO). Paul is an experienced and entertaining presenter, regularly giving talks at events world-wide. He loves his subject, enjoys sharing his knowledge -- he was singled out by one IT journalist as "the most passionate security presenter" at RSA2008 in San Francisco -- and doesn't believe in PowerPoint.

top ^

Enterprise Security, Softer than the foam on my Frappuccino - LUMC Crew

Everyone knows that Enterprises are leading the way forward in insecurity. This will be a rambling and disjointed talk covering some of the reasons why I think that is, how they can help themselves (please no more 'hardened' security appliances), and how I bust them up when I'm doing a penetration test.

Bio:

The Lower Upper Middle Class (LUMC) crew comes straight from the ghetto of the eastern suburbz. Presenting this talk will be EFFy D who when not popping capz in wannabe's asses works for Securus Global ganking enterprise networkz for mad bling. EFFy D has talked at Kiwicon previously on Hypervisor Rootkitz.

top ^

SCADA Penetration Testing: Hacking Modbus Enabled Devices - Daniel Grzelak

Modbus is a roughly 30 year old application messaging protocol for interacting with Supervisory Control and Data Acquisition (SCADA) devices. While people have been interested in SCADA security for a while now, specific information only started being published recently and there are now a few publicly-available testing toolkits.

Bio:

Daniel Grzelak is a technical analyst and security researcher at Australian information security consulting firm, SIFT. He has a strong background in software development and a passion for information security research. Daniel holds a Bachelor of Computer Science and Information Technology from the University of Sydney. Additionally, he achieved a 4th place in his third grade athletics carnival, narrowly missing out on a ribbon.

top ^

Browser Memory Protection Bypasses in Vista - Mark Dowd

Over the past several years, Microsoft has implemented a number of memory protection mechanisms with the goal of preventing the reliable exploitation of common software vulnerabilities on the Windows platform. Protection mechanisms such as GS, SafeSEH, DEP and ASLR complicate the exploitation of many memory corruption vulnerabilities and at first sight present an insurmountable obstacle for exploit developers.

This talk aims to present exploitation methodologies against this increasingly complex target. I will demonstrate how the inherent design limitations of the protection mechanisms in Windows Vista make them ineffective for preventing the exploitation of memory corruption vulnerabilities in browsers and other client applications.

Each of the aforementioned protections will be briefly introduced and its design limitations will be discussed. I will present a variety of techniques that can be used to bypass the protections and achieve reliable remote code execution in many different circumstances. Finally, I will discuss what Microsoft can do to increase the effectiveness of the memory protections at the expense of annoying Vista users even more.


Bio:

Mark Dowd is an expert in application security, specializing primarily in host and server based Operating Systems. His professional experience includes several years as a senior researcher at ISS, where he uncovered a variety of major vulnerabilities in ubiquitous Internet software. He also worked as a Principal Security Architect for McAfee, where he was responsible for internal code audits, secure programming classes, and undertaking new security initiatives. Mark has also co-authored a book on the subject of application security named "The Art of Software Security Asssessment", and has spoken at several industry-recognized conferences.

top ^

None More Black: The Dark Side of SEO - Roberto Suggi

Search Engine Optimisation (SEO) is the art of increasing your page rank and thusly your visibility on major search engines, with the aim of increasing revenue and building reputation of your business/political organisation/vanity site. What we will focus on, however, are a collection of quasi-legal and negatively blackhat tekneeqs for engineering the opposite effect. Rather than increasing your own profile, we will focus on diminishing and destroying that of a rival.

This talk contains cutting edge research performed at great personal risk to the presenter which will demonstrate how many common and esoteric vulnerabilities present throughout the internet today can be used to make you the internet bully you always wanted to be.


Bio:

Roberto Suggi Liverani is a security consultant and researcher for Security-Assessment.com where he spends his time terrorising people in suits and innocent web applications. He is the founder of the OWASP NZ chapter and he has discovered vulnerabilities in major web applications. His current research is focused on online marketing systems, web spam and black SEO.

top ^

Ghost Recon: Subverting Local Networks

This presentation demonstrates both passive and active attacks that can cause havoc on networks that fail to implement comprehensive countermeasures. These attacks include topology discovery, fingerprinting, traffic redirection, MitM, and others. An understanding of networking fundamentals is assumed.

Bio:

Berne Campbell is a security professional at a large telecommunications company. He has a strong background in network security and enjoys both software and protocol vulnerability research.

top ^

Browser Rider: Your way to Fun Browsing - Nik Mijatovic, Ben Mosse

Browser exploitation is in fashion but it doesn't seem that there's a popular tool to build and run attacks. Browser Rider will try to fill the gap by providing a framework to build, deploy and manage payloads that exploit the browser. This project aims on the long term to provide a powerful, simple and flexible interface to any client side attack for hackers.

Bio:

Nik has been working in the security industry for several years. Prior to that he did an educational journey in Switzerland towards his degree in computer science. Nik presented on several occasions on OWASP chapters, last year's SecureCon and this year on AusCert together with Ben. In his free time Nik does full contact martial arts...cos its just all about security!

Ben is a web application security fanatic currently working as a pentester for SIFT. Previously this year, Ben has presented at the national OWASP conference on Javascript worms and has delivered a workshop on Web 2.0 Insecurities as AusCert. During his free time Ben practices Parkour because he can't get enough of extreme challenges.

top ^

GPU Powered Malware - Daniel Reynaud

There is an increasing interest in Graphics Processing Units for general-purpose programming, due to their processing power and massively parallel design. Therefore, most consumer graphics hardware are now fully programmable using either Nvidia's CUDA toolkit or AMD/ATI Stream SDK.

This presentation will give an analysis of how the GPU can be used by malware as an anti-reverse engineering platform, with examples using the CUDA technology. With CUDA, the GPU is fully programmable in C, but the resulting device program can't be debugged because Nvidia's GPUs do not support this feature natively. As a result, a malware analyst has to use static analysis against the device code in order to understand the malware. But this task is harder with GPU code than with traditional binaries since the source of a CUDA program is compiled to undocumented microcode (and therefore unsupported by standard disassemblers such as IDA Pro).

Finally, this presentation will also assess the technical feasability of an unpacker written fully in device code.


Bio:

After a 4-years military training in Signals and Electronic Warfare, Daniel Reynaud is now a PhD student in Nancy (France), focusing on the analysis of malware and deobfuscation techniques. He has a background in reverse engineering and finding vulnerabilities in unconventional platforms, such as Java, mobile phones and Firefox extensions. Always looking for new challenges, he is now training to become a cage fighter.

top ^

googless - Christian Heinrich

At Ruxcon 2008 cmlh will be releasing the:

1. "Speak English or Die" Google Translate Workaround.
2. Google SOAP Search API "Key Ring" Workaround.
3. "TCP Input Text" Proof of Concept (PoC) which implements the Google SOAP Search API to extract TCP Ports from Google Search Results as input for nmap and netcat.


Bio:

cmlh is a Project Leader of the OWASP "Google Hacking" Project and contributed to the "Spiders/Robots/Crawlers" and "Search Engine Reconnaissance" sections of the OWASP Testing Guide v3 and presented at the recent OWASP Conferences in Australia and USA (New York).

cmlh has also presented at Ruxcon 2005, Ruxcon 2006, SecTor 2008 and ToorCon X.

top ^

Netscreen of the Dead: Developing a Trojaned Firmware for Juniper Netscreen Appliances - Graeme Neilson

Core network security appliances are often considered to be more secure than traditional systems because the operating systems they run are supplied as obfuscated, undocumented binary firmware. Juniper Inc supply a complete range of security appliances that all run a closed source operating system called ScreenOS which they supply as firmware.

This presentation will detail how a Juniper Netscreen can be completely subverted by installation of attacker modified firmware. This firmware is effectively an embedded rootkit. Details of how to reverse engineer and then modify the closed source firmware will be supplied and there will be a live demonstration of installing and using trojaned firmware on a Netscreen appliance.


Bio:

Graeme Neilson is a security consultant and researcher for Aura Software Security. Originally from Scotland he now lives in New Zealand. He specialises in network infrastructure security and has been reverse engineering for over 10 years. Graeme has previously spoken at Kiwicon.