Archives: Events
CONNECTION DROPPED – leBREAK
CONNECTION DROPPED – leBREAK
CONNECTION DROPPED – leBREAK
LUNCH TIME !
LUNCH TIME !
Kernel Panic!
Phear not, take a seat, welcome to leHACK, the oldest and wildest french hacking conference.
Bot-In-The-Middle Attacks – LLM’s and App Security
We have seen tens of thousands of posts, blogs, articles, and more about the threat of 'Artificial Intelligence' in the news - and the reality is that many companies, from Microsoft and Google down to small App Dev houses and Academic Researchers, are exploring how to integrate this technology into applications... so for better or […]
How EDRs work and how to bypass them
I would like to speak about how Endpoint Detection and Response (EDR) softwares work and how to defeat every protection, such as AMSI, Sysmon, DLL Hooking or ETW. The goal of this talk is to allow a good understanding of these protections IN FRENCH, because many presentations on this subject are only in english. I […]
Remplacer la WIN32API pour l’injection de processus
Les injections de processus sont des techniques appréciées, car elles permettent d'exécuter des charges malveillantes à l'insu des utilisateurs et des outils de défense. Cependant, les solutions de type EDR ont fortement impacté la fiabilité de ces techniques. Ce talk a pour but de présenter une méthode sortant des patterns standard de l'injection de processus […]
Systèmes transmagnétiques : top ou bottom ?
Pwned by abandonware
Have you ever wanted to play an old DOS/Windows video game on your Linux laptop? It can be done using for example Wine or DosBox, and then downloading .EXE abandonware from public websites. But, did you know that this good oldie could have been quite easily backdoored, in order to get remote code execution on […]
Parasitage de serveur for fun and profit
Les serveurs et applications web reposent sur des technologies qui peuvent dans certains cas être détournées et utilisées à des fins non-prévues. Il est ainsi possible de parasiter un serveur ou une application en y stockant des données sans que ces derniers ne s'en rendent compte tout en permettant leur récupération dans un délai plus […]
Cutting ties of a vinyl cutter
Cricut made a pretty bad move in March 2021 when they decided to limit the use of their crafting machines to users who did not subscribe to a paid account. The community rebelled and Cricut stepped back, while their PR department tried to extinguish the bad buzz. But something has started. People are more and […]
Inside Black Hat: Defending One of the ‘Most Hostile Networks in the World’
The network at Black Hat is like no other network in the world. On an average network defenders spend most of their day looking for something, anything, malicious. It's a bit like looking for a needle in a haystack. But what if the majority of the traffic on your network is malicious? What if it's […]
LAMBDA Malware: The Hidden Threat in Excel Spreadsheets
This lecture will discuss a new technique discovered by the Mimecast Research Team. This technique can be used for embedding malicious scripts in Excel documents using one of the latest Excel new features - LAMBDA, bringing new life to a previously considered dead threat. In the lecture, it will be shown how easily the technique […]
KeePass triggers are dead, long live KeePass triggers!
Souvent utilisé pour stocker les secrets critiques du système d'information, KeePass est une cible de choix pour les attaquants. Parmi ses nombreuses fonctionnalités, le logiciel propose un système d’événement-action-condition permettant l'automatisation de tâches complexes. Ce dernier fut rapidement détourné afin d'extraire les mots de passe par simple modification d'un fichier de configuration. Particulièrement discrète, cette […]
Project Memoria and OT:ICEFALL : Finding and Exploiting Vulnerabilities in OT networks
In this talk, we will discuss two large vulnerability research projects we did in the past few years and how they come together in the form of sophisticated OT/ICS attacks. Project Memoria was the largest study into the security of embedded TCP/IP stacks. These stacks are used by hundreds of IT, OT and IoT vendors. […]
ADDS Persistance – Un conseil, brûlez tout
Les services de domaine Active Directory offrent un large éventail de techniques de latéralisation et d'escalade de privilèges. Les professionnels de la sécurité offensive éthique apprécient souvent AD-DS à cet égard. Mais qu'en est-il de la persistance ? Nous verrons ensemble que lors de la compromission du domaine AD d'une entreprise, il vaut probablement mieux […]
DPAPI – Don’t Put Administration Passwords In
La DPAPI est une API des OS Windows mise à disposition des développeurs pour stocker facilement les secrets des utilisateurs, sans qu'ils aient à se prendre la tête avec la partie crypto. Pour les développeurs, il suffit d'utiliser les fonctions Protect et Unprotect pour respectivement stocker de manière sécurisé les données et accéder aux données […]
Vulnerability analysis of a Bluetooth Low Energy padlock
The objective of this presentation is to analyze the security of a connected padlock using the Bluetooth Low Energy protocol, which is widely used in the Internet of Things (IoT). This study has been conducted in the context of a student project, co-supervised by INSA Toulouse and EURECOM, and highlights several critical security issues in […]
ZFS Raiders of the Lost File
"A nice summer day I decided that I did not wish to keep my old hard drive. Before throwing it into junk I started the format process. It was after a couple of minutes that I realized I had not backed up an important file. Inside that file was a poem. I jumped over the […]
Physical intrusion for fun and profit
Lors de missions de type intrusion physique, les auditeurs se retrouvent face à différents blocages physiques. Le but de cette présentation a pour objectif de démontrer que nombreux de ces dispositifs de blocage peuvent être contournés facilement et sans entraînement. En effet, qui ne sest jamais retrouvé face à un Digicode en métal ? Une […]
Du driver Windows à l’EDR
De nos jours les antivirus, pour détecter les malware, reposent principalement sur l'analyse dynamique. Pour analyser le comportement d'un malware, il est nécessaire que les solutions d'antivirus aient le moyen d'intercepter ses actions. Pour cela, Microsoft a ajouté au sein de l'OS Windows ce que l'on appelle des kernel callbacks. Ces kernels callbacks sont en […]
Trusted Types: DOM XSS Protection at Scale
DOM XSS continues to be the most critical threat to web security. Our current best defense against DOM XSS is Trusted Types, a browser-based runtime feature to limit the uses of DOM APIs (and limit the possibility of DOM injection). We will discuss our approach to using Trusted Types to protect billions of our users, […]
Metawar: The Art and Science of Conflict in the Metaverse
Reality Distortion, Dis-information Warfare, Cognitive Infrastructure Manipulation, and Hacking Control of the Human Experience for God & Country, Power & Profit By Winn Schwartau, the "Civilian Architect of Information Warfare" (Commodore Pat Tyrrell OBE Royal Navy, 1996) and author of Information Warfare: Chaos on the Information Superhighway A long time ago, on June 27, 1991, […]
Prototype Pollution and where to find them
Prototype pollution is a vulnerability in JavaScript applications that can have varying impacts depending on the complexity and nature of the affected app. It exploits the prototype inheritance feature of JavaScript, which allows objects to inherit properties and methods. By manipulating the prototype chain of an object, an attacker can introduce malicious properties, leading to […]
Practical Threat Hunting: Straight Facts and Substantial Impacts
A lot has been said about threat hunting, by a lot of people. They'll tell you how difficult it is, what products you should use, how to automate the pain away, and how you should've been doing this all along. But here's the thing...you have been doing it all along. The concepts and techniques aren't […]