Fernando Russ

Argentina
1 mil seguidores Más de 500 os

Unirse para ver el perfil

Actividad

Unirse para ver toda la actividad

Experiencia y educación

  • XBOW

Mira la experiencia completa de Fernando

Mira su cargo, antigüedad y más

o

Al hacer clic en «Continuar» para unirte o iniciar sesión, aceptas las Condiciones de uso, la Política de privacidad y la Política de cookies de LinkedIn.

Publicaciones

  • Breaking Vault

    Ekoparty

    Mobile devices became a central part of today's daily life. Every mobile
    offering comprises a complex ecosystem of technologies interacting to
    provide solutions to the increasing need of having ubiquitous
    availability of business-critical data. This trend speeds business
    decisions and processes but at the same time poses big security challenges.

    A recurring question when deciding to "go mobile" is: Is it a wise
    decision having so many business secrets in your pocket? For…

    Mobile devices became a central part of today's daily life. Every mobile
    offering comprises a complex ecosystem of technologies interacting to
    provide solutions to the increasing need of having ubiquitous
    availability of business-critical data. This trend speeds business
    decisions and processes but at the same time poses big security challenges.

    A recurring question when deciding to "go mobile" is: Is it a wise
    decision having so many business secrets in your pocket? For sure it is
    not if you don't take any measure to guarantee the security of the data
    at rest.

    To tackle this, several companies offer solutions to cryptographically
    protect the business information stored inside our mobile devices.

    During this talk we will focus on an SAP framework called DataVault, one
    of the key components of the SAP Mobile Platform (SMP) which implements
    a secure storage for confidential information using proven strong
    cryptography.

    In particular, we will present and exploit live a series of
    vulnerabilities on this framework which allow an attacker to partially
    decrypt the content of the secure key-value storage without the prior
    knowledge of any secret or key. Also, leveraging these
    vulnerabilities, we will show a practical cloning attack against the SAP
    Authenticator, a time-based one-time (TOTP)
    two-factor authenticator app based on the RFC6238.

  • SAP Mobile: Attack & Defense

    Blackhat Mobile Security Summit

    Mobile devices are becoming ubiquitous in the infrastructure of any modern organization. As part of this industry's push towards remotely accessible business functions, business critical applications vendors (such as SAP) are also getting on board. In the last few years, SAP has been developing a series of solutions which covers different aspects of the mobile landscape from managing devices, to integrating custom mobile applications to the business logic of the SAP systems.

    The SAP…

    Mobile devices are becoming ubiquitous in the infrastructure of any modern organization. As part of this industry's push towards remotely accessible business functions, business critical applications vendors (such as SAP) are also getting on board. In the last few years, SAP has been developing a series of solutions which covers different aspects of the mobile landscape from managing devices, to integrating custom mobile applications to the business logic of the SAP systems.

    The SAP Mobile Platform is composed of a group of complex third-party technologies, both open source and in-house developments. Moreover, bridging naturally isolated ecosystems like SAP to a mobile device infrastructure, poses challenging tasks from a security perspective. Such challenges include securing communications, choosing an adequate authentication mechanism, defining the proper data encryption requirements and taking care of an adequate device provisioning. An organization has to have in mind all of these concepts and increasingly complex attack scenarios while building a secure mobile infrastructure.

    If an attacker is able to exploit vulnerabilities exposing any of the previously mentioned attack vectors, he would be able to perform sabotage, espionage or fraud attacks to the company. This could lead to a full compromise of the backend system, which manage not only critical business data, but also confidential and sensitive information with the liability implications of this.

    Otros autores
    Ver publicación
  • Snakes on a Payload

    Ekoparty

    Traditionally understand 'binary operation' as the discipline to turn a vulnerability in the ability to run arbitrary code on the U about the victim. If we consider this as the "stage 1" then one can think of different ways to move to a "stage 2", this being able to use services that gives the operating system to any process, such as managing memory, sockets, the system files, etc.. The restrictions of the current Stage 2 technologies in commercial products are well described by Dino Dai Zovi…

    Traditionally understand 'binary operation' as the discipline to turn a vulnerability in the ability to run arbitrary code on the U about the victim. If we consider this as the "stage 1" then one can think of different ways to move to a "stage 2", this being able to use services that gives the operating system to any process, such as managing memory, sockets, the system files, etc.. The restrictions of the current Stage 2 technologies in commercial products are well described by Dino Dai Zovi WOOT in a publication in 2007, as a solution proposes a sketch of stage 2 then bootstrapea a VM. Motivated by this, and given the current restrictions of these techniques when developing tools for post-operation, began to investigate the problems and possibilities to develop a payload that bootstrapee a VM. In this talk we will tell about the problems of development of the payload using a VM that runs a subset of Python, and how we solved that. Also we will be releasing a license opensource toolchain needed to build a payload using this technique, and demonstrate how we use it to build the prototype on an exploit payload.

    Otros autores
    Ver publicación
  • Automated SQL Ownage Techniques

    CanSecWest

    This talk is about web application security assessment. In particular, in this talk we set to improve the assessment process for SQL injection vulnerabilities by providing the means to discard exogenous "false positive" alarms and confirm exploitable vulnerabilities.
    We propose a black-box technique to detect and exploit SQL injection vulnerabilities. The exploitation provides an interface to execute arbitrary SQL code through them. Therefore, we are able to thoroughly assess the impact of…

    This talk is about web application security assessment. In particular, in this talk we set to improve the assessment process for SQL injection vulnerabilities by providing the means to discard exogenous "false positive" alarms and confirm exploitable vulnerabilities.
    We propose a black-box technique to detect and exploit SQL injection vulnerabilities. The exploitation provides an interface to execute arbitrary SQL code through them. Therefore, we are able to thoroughly assess the impact of the vulnerability (e.g., understand what a hacker can do).
    The core of this talk is in examining the difficulties that appear while trying to expose vulnerability and how to do a black-box interaction to automatically construct an exploit.

    Ver publicación
  • ¿Sueñan las serpientes electrónicas?

    PyCon Argentina

    Con la proliferación de servicios de cloud-computing se han vuelto comunes los ambientes de ejecución limitados, acotando la potencia del software implementable y forzando un modelo de ejecución no continuo (lineal/imperativa). En esta charla presentaremos una implementación tentativa de continuations en pure-python, y mostraremos algunos de los problemas y sus soluciones que encontramos desarrollando este framework.

    Otros autores
    Ver publicación
  • Agent-oriented SQL Abuse

    PacSec

    In this talk we focus in analyzing the problems underlying the attack and penetration in the web application scenario, more specifically, using SQL Injection vulnerabilities we introduce the concept of SQL Agent.
    The SQL Agent acts as an efficient translator from SQL to HTTP requests that later exploit a SQL Injection on a given web application.

    Otros autores
    Ver publicación
  • Zombie 2.0

    Hack.lu

    We analyzed the problems underlying the attack and penetration in the web application scenario. We produce effective solutions to the payload engineering problem in the web-application scenario which allow the attacker/penetration tester to analyze the scenario and build his exploits abstracting the burdensome details in executing an attack.

    Otros autores
    Ver publicación

Patentes

  • System and Method for Fast Probabilistic Querying Role-Based Access Control Systems

    Presentada el US 15/254,136

    Otros inventores
  • System and Method for Providing Application Penetration Testing

    Expedida US US8484738 B2

    A system and method provide application penetration testing. The system contains logic configured to find at least one vulnerability in the application so as to gain access to data associated with the application, logic configured to confirm the vulnerability and determine if the application can be compromised, and logic configured to compromise and analyze the application by extracting or manipulating data from a database associated with the application. In addition, the method provides for…

    A system and method provide application penetration testing. The system contains logic configured to find at least one vulnerability in the application so as to gain access to data associated with the application, logic configured to confirm the vulnerability and determine if the application can be compromised, and logic configured to compromise and analyze the application by extracting or manipulating data from a database associated with the application. In addition, the method provides for penetration testing of a target by: receiving at least one confirmed vulnerability of the target; receiving a method for compromising the confirmed vulnerability of the target; installing a network agent on the target in accordance with the method, wherein the network agent allows a penetration tester to execute arbitrary operating system commands on the target; and executing the arbitrary operating system commands on the target to analyze risk to which the target may be exposed.

    Otros inventores
    Ver patente
  • System and method for providing network penetration testing

    Expedida US US8365289 B2

    A system and method for providing network penetration testing from an end- computer is provided. The method includes the step of determining at least one of a version of a Web browser of a target computer, information associated with an end- that uses the target computer, and applications running on the target computer. The method also includes the steps of determining exploits that are associated with the running applications and that can be used to compromise the target…

    A system and method for providing network penetration testing from an end- computer is provided. The method includes the step of determining at least one of a version of a Web browser of a target computer, information associated with an end- that uses the target computer, and applications running on the target computer. The method also includes the steps of determining exploits that are associated with the running applications and that can be used to compromise the target computer, and launching the exploits to compromise the target computer. Network penetration testing may also be provided by performing the steps of determining an operating system of a target computer, selecting one of a group of modules to use in detecting services of the target computer, and detecting the services of the target computer.

    Otros inventores
    • Alejandro David Weil
    • Matias Ernesto Eissler
    • Francisco Javier Dibar
    • Hector Adrian Manrique
    Ver patente
  • System and method for providing automated computer security compromise as a service

    Presentada el US PCT/US2012/040911

    A system for providing automated computer security compromise as a service, contains a web server having a web front end running on the web server. The Web server has stored therein pentest definitions. A command and control component processes the pentest definitions, builds pentest task tickets and reporting task tickets, and monitors at least one penetration tester component and/or at least one report generator component. The command and control component interacts with a cloud computing…

    A system for providing automated computer security compromise as a service, contains a web server having a web front end running on the web server. The Web server has stored therein pentest definitions. A command and control component processes the pentest definitions, builds pentest task tickets and reporting task tickets, and monitors at least one penetration tester component and/or at least one report generator component. The command and control component interacts with a cloud computing environment to scale up or down the number of penetration tester components and the number of report generator components, and assigns task tickets to the penetration tester and report generator components. At least one penetration tester component runs penetration testing modules available inside the penetration testing framework as instructed by the pentest task tickets. At least one reporter generator component generates reports based on the reporting tasks tickets generated by the command and control service.

    Otros inventores
    Ver patente

Proyectos

Idiomas

  • Spanish

    Competencia bilingüe o nativa

  • English

    Competencia básica profesional

Más actividad de Fernando

Ver el perfil completo de Fernando

  • Descubrir a quién conocéis en común
  • Conseguir una presentación
  • ar con Fernando directamente
Unirse para ver el perfil completo

Perfiles similares

Otras personas con el nombre de Fernando Russ

Añade nuevas aptitudes con estos cursos