Actividad
-
Llega a la alta dirección con conocimientos de MIT. Inscríbete ahora https://lnkd.in/ejfETP35
Llega a la alta dirección con conocimientos de MIT. Inscríbete ahora https://lnkd.in/ejfETP35
Recomendado por Fernando Russ
-
O fato de Go ser mais enxuto sem diversas APIs prontas na minha opinião tem pontos fortes e fracos (como quase tudo). Em um código que eu estava…
O fato de Go ser mais enxuto sem diversas APIs prontas na minha opinião tem pontos fortes e fracos (como quase tudo). Em um código que eu estava…
Recomendado por Fernando Russ
Experiencia y educación
Publicaciones
-
Breaking Vault
Ekoparty
Mobile devices became a central part of today's daily life. Every mobile
offering comprises a complex ecosystem of technologies interacting to
provide solutions to the increasing need of having ubiquitous
availability of business-critical data. This trend speeds business
decisions and processes but at the same time poses big security challenges.
A recurring question when deciding to "go mobile" is: Is it a wise
decision having so many business secrets in your pocket? For…Mobile devices became a central part of today's daily life. Every mobile
offering comprises a complex ecosystem of technologies interacting to
provide solutions to the increasing need of having ubiquitous
availability of business-critical data. This trend speeds business
decisions and processes but at the same time poses big security challenges.
A recurring question when deciding to "go mobile" is: Is it a wise
decision having so many business secrets in your pocket? For sure it is
not if you don't take any measure to guarantee the security of the data
at rest.
To tackle this, several companies offer solutions to cryptographically
protect the business information stored inside our mobile devices.
During this talk we will focus on an SAP framework called DataVault, one
of the key components of the SAP Mobile Platform (SMP) which implements
a secure storage for confidential information using proven strong
cryptography.
In particular, we will present and exploit live a series of
vulnerabilities on this framework which allow an attacker to partially
decrypt the content of the secure key-value storage without the prior
knowledge of any secret or key. Also, leveraging these
vulnerabilities, we will show a practical cloning attack against the SAP
Authenticator, a time-based one-time (TOTP)
two-factor authenticator app based on the RFC6238. -
SAP Mobile: Attack & Defense
Blackhat Mobile Security Summit
Mobile devices are becoming ubiquitous in the infrastructure of any modern organization. As part of this industry's push towards remotely accessible business functions, business critical applications vendors (such as SAP) are also getting on board. In the last few years, SAP has been developing a series of solutions which covers different aspects of the mobile landscape from managing devices, to integrating custom mobile applications to the business logic of the SAP systems.
The SAP…Mobile devices are becoming ubiquitous in the infrastructure of any modern organization. As part of this industry's push towards remotely accessible business functions, business critical applications vendors (such as SAP) are also getting on board. In the last few years, SAP has been developing a series of solutions which covers different aspects of the mobile landscape from managing devices, to integrating custom mobile applications to the business logic of the SAP systems.
The SAP Mobile Platform is composed of a group of complex third-party technologies, both open source and in-house developments. Moreover, bridging naturally isolated ecosystems like SAP to a mobile device infrastructure, poses challenging tasks from a security perspective. Such challenges include securing communications, choosing an adequate authentication mechanism, defining the proper data encryption requirements and taking care of an adequate device provisioning. An organization has to have in mind all of these concepts and increasingly complex attack scenarios while building a secure mobile infrastructure.
If an attacker is able to exploit vulnerabilities exposing any of the previously mentioned attack vectors, he would be able to perform sabotage, espionage or fraud attacks to the company. This could lead to a full compromise of the backend system, which manage not only critical business data, but also confidential and sensitive information with the liability implications of this.Otros autoresVer publicación -
Snakes on a Payload
Ekoparty
Traditionally understand 'binary operation' as the discipline to turn a vulnerability in the ability to run arbitrary code on the U about the victim. If we consider this as the "stage 1" then one can think of different ways to move to a "stage 2", this being able to use services that gives the operating system to any process, such as managing memory, sockets, the system files, etc.. The restrictions of the current Stage 2 technologies in commercial products are well described by Dino Dai Zovi…
Traditionally understand 'binary operation' as the discipline to turn a vulnerability in the ability to run arbitrary code on the U about the victim. If we consider this as the "stage 1" then one can think of different ways to move to a "stage 2", this being able to use services that gives the operating system to any process, such as managing memory, sockets, the system files, etc.. The restrictions of the current Stage 2 technologies in commercial products are well described by Dino Dai Zovi WOOT in a publication in 2007, as a solution proposes a sketch of stage 2 then bootstrapea a VM. Motivated by this, and given the current restrictions of these techniques when developing tools for post-operation, began to investigate the problems and possibilities to develop a payload that bootstrapee a VM. In this talk we will tell about the problems of development of the payload using a VM that runs a subset of Python, and how we solved that. Also we will be releasing a license opensource toolchain needed to build a payload using this technique, and demonstrate how we use it to build the prototype on an exploit payload.
Otros autoresVer publicación -
Automated SQL Ownage Techniques
CanSecWest
This talk is about web application security assessment. In particular, in this talk we set to improve the assessment process for SQL injection vulnerabilities by providing the means to discard exogenous "false positive" alarms and confirm exploitable vulnerabilities.
We propose a black-box technique to detect and exploit SQL injection vulnerabilities. The exploitation provides an interface to execute arbitrary SQL code through them. Therefore, we are able to thoroughly assess the impact of…This talk is about web application security assessment. In particular, in this talk we set to improve the assessment process for SQL injection vulnerabilities by providing the means to discard exogenous "false positive" alarms and confirm exploitable vulnerabilities.
We propose a black-box technique to detect and exploit SQL injection vulnerabilities. The exploitation provides an interface to execute arbitrary SQL code through them. Therefore, we are able to thoroughly assess the impact of the vulnerability (e.g., understand what a hacker can do).
The core of this talk is in examining the difficulties that appear while trying to expose vulnerability and how to do a black-box interaction to automatically construct an exploit. -
¿Sueñan las serpientes electrónicas?
PyCon Argentina
Con la proliferación de servicios de cloud-computing se han vuelto comunes los ambientes de ejecución limitados, acotando la potencia del software implementable y forzando un modelo de ejecución no continuo (lineal/imperativa). En esta charla presentaremos una implementación tentativa de continuations en pure-python, y mostraremos algunos de los problemas y sus soluciones que encontramos desarrollando este framework.
Otros autoresVer publicación -
Agent-oriented SQL Abuse
PacSec
In this talk we focus in analyzing the problems underlying the attack and penetration in the web application scenario, more specifically, using SQL Injection vulnerabilities we introduce the concept of SQL Agent.
The SQL Agent acts as an efficient translator from SQL to HTTP requests that later exploit a SQL Injection on a given web application.
Otros autoresVer publicación -
Zombie 2.0
Hack.lu
We analyzed the problems underlying the attack and penetration in the web application scenario. We produce effective solutions to the payload engineering problem in the web-application scenario which allow the attacker/penetration tester to analyze the scenario and build his exploits abstracting the burdensome details in executing an attack.
Otros autoresVer publicación
Patentes
-
System and Method for Providing Application Penetration Testing
Expedida US US8484738 B2
A system and method provide application penetration testing. The system contains logic configured to find at least one vulnerability in the application so as to gain access to data associated with the application, logic configured to confirm the vulnerability and determine if the application can be compromised, and logic configured to compromise and analyze the application by extracting or manipulating data from a database associated with the application. In addition, the method provides for…
A system and method provide application penetration testing. The system contains logic configured to find at least one vulnerability in the application so as to gain access to data associated with the application, logic configured to confirm the vulnerability and determine if the application can be compromised, and logic configured to compromise and analyze the application by extracting or manipulating data from a database associated with the application. In addition, the method provides for penetration testing of a target by: receiving at least one confirmed vulnerability of the target; receiving a method for compromising the confirmed vulnerability of the target; installing a network agent on the target in accordance with the method, wherein the network agent allows a penetration tester to execute arbitrary operating system commands on the target; and executing the arbitrary operating system commands on the target to analyze risk to which the target may be exposed.
Otros inventoresVer patente -
System and method for providing network penetration testing
Expedida US US8365289 B2
A system and method for providing network penetration testing from an end- computer is provided. The method includes the step of determining at least one of a version of a Web browser of a target computer, information associated with an end- that uses the target computer, and applications running on the target computer. The method also includes the steps of determining exploits that are associated with the running applications and that can be used to compromise the target…
A system and method for providing network penetration testing from an end- computer is provided. The method includes the step of determining at least one of a version of a Web browser of a target computer, information associated with an end- that uses the target computer, and applications running on the target computer. The method also includes the steps of determining exploits that are associated with the running applications and that can be used to compromise the target computer, and launching the exploits to compromise the target computer. Network penetration testing may also be provided by performing the steps of determining an operating system of a target computer, selecting one of a group of modules to use in detecting services of the target computer, and detecting the services of the target computer.
Otros inventores -
-
System and method for providing automated computer security compromise as a service
Presentada el US PCT/US2012/040911
A system for providing automated computer security compromise as a service, contains a web server having a web front end running on the web server. The Web server has stored therein pentest definitions. A command and control component processes the pentest definitions, builds pentest task tickets and reporting task tickets, and monitors at least one penetration tester component and/or at least one report generator component. The command and control component interacts with a cloud computing…
A system for providing automated computer security compromise as a service, contains a web server having a web front end running on the web server. The Web server has stored therein pentest definitions. A command and control component processes the pentest definitions, builds pentest task tickets and reporting task tickets, and monitors at least one penetration tester component and/or at least one report generator component. The command and control component interacts with a cloud computing environment to scale up or down the number of penetration tester components and the number of report generator components, and assigns task tickets to the penetration tester and report generator components. At least one penetration tester component runs penetration testing modules available inside the penetration testing framework as instructed by the pentest task tickets. At least one reporter generator component generates reports based on the reporting tasks tickets generated by the command and control service.
Otros inventoresVer patente
Proyectos
-
Groundworkstech/submicron
Repository of resources and documentation to build and experiment with deep-submicron VLSI backdoors and other malicious hardware modifications.
Otros creadoresVer proyecto -
PyBFD - A Python interface to the GNU Binary File Descriptor (BFD) library.
It's a complete (or at least tries to be) wrapper around the low level functionality provided by GNU Binutils libopcodes and libbfd. This allows the to manipulate all the ed architectures and file formats that Binutils tools does.
Otros creadoresVer proyecto
Idiomas
-
Spanish
Competencia bilingüe o nativa
-
English
Competencia básica profesional
Más actividad de Fernando
-
Obtenga asesoramiento profesional de Kuck Baxter, líderes en inmigración empresarial, para proteger y expandir su compañía en Estados Unidos.
Obtenga asesoramiento profesional de Kuck Baxter, líderes en inmigración empresarial, para proteger y expandir su compañía en Estados Unidos.
Recomendado por Fernando Russ
-
Siguiendo con el programa de "concienticemos hasta que los estafadores tengan que buscarse un trabajo honesto", les recuerdo que Whatsapp es otro…
Siguiendo con el programa de "concienticemos hasta que los estafadores tengan que buscarse un trabajo honesto", les recuerdo que Whatsapp es otro…
Recomendado por Fernando Russ
-
Muchos creen en la premisa que el perfil Fullstack no existe, pero el problema es cuando en proyectos de las empresas usan su "propio framework" (con…
Muchos creen en la premisa que el perfil Fullstack no existe, pero el problema es cuando en proyectos de las empresas usan su "propio framework" (con…
Recomendado por Fernando Russ
-
Hasta pronto, LinkedIn. Desconecto la app al menos hasta septiembre, para centrarme en proyectos que requieren mi atención plena. Durante este…
Hasta pronto, LinkedIn. Desconecto la app al menos hasta septiembre, para centrarme en proyectos que requieren mi atención plena. Durante este…
Recomendado por Fernando Russ
-
🔥 Nucleimonst3r 🤯😱 🤜 Nucleimonst3r is a high-speed vulnerability scanner designed for Bug Bounty Hunters and Red Teamers who need to quickly and…
🔥 Nucleimonst3r 🤯😱 🤜 Nucleimonst3r is a high-speed vulnerability scanner designed for Bug Bounty Hunters and Red Teamers who need to quickly and…
Recomendado por Fernando Russ
-
Hello Linkdin fam, today on telegram the sale of another type of Ransomware was announced, this time known as "NoBit". The curious thing is that the…
Hello Linkdin fam, today on telegram the sale of another type of Ransomware was announced, this time known as "NoBit". The curious thing is that the…
Recomendado por Fernando Russ
-
Un día como hoy, pero de hace 20 años, un Lunes 28 de julio del 2003 empezaba a trabajar en IT. Esta profesión que por suerte encontré, o me…
Un día como hoy, pero de hace 20 años, un Lunes 28 de julio del 2003 empezaba a trabajar en IT. Esta profesión que por suerte encontré, o me…
Recomendado por Fernando Russ
-
Secure, transparent, committed - that's #TestifySec. See how we're addressing recent #security audit findings for the #CNCF in-toto project in our…
Secure, transparent, committed - that's #TestifySec. See how we're addressing recent #security audit findings for the #CNCF in-toto project in our…
Recomendado por Fernando Russ
-
Looking for a cost-effective option to run AdTech workloads? With AWS Graviton-based Amazon EC2 instances, DeviceAtlas, a market-leading device…
Looking for a cost-effective option to run AdTech workloads? With AWS Graviton-based Amazon EC2 instances, DeviceAtlas, a market-leading device…
Recomendado por Fernando Russ
-
See why industrial leaders choose Proficy software for enterprise-wide manufacturing operations management, automation, and optimization.
See why industrial leaders choose Proficy software for enterprise-wide manufacturing operations management, automation, and optimization.
Recomendado por Fernando Russ
-
Era el año 2010, y Santiago Videla presentaba su tesis en la FaMAF, UNC. Esa tesis, dirigida por Laura Alonso Alemany, bajo la idea de roberto daniel…
Era el año 2010, y Santiago Videla presentaba su tesis en la FaMAF, UNC. Esa tesis, dirigida por Laura Alonso Alemany, bajo la idea de roberto daniel…
Recomendado por Fernando Russ
Perfiles similares
Otras personas con el nombre de Fernando Russ
Hay 1 persona más con el nombre de Fernando Russ en LinkedIn
Ver a otras personas con el nombre de Fernando Russ