Тёмный

Gerald Doussot - State of DNS Rebinding Attacks & Singularity of Origin - DEF CON 27 Conference 

DEFCONConference
Подписаться 306 тыс.
Просмотров 7 тыс.
50% 1

Do you want to know how you can exploit DNS rebinding 10x faster, bypass prevention mechanisms, interactively browse the victim's internal network, and automate the whole process during your next red team exercise?
This talk will teach you how and give you an easy-to-use tool to do it.
First, we will cover in detail the subtleties that make DNS rebinding attacks more effective in practice, including techniques and operational conditions that make it faster and more reliable. We'll also explain how to bypass commonly recommended security controls, dispelling attack and defense misconceptions that have been disseminated in blogs and social media posts.
This talk will include a number of demos using Singularity, our open source DNS rebinding attack framework that includes all the parts you need to get started pwning today, including:
Remote code execution and exfiltration payloads for common dev tools and software
Practical scanning and automation techniques to maximize the chance of controlling targeted services
We'll also show an interesting post-exploitation technique that allows you to browse a victim browser network environment via the attacker's browser without the use of HTTP proxies.
You'll leave this talk with the knowledge and tools to immediately start finding and exploiting DNS rebinding bugs.
Gerald Doussot
Gerald Doussot is a Principal Security Consultant at NCC Group, with over 20 years experience in information technology. Gerald has undertaken defensive and offensive security roles, including the design, implementation and management of security solutions, software development, integration and security Testing.
Roger Meyer
Roger Meyer is a Principal Security Engineer at NCC Group with extensive experience in managing and leading complex engagements. Roger specializes in web application security, network penetration testing, configuration reviews, and secure software development and architecture design.

Опубликовано:

 

21 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 4   
@i_am_dumb1070
@i_am_dumb1070 Год назад
Learned a lot thankyou wonderful lesson
@webwondererinacage
@webwondererinacage Год назад
Awesome guys. Great talk extremely useful
@Jango1989
@Jango1989 4 года назад
Great talk and great research!
@adamproof3440
@adamproof3440 4 года назад
great tool !!!! thanks a lot
Далее
Paint Projects
00:17
Просмотров 2,3 млн
DNS Cache Poisoning - Computerphile
11:04
Просмотров 305 тыс.
New Techniques for Split-Second DNS Rebinding
31:20
Просмотров 1,8 тыс.
The Tragedy of systemd
47:18
Просмотров 1,1 млн
The Same Origin Policy - Hacker History
12:19
Просмотров 108 тыс.
Paint Projects
00:17
Просмотров 2,3 млн