DC9723 January 2018 Meeting, in collaboration with OWASP IL

DC9723/OWASPIL January 2018 Meeting
When: 28 of January, 2018 from 18:30 to 22:00
Where: SafeBreach Offices in Tel-Aviv (Yosef Karo 18, 4th floor, Tel Aviv.)

This month we are doing a joint meeting with OWASP IL.

Agenda:

Brief Introduction
OWASP IL updates
Jumping into Heaven’s Gate – Yarden Shafir
Breaking obfuscations – Tomer Zait

As always, the talks are free and there is no need to register. Come and bring your friends.
The talks will be uploaded to youtube a week after the meeting.
You can watch the previous talks at https://www.dc9723.org

*We need more talks, please consider submitting a talk for the next DC9723 meeting. For more details and questions, please contact cfp@dc9723.org

Title:
Jumping into Heaven’s Gate – Yarden Shafir

Abstract:

The old days of 32bit applications are long bygone, nowadays most Operating Systems are running in a 64bit environment, requiring 64bit applications.
So how can a 64bit Operating System run a 32bit legacy Application?
The native 64bit environment cannot directly support the execution of a 32bit Application.
32bit Applications expect several surrounding pillars which help it perform necessary actions,
and those no longer exist in a 64bit environment.
However, in practice Windows contains many secrets, and one of those secrets is the WoW64
subsystem.
The Wow64 Subsystem supplies a natural environment for the legacy 32bit Application and enables anyone to run them on newer 64bit Operating Systems without any trouble.
How the subsystem actually does this remains a question to many.
Any Application, whatever its type, begins its execution in 64bit mode.
The Operating System then relentlessly moves forward to the 32bit world by loading the WoW64 Subsystem, in order to let the 32bit Application execute freely.
In this talk we will dive into the WoW64 Subsystem and explain how a 32bit Application performs 64bit (native) system calls.

We will also see how it is possible to exploit this mechanism in order to create smarter malware that evade Next-Generation and Previous-Generation AV products.

Title:
Breaking obfuscations – Tomer Zait

Abstract:
During my journey in deobfuscating malicious scripts, such as JavaScript and PowerShell, I have realized that there is a lack of good one-stop-shop solution. Researchers still perform this tedious task manually while encountering exploit kits, web injects, PowerShell and python post exploitation agents as well as different legitimate JavaScript products.
During this Session I will demonstrate working with deobfuscation tools I created, of-the-shelf tools and how to create similar tools on your own . In addition, I will touch Android deobfuscation in practice and the obfuscation attack surface each language provides.

DC9723 December Meeting

DC9723 December Meeting
When: 19 of December, 2017 from 19:00 to 22:00
Where: SafeBreach Offices in Tel-Aviv (Yosef Karo 18, 4th floor, Tel Aviv.)
Agenda:

Mystique & Automating Infection Marker Extraction – Dana Yosifovich

From 0 to Infinity – Guy

As always, the talks are free and there is no need to register. Come and bring your friends.
The talks will be uploaded to youtube a week after the meeting.
You can watch the previous talks at https://www.dc9723.org

*We need more talks, please consider submitting a talk for the next DC9723 meeting. For more details and questions, please contact cfp@dc9723.org

Title:
Mystique & Automating Infection Marker Extraction – Dana Yosifovich

Abstract:

It is quite common for malware to mark their territory on the endpoint; leaving a sign to avoid infecting the system more than once. If the malicious program notices this infection marker, it will usually terminate. In this talk, I will explain how this behavior can be used to prevent the malware from attacking the machine. I will also show a demo of a tool that automatically generates a list of mutexes that could be used as “vaccines” against the sample (if there are any).

Extended Abstract:

Many organizations already have a process for obtaining IOCs when performing incident response or malware forensics. This talk focuses on techniques for employing indicators for not only detecting infections, but preventing the compromise in the first place. This approach, which entails vaccinating systems against malware on endpoints, can help incident response and threat hunting teams to contain infections.

While malware can implement the marker using many methods, including generating specific files or registry keys, a common approach to marking the machine involves abusing mutex objects. While legitimate processes use mutexes to synchronize access to shared resources on the endpoint, malware can use them to determine whether it is already present on the endpoint.

It’s possible to vaccinate endpoints against infections that involve infection markers by fooling malware into believing that it’s already on the system. However, how could organizations determine whether the specimen relies on infection markers and, what these markers are? This is where Mystique comes in. This open source tool automatically determines the likely mutex-based markers that might be used to immunize endpoints against the malware specimen. Mystique begins by initially executing the user-supplied sample in an analysis sandbox, retrieves the created mutex objects. Then it runs the malware again, this time generating the extracted mutexes, and checks whether generated mutex objects were effective at changing the sample’s execution flow. Mystique’s output is the list of mutexes that can be used to vaccinate endpoints against the malware. Developers can import Mystique and use in other scripts. For example, the user can create a script that downloads malware from a malware repository and automatically feeds those files to mystique.
Mystique is written in Python and integrates with the Cuckoo Sandbox to “detonate” the user-supplied specimen in a controlled environment to observe active mutex objects and their effects on the malicious program.

 

Title:

From 0 to Infinity – Guy

Abstract:

The Baseband Processor in modern Cellhpones remains one of the least understood elements, yet is incredibly trusted in order to interact with the Cellular Network as well as with the Application Processor.

This talk aims to shed some light on these dark corner, and provide advice for other reverse engineers trying to explore this area.

This talk focuses on Apple’s iPhone Platform, since their recent move back to the Infineon chipset makes research a lot easier, compared to the previous dominating Hexagon chipset.

I will start by describing the preliminary firmware analysis, during which I created rudimentary map of its different parts and their respective role.
I will proceed revealing the secrets hidden inside the Baseband.
I will conclude by presenting a research environment that I have developed that great simplifies the process of diffing, interacting and fuzzing the Infineon SoC.

Side note: Not dropping any 0days, this is a methodology and process talk.

DC9723 November 2017 Meeting

DC9723 November Meeting
When: 14 of November, 2017 from 19:00 to 22:00
Where: SafeBreach Offices in Tel-Aviv (Yosef Karo 18, 4th floor, Tel Aviv.) NOTICE DIFFERENT LOCATION!
Agenda:
From “One Country – One Floppy” to “Startup Nation” – Inbar Raz & Eden Shochat
As always, the talks are free and there is no need to register. Come and bring your friends.
The talks will be uploaded to youtube a week after the meeting.
You can watch the previous talks at https://www.dc9723.org
*We need more talks, please consider submitting a talk for the next DC9723 meeting. For more details and questions, please contact cfp@dc9723.org
Title:
New Techniques to Exploit NTLM Flaws for Privilege Escalation – Yaron Zinar
Abstract:
Millions of networks are relying on Windows authentication protocols to secure their logins, and consequently the network’s integrity. As these protocols are a popular target for attacks, such as NTLM-Relay, Microsoft went through great efforts to mitigate and secure them. However, they didn’t go far enough. In this talk we will show how NTLM continues to be the weakest link in Windows authentication and poses a serious security threat to enterprise security. We’ll shed new perspectives and discoveries on the NTLM-Relay attack, explore its anatomy, the wide variety of protocols that are vulnerable and how they are exploited in the wild. We will provide an overview of the security enhancements and configuration options implemented by Microsoft in order to thwart attacks. We will present and demonstrate CVE-2017-8563 and explain why it can be used bypass all existing security mitigations and why you are all still exposed to this vulnerability. Finally, we will suggest different detection and protection methods that can be used to overcome NTLM flaws in order to monitor and prevent potential credential theft.
Title:
From “One Country – One Floppy” to “Startup Nation” – the story of the early days of the Israeli hacking community, and the journey towards today’s vibrant startup scene – Inbar Raz & Eden Shochat
Abstract:
The late 80’s and early 90’s played a pivotal role in the forming of the Israeli tech scene as we know it today, producing companies like Checkpoint, Waze, Wix, Mobileye, Viber and billions of dollars in fundraising and exits. The people who would later build that industry were in anywhere from elementary school to high school, and their paths included some of the best hacking stories of the time (certainly in the eyes of the locals). The combination of extremely expensive Internet and international dial system, non-existent legal enforcement and a lagging national phone company could not prevent dozens of hungry-for-knowledge kids from teaching themselves the dark arts of reversing, hacking, cracking, phreaking and even carding. The world looked completely different back then and we have some great stories for you. We will cover the evolution of the many-years-later-to-be-named-Cyber community, including personal stories from nearly all categories. Come listen how the Israeli Cyber “empire” was born, 25 years ago, from the perspectives of 2:401/100 and 2:401/100.1.

DC9723 October 2017 Meeting

NOTICE DIFFERENT LOCATION (SafeBreach)!
DC9723 October 2017 Meeting

When: 24 of October, 2017 from 19:00 to 22:00
Where: SafeBreach Offices in Tel-Aviv (Yosef Karo 18, 4th floor, Tel Aviv.) NOTICE DIFFERENT LOCATION!
Agenda:

“Review of the Ukraine cyber attack 2015” – Guy Barnhart-Magen SLIDES
 “Tales from the Dark Side” – Dor Tumarkin SLIDES
"NATO war games, updating crypto vulns in IDs, and other stuff" - Hillar Aarelaid

As always, the talks are free and there is no need to register. Come and bring your friends.

*We need more talks, please consider submitting a talk for the next DC9723 meeting. For more details and questions, please contact cfp@dc9723.org

Abstracts:
Review of the Ukraine cyber attack 2015 – Guy Barnhart-Magen
The cyber-attack on the Ukraine power grid was unique in that it was public, and not that it happened.
In this talk, I will discuss some unique characteristics of the attack, its structure, and the possible ramifications.
As this attack was attributed as a “cyber” act of war, the interest in the techniques and the methodology used is considerable.

Tales from the Dark Side – Dor Tumarkin
Information Security is a battle fought on many varied fronts.
Join Dor, a researcher and former consultant, as he shares stories of his team’s astounding victories against the feeble forces of good in “Tales from the Dark Side”.

NATO war games, updating crypto vulns in IDs, and other stuff – Hillar Aarelaid

Hillar is visiting from abroad. He has a lot to share with us. This is last minute so we don’t have a full abstract, but he will speak about planning security around online elections, patching physical IDs for SHA256, and running war games for NATO

August Meeting 2017

DC9723 Next Meeting (we are back!):
When: 22 of August, 2017 from 19:00 to 22:00
Where: Checkpoint Offices in Tel-Aviv (HaSolelim 5 St, Tel Aviv.)
Agenda:

“Passive fingerprinting of HTTP/2 clients” – Elad Shuster
“Hacked in Translation” – Omri Herscovici and Omer Gull

As always, the talks are free and there is no need to register. Come and bring your friends.

*Update – The presentations will be linked here soon.

*We need more talks, please consider submitting a talk for the next DC9723 meeting. For more details and questions, please contact cfp@dc9723.org