DiscoverChaos Computer Club - All Creatures Welcome (mp3)The Layman's Guide to Zero-Day Engineering (35c3)
The Layman's Guide to Zero-Day Engineering (35c3)

The Layman's Guide to Zero-Day Engineering (35c3)

Update: 2018-12-27
Share

Description

There's a certain allure to zero-day exploits. At the apex of the security industry, these elusive technologies are engineered by a persistent few to open doors of software systems that were never meant to exist. We go behind-the-scenes to provide an inside look at the zero-day development lifecycle, breaking common misconceptions regarding this increasingly difficult tradecraft.

In this talk, we will discuss the engineering process behind a zero-day that was used to exploit Apple Safari at PWN2OWN 2018. Rather than placing an intense focus on the technical challenges required to weaponize this particular chain of vulnerabilities, we reflect on this experience as a case-study of the analytical approach we employ to attack unfamiliar software targets. In addition to these methods, we will contrast how this process differs from CTF/Wargame challenges, highlighting the path one can take to graduate from casual enthusiast to security professional.

https://ret2.io
about this event: https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9979.html
Comments 
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

The Layman's Guide to Zero-Day Engineering (35c3)

The Layman's Guide to Zero-Day Engineering (35c3)

Markus Gaasedelen, Amy (itszn)