Description: summary:
We want to present several 0days using fuzzing and reverse engineering and maths. 1 Critical remote 0day in an EMC application. 2 Critical remote 0day in a novosoft famous backup application. The main idea is to present 0days found by us and this 0days are not typical, are different, specially one of them which implies protocol/binary reverse engineering and complex maths and show to the audience how other kind of vulnerabilities can be found. We think that the idea of presenting different kind of 0days, which are critical, and explain how to discover this kind of vulnerabilities can be really interesting for the audience and they will have a new perspective in application security.
In our research in these last months we were searching vulnerabilities in important backup servers applications.We were using reverse engineering and fuzzing and we found different kind of vulnerabilities which are really interesting.
1. The critical remote 0day in the EMC application is really interesting, found with reversing engineering the protocol and the binary files and it was necessary to apply some mathematics in order to understand the vulnerability and we had to implement some mathematics algorithms in order to exploit the vulnerability.It's a different vulnerability, it's not the typical buffer overflow, heap overflow, etc, and we want to show to the audience how we found this vulnerability and show how this kind of vulnerabilities can be found.
2. The 0days of the other backup application, were found with protocol fuzzing. Both of the 0days are critical and interesting, one is an authentication bypass to the backup server and the other 0day is a "permament" denial of service which is really curious and funny.Our idea is to show how we found both vulnerbilities and show how this kind of vulnerabilities can be found with protocol fuzzing.
For More Information Please Visit : - https://www.hackinparis.com/talks-2014
Tags:
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.