我最喜欢的39C3演讲
My Favorite 39C3 Talks

原始链接: https://asindu.xyz/my-favorite-39c3-talks/

第39届混沌通信大会(39C3)汇集了诸多富有洞察力的演讲,其中一些重点介绍了关键的安全漏洞。一个尤其令人担忧的报告揭示了如何利用相对廉价的设备轻易截获来自卫星的未加密数据,包括财务细节。 另一场演讲揭示了“零点击”漏洞的原理,演示了黑客如何在无需用户交互的情况下攻陷设备,并以WhatsApp和iMessage为例进行了说明。进一步加剧安全担忧的是,研究表明Spectre等CPU漏洞仍然是一个重大威胁,甚至允许数据泄露于共享云服务器上的虚拟机之间——强调了专用服务器的优势。 除了网络安全,对无人机战争的历史回顾也揭示了它们令人惊讶的长期使用历史,可以追溯到一战时期的侦察用途,并演变为现代作战应用。总而言之,39C3展示了攻击者的聪明才智以及日常技术中普遍存在的漏洞。

黑客新闻 新的 | 过去的 | 评论 | 提问 | 展示 | 工作 | 提交 登录 我最喜欢的39C3演讲 (asindu.xyz) 8 分,由 max_ 1小时前 | 隐藏 | 过去的 | 收藏 | 2 条评论 帮助 KerrickStaley 7分钟前 | 下一个 [–] 顺便说一句,C3除了演讲之外还有很多事情发生!艺术、电子小玩意和各种演示、人们实时黑客项目、即兴见面会,还有动感的 техно 音乐 :) 如果有机会,我鼓励人们亲自参加;仅仅在线观看演讲只是体验的一小部分。回复 jmclnx 5分钟前 | 上一个 [–] > CPU是永久的漏洞 这个看起来很有趣,需要去看看!回复 指南 | 常见问题 | 列表 | API | 安全 | 法律 | 申请YC | 联系 搜索:
相关文章

原文

The 39C3, is the 39th Chaos Communication Congress event, based in Germany. 1 I have often seen people share talks individually and found some interesting.

The list of talks for the 39th event for C3 has been publicly released so I decided to look through the playlist and watched those that caught my attention. 2

I believe we could learn alot from all of the talks. But I wanted to share my favourite highlights.

Harvesting Data from Satellites

In this talk, two researchers talk about using ~ $500 equipment to evesdrop satellites belonging to the Military, Payment Processors and Airline Companies.3

A depressing realisation was that alot of the data was in plain text.

What was also very laughable was that one military satellite simply shuffled strings like {military: true} to {imilatyr : rtue} (in an attempt to secure data?)

Slide From Talk: It turns out you could see unencrypted payment details (card numbers, card names and balances) of people when they use payment processors.

How 0-Click Exploits Actually Work

I always wondered how 0-click exploits, a way hackers can get into your device without requiring you to ever click anything work.

This video walks you through a step by step process on how hackers find such an exploit and how they use it. Demos are made for WhatsApp & iMesages on iOS and Samsung. 4

CPUs are permanent vulnerabilities

The talk is titled “Spectre in the real world: Leaking your private data from the cloud with CPU vulnerabilities” 5

To quote the speaker;

Transient execution CPU vulnerabilities, like Spectre, have been making headlines since 2018.

However, their most common critique is that these types of vulnerabilities are not really practical.

Even though it is cool to leak /etc/shadow with a CPU bug, it has limited real-world impact.

In this talk, we take Spectre out for a walk and let it see the clouds, by leaking memory across virtual machine boundaries at a public cloud provider, bypassing mitigations against these types of attacks.

Spectre is a bug at the CPU level (software can’t fix it), and the author mentions that it is impractical to simply replace all CPUs susceptible to this.

In the demo, he shows that you can extract secrets from another VM, provided that both VMs are on the same physical server – you don’t even need to have access to the other VM.

This was a very good pitch on why a cloud instance should rather be hosted on a dedicated server, instead of opting for a cheaper shared machine.

The Current Drone wars

This talk had nothing to do with cyber security, but was more about, the use of drones in warfare. It presents the historical use of drones in war and how it has changed with time, to what it is today. 6

The use of drones in warfare was way older that I thought. All the way from WWI used for information gathering.

Silde From Talk: Remote control drone from 1930s

联系我们 contact @ memedata.com