A place: Russia, St. Petersburg, A2 Green Concert
date of: November 12-13, 2019
CFP opening: August 1, 2019
Closing CFP: October 10, 2019
Conference site: https://zeronights.ru/
CFP website: https://01x.cfp.zeronights.ru/zn2019/
This year, the ZeroNights 2019 conference will be held on November 12-13 in St. Petersburg. Earlier, two key speakers of the event were announced, and now the first information on the reports has appeared.
“Two Bytes to Rule Adobe Reader Twice: The Black Magic Behind the Byte Order Mark”
Ke Liu, senior information security researcher at Tencent Security Xuanwu Lab, will tell you how even today you can hack Adobe Reader using an incorrectly formed line and will cover the analysis of the root causes of such vulnerabilities, their detection methods and how to write working exploits.
“A Monkey in the Sandbox: Exploiting Firefox Through IonMonkey JIT and Kernel Sandbox Escapes”
Hossein Lotfi, senior research officer for vulnerabilities at Trend Micro’s Zero Day Initiative (ZDI), will review two Mozilla Firefox browser scenarios already shown on Pwn2Own. Over the past decade, hacking web browsers has become more difficult, and now in most cases an attacker needs to detect several vulnerabilities in order to execute code with a high level of privileges in the victim's system. However, working exploits of browser vulnerabilities still exist. Thanks to unique sandbox bypass methods, they allow an attacker to execute malicious code with system-level privileges.
"Fatal Fury on ESP32: Time to release Hardware Exploits"
The researcher, under the nickname LimitedResults, will introduce a method of sequentially bypassing the ESP32 security mechanisms, based on physical access to the device and techniques such as interruption in power supply, attack via third-party analog channels, micro soldering, and reverse engineering. As far as we know, so far, ESP32 security mechanisms, such as Secure Boot and Flash Encryption, have not yet been hacked.
"Opwnsource: VNC vulnerability research"
Pavel Cheremushkin, an information security researcher at Kaspersky Lab ICS CERT, will examine the technical features of the most interesting vulnerabilities discovered and the methods for detecting them. The researcher will also demonstrate the vulnerabilities of the server and client side of various VNC implementations, as well as talk about the epidemic of vulnerabilities caused by the fact that developers thoughtlessly inserted the copied vulnerable code into the project. Pavel will introduce PoC techniques for remote code execution on a client machine connected to a compromised server or an attacker server.
"CiscoASA: From Zero to ID = 0"
The researcher under the nickname "Md4" for the first time will talk about the 0-day vulnerability that is present in most major versions of Cisco ASA devices. Students will also learn about a new operational technique that enables remote code execution in the Cisco ASA with an authenticated user.
We also remind you that the acceptance of applications for reports is about to end. Hours left hurry up!