Wiki
  • Introduction
  • 👾Penetration Testing
    • Application Security
      • Mobile App Security
        • Android Application Testing
          • Security Checklist
          • SSL Pinning Bypasses
          • Non-Proxy Aware Applications
            • Setting up VPN Server
            • Bypasses
          • Common Proxying Issues
          • Android Local Storage Checks
          • Android Task Hijacking
          • Kiosk Mode / Breakout Testing
          • Magisk on GenyMotion
        • iOS Application Testing
          • iOS Testing Using Objection
          • IPA Analysis Using MobSF
          • iOS Jailbreak Bypass
          • Decrypting iOS Apps
          • iOS Reverse Engineering
          • Jailbreak Detection Bypasses
          • iOS Local Storage Checks
          • Installing IPA
          • ATS Auditing
          • iOS Jailbreaking
          • Frida Pinning Bypasses
          • iOS Jailbreaking
        • Code Security
        • Frida on Windows
      • Web Application Security
        • Web Shells
        • CSV Injection
        • Measure Response Time using CURL
        • OSINT
          • EyeWitness
        • GraphQL Hacking
      • API Security
        • Security Checklist
        • Postman and Burp
        • CURL via BurpSuite
        • SOAP API Pentesting
    • Infrastructure Security
      • Network Infrastructure
        • Red Team Powershell Scripts
        • Mounting NFS Shares
        • Password Cracking/Auditing
        • Remote Access Sheet
        • Password Cracking Using Hashcat
        • Calculate IP Addresses from CIDR
        • Grep IP addresses or IP Ranges from a File
        • Default Credentials Checking
        • Check SSL/TLS Certificates
        • Log a terminal session
        • Unauthenticated Mongo DB
        • Microsoft SQL Server (MSSQL)
        • NTP Mode 6 Vulnerabilities
        • BloodHound
        • AD Offensive Testing
        • CrackMapExec
        • Select all IP addresses in Sublime Text
        • Convert CIDRs to an IP address list
        • Microsoft Exchange Client Access Server Information Disclosure
        • Web Server HTTP Header Internal IP Disclosure
        • smbclient.py
        • GetUserSPNs.py
        • Get-GPPPassword.py
        • SMBMap
        • Mounting Shares
        • mitm6
        • AD Attacks
        • Weak IKE Security Configurations
        • Locked BIOS Password Bypass
      • Wireless Security
        • Cached Wireless Keys
        • Aircrack Suite
    • SSL/TLS Security
    • Secure Code Review
      • Python
      • Semgrep
        • Semgrep to HTML Report
    • Cloud Security
      • Cloud Penetration Testing
    • Social Engineering
      • Simulated Phishing
        • GoPhish
    • Tool Usage
      • Docker
      • Split
      • PhantomJS
      • Aquatone
      • Tmux
      • Ipainstaller
      • Public IP From Command Line
      • Wifite
      • IKE Scan
      • Grep
      • Pulling APKs
      • Bitsadmin
      • Drozer
      • Iptables
      • Python Web Server
      • Crackmapexec
      • Impacket
      • Nessus
      • Adding SUDO User
      • Nmap
      • Metasploit Payloads
      • SMTP Open Relay
      • SQLMap
      • Screen
      • Remove All After Colon
      • Remove Old Linux Kernels
      • CURL
      • Hashcat
      • Secure Copy Protocol (SCP)
      • SSH & PGP Tools
      • IP Calculator
      • BloodHound
      • Netcat File Transfer
      • OpenVAS
      • BurpSuite
      • Exiftool
      • Python Virtual Environments
    • Errors and Solutions
      • Kill Process On Specific Port
      • Kill SSH Port Forwarding
      • SSH Key
      • Expanding Disk on Kali VM
    • Scoping
      • Scoping Questionnaires
        • Mobile App Testing
    • OSINT
      • Dark Web OSINT
      • Certificate Chain Check
      • EyeWitness - Web Service Screenshot
      • Tor to Browse Onion Links
      • DarkDump - Scan Dark Web for Onion Links
      • Domain related File Search
      • Google Dorking
      • IP / Network Blocks owned by a Company
  • ⌨️Programming
    • Automation
      • Running a Service at Boot
      • Network Connectivity Cron
    • Python
      • Adding Columns in Pandas
      • Copy Entire Column Data To New Column Pandas
      • Loading Progress Bar
      • Reorder Columns in Pandas
      • Filename with Date/Time Stamp
      • Command Line Arguments
      • Changing Date Format
      • Removing Index Column Pandas
      • Regex - Remove HTML Tags
      • Column Header Mapping
  • 🌐Miscellaneous
    • Scripts
      • Clickjacking Checker
      • Bulk WHOIS
      • SMB Signing Check
      • FDQN to IP Address
      • Grep IP Addresses
      • Nessus Parser
      • Build Review Audit
      • Nessus Merger
      • Nmap2CSV
      • Remove Audio From Videos
    • Favourite Reads/Links
    • Hacking Posters
    • Windows Developer VMs
    • Windows Workspaces
    • GitHub Pages
    • Interview Prep
      • Senior Penetration Tester
    • CVSS Formula
    • Android Rooting
      • Lineage OS 18.1 on OnePlus X
      • TWRP Recover on OnePlus X
      • Magisk Rooting
    • Presentation Slides
      • BlackHat - USA [2022]
  • 🐞Vulnerability Wiki
    • 🌐APPLICATION LEVEL
      • 🔒AUTHENTICATION
        • Authentication Bypass
        • Lack of Password Confirmation
        • 2FA Code Brute-forceable
        • Lack of Verification
        • Lack of Throttling on Form Submissions
        • Lack of Rate Limiting on Login
        • Weak Password Complexity Rules
        • 🖥️SESSION MANAGEMENT
        • 🔑ACCESS CONTROL
      • 🔢INPUT VALIDATION
      • ➗CRYPTOGRAPHY
      • 📉LOGGING
      • 📕DATA PROTECTION
      • 📲COMMUNICATION
      • 👨‍💻MALICIOUS CODE
      • 💡LOGIC
      • 🗄️FILE UPLOAD
      • ⚙️API ISSUES
      • 🔍CONFIGURATIONS
    • 💾INFRASTRUCTURE LEVEL
      • ICMP Timestamp Request Remote Date Disclosure (CVE-1999-0524)
      • ASP.NET Debug Mode Validation
Powered by GitBook
On this page

Was this helpful?

  1. Miscellaneous
  2. Presentation Slides

BlackHat - USA [2022]

PreviousPresentation SlidesNextAPPLICATION LEVEL

Last updated 2 years ago

Was this helpful?

🌐
5MB
Taking Kerberos To The Next Level.pdf
pdf
17MB
US-22-ABDELLATIF-Unlimited-Results-Breaking-Firmware-Encryption.pdf
pdf
6MB
US-22-Alkemade-Process-Injection-Breaking-All-macOS-Security-Layers-With-a-Single-Vulnerability.pdf
pdf
9MB
US-22-Avrahami-Kubernetes-Privilege-Escalation-Container-Escape-Cluster-Admin.pdf
pdf
10MB
US-22-Ayrey-Bug-Hunters-Dump-User-Data.pdf
pdf
6MB
US-22-Baines-Do-Not-Trust-The-ASA-Trojans.pdf
pdf
12MB
US-22-Benyo-Leveraging-the-Apple-ESF.pdf
pdf
800KB
US-22-Bialek-CastGuard.pdf
pdf
4MB
US-22-Bitan-Revealing-S7-PLCs.pdf
pdf
2MB
US-22-Borrello-Architecturally-Leaking-Data.pdf
pdf
1MB
US-22-Borrello-Custom-Processing-Unit.pdf
pdf
419KB
US-22-Canella-Go-With-the-Flow-Enforcing-Program-Behavior-Through-Syscall-Sequences-and-Origins-wp.pdf
pdf
1011KB
US-22-Canella-Go-With-the-Flow-Enforcing-Program-Behavior-Through-Syscall-Sequences-and-Origins.pdf
pdf
3MB
US-22-Case-New-Memory-Forensics-Techniques-to-Defeat-Device-Monitoring-Malware-wp.pdf
pdf
4MB
US-22-Case-New-Memory-Forensics-Techniques-to-Defeat-Device-Monitoring-Malware.pdf
pdf
5MB
US-22-Cherepanov-Industroyer2-Sandworms-Cyberwarfare-Targets-Ukraines-Power-Grid-Again.pdf
pdf
4MB
US-22-Csikor-RollBack-A-New-Time-Agnostic-Replay-Attack.pdf
pdf
2MB
US-22-Dewsnip-No-Mr-Cyber-Threat.pdf
pdf
7MB
US-22-Ding-To-Flexibly-Tame-Kernel.pdf
pdf
340KB
US-22-Doyhenard-Internal-Server-Error-wp.pdf
pdf
2MB
US-22-Doyhenard-Internal-Server-Error.pdf
pdf
254KB
US-22-Dwyer-Open-Threat-Hunting-Framework.pdf
pdf
2MB
US-22-Edmondson-Chasing-Your-Tail.pdf
pdf
5MB
US-22-Forshaw-Taking-Kerberos-To-The-Next-Level.pdf
pdf
1MB
US-22-Fournier-Return-To-Sender.pdf
pdf
366KB
US-22-Fratric-XMPP-Stanza-Smuggling.pdf
pdf
4MB
US-22-Frigo-A-Dirty-Little-History.pdf
pdf
611KB
US-22-Gazdag-RCE-as-a-Service.pdf
pdf
1MB
US-22-Gofman-IAM-The-One-Who-Knocks.pdf
pdf
16MB
US-22-Gordon-UWB-Real-Time-Locating-Systems-wp.pdf
pdf
17MB
US-22-Gordon-UWB-Real-Time-Locating-Systems.pdf
pdf
4MB
US-22-Gorenc-Calculating-Risk-In-The-Era-Of-Obscurity.pdf
pdf
801KB
US-22-Graeber-Living-Off-the-Walled-Garden.pdf
pdf
1MB
US-22-Guo-Trace-me-if-you-can.pdf
pdf
1MB
US-22-Hai-Is-WebAssembly-Really-Safe-wp.pdf
pdf
3MB
US-22-Hai-Is-WebAssembly-Really-Safe.pdf
pdf
9MB
US-22-Hawkins-Controlling-the-Source-wp.pdf
pdf
3MB
US-22-Hawkins-Controlling-the-Source.pdf
pdf
1MB
US-22-Heftrig-DNSSEC-Downgrade-Attacks.pdf
pdf
6MB
US-22-Hegel-Charged-By-An-Elephant.pdf
pdf
2MB
US-22-Hong-DirectX-The-New-Hyper-V-Attack-Surface.pdf
pdf
4MB
US-22-Huang-The-Battle-Against-the-Billion-Scale-Internet-Underground-Industry.pdf
pdf
274KB
US-22-Iooss-Ghost-in-the-Wireless-iwlwifi-Edition-wp.pdf
pdf
2MB
US-22-Iooss-Ghost-in-the-Wireless-iwlwifi-Edition.pdf
pdf
1MB
US-22-Jeitner-Stalloris-RPKI-Downgrade-Attack.pdf
pdf
3MB
US-22-Jin-Android-Universal-Root.pdf
pdf
4MB
US-22-Jin-Monitoring-Surveillance-Vendors.pdf
pdf
683KB
us-22-Jin-The-Journey-Of-Hunting-ITW-Windows-LPE-0day-wp.pdf
pdf
1MB
us-22-Jin-The-Journey-Of-Hunting-ITW-Windows-LPE-0day.pdf
pdf
4MB
US-22-Johnson-eBPF-ELFs-JMPing-Through-the-Windows.pdf
pdf
2MB
US-22-Karimi-Google-Reimagined-A-Phone.pdf
pdf
1MB
us-22-Kettle-Browser-Powered-Desync-Attacks-wp.pdf
pdf
3MB
us-22-Kettle-Browser-Powered-Desync-Attacks.pdf
pdf
5MB
US-22-Leitschuh-Scaling-the-Security-Researcher.pdf
pdf
14MB
US-22-Lin-Cautious-A-New-Exploitation-Method.pdf
pdf
1MB
US-22-Liu-Human-Or-Not.pdf
pdf
10MB
US-22-Ma-A-New-Trend-for-the-Blue-Team-Using-a-Practical-Symbolic-Engine.pdf
pdf
160KB
US-22-Marcovich-PISE-Automatic-Protocol-Reverse-Engineering-wp.pdf
pdf
2MB
US-22-Marcovich-PISE-Automatic-Protocol-Reverse-Engineering.pdf
pdf
2MB
US-22-Mollema-Backdooring-and-hijacking-Azure-AD-accounts.pdf
pdf
1MB
US-22-Nemiroff-Fault-Injection-Detection-Circuits.pdf
pdf
2MB
US-22-Olofsson-Smishsmash.pdf
pdf
601KB
US-22-Pearce-In-Need-Of-Pair-Review-wp.pdf
pdf
4MB
US-22-Pearce-In-Need-Of-Pair-Review.pdf
pdf
7MB
US-22-Quincoses-The-Growth-of-Global-Election-Disinformtion.pdf
pdf
889KB
US-22-Roettger-Breaking-the-Chrome-Sandbox-with-Mojo.pdf
pdf
902KB
US-22-Rubin-AAD-Joined-Machines-New-Lateral-Movement.pdf
pdf
874KB
US-22-Scott-Long-Dragon-Tails.pdf
pdf
4MB
US-22-Seeley-IAM-who-I-say-IAM.pdf
pdf
3MB
US-22-Shaik-Attacks-From-a-New-Front-Door-in-4G-5G-Mobile-Networks.pdf
pdf
8MB
US-22-Shakevsky-Trust-Dies-in-Darkness.pdf
pdf
2MB
US-22-Shan-Invisible-Finger-wp.pdf
pdf
7MB
US-22-Shan-Invisible-Finger.pdf
pdf
10MB
US-22-shen-all-your-gnn-and-data-belong-to-us.pdf
pdf
5MB
US-22-Shostack-A-Fully-Trained-Jedi-Semifinal.pdf
pdf
4MB
US-22-Snezhkov-ELF-Section-Docking-Revisiting-Stageless-Payload-Delivery.pdf
pdf
1MB
US-22-Tenaglia-Better-Privacy-Through-Offense-How-To-Build-a-Privacy-Red-Team.pdf
pdf
5MB
US-22-Teodorescu-Blasting-Event-Driven-Cornucopia.pdf
pdf
1MB
US-22-Thayer-Everything-To-Everyone-Burnout.pdf
pdf
706KB
US-22-Thomas-Demystifying-Key-Stretching-and-PAKEs.pdf
pdf
15MB
US-22-Tobener-Harm-Reduction-A-Framework.pdf
pdf
4MB
US-22-Tsai-Lets-Dance-in-the-Cache-Destabilizing-Hash-Table-on-Microsoft-IIS.pdf
pdf
6MB
US-22-Ventuzelo-A-Journey-Into-Fuzzing-WebAssembly-Virtual-Machines.pdf
pdf
3MB
US-22-Wang-Dive-into-Apple-IO80211Family-Vol-II.pdf
pdf
14MB
US-22-Wouters-Glitched-On-Earth.pdf
pdf
1MB
US-22-Wu-Devils-Are-in-the-File.pdf
pdf
8MB
US-22-Yan-BrokenMesh-New-Attack-Surfaces-of-Bluetooth-Mesh.pdf
pdf