Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

#HITB2023HKT

Автор: Hack In The Box Security Conference

Загружено: 2023-10-13

Просмотров: 353

Описание:

Asynchronous clock is used extensively in hypervisors, which is designed to avoid the blocking of the calling thread, thereby improving the responsiveness of the software. There are many devices using asynchronous clock to process their task in QEMU, such as Network,USB,Disk and Crypto device. However, we find that a attacker can leverage asynchronous clock to do some race condition attack, which can help to make a exploit.

In this talk, we demonstrate how to achieve a full guest-to-host escape exploitation just through a heap overflow write vulnerability.

We will show how to turn a malloc-use-free primitive to a malloc primitive and turn heap overflow write to arbitrary address write (AAW) by leveraging the asynchronous clock, which makes this hard-to-exploit vulnerability exploitable without the help of other devices in QEMU – this is a new attack approach which we call Timekiller. As far as we know, this is the first attack technique leveraging the asynchronous clock to finish a guest-to-host escape exploit.

This is the first public virtual machine escape exploit in the virtio-crypto device (full 0-day). Combining Timekiller and structures in virtio-crypto device, we can exploit most heap overflow write vulnerabilities in QEMU.

===

Yongkang Jia is a Master student at Zhejiang University, China, under the supervision of Chunming Wu. He is going to be a security reseacher at Singular Security Lab. He is a member of the AAA CTF Team. He also plays DEFCON CTF as a member of Katzebin. His research focuses on System Security, especially Virtualization Security. He has reported several vulnerabilities in KVM、QEMU, which were confirmed and credited in multiple advisories.

---

Xiao Lei is a Master student at Zhejiang University, China, under the supervision of Chunming Wu. He is a member of the AAA CTF Team. He also plays DEFCON CTF as a member of Katzebin. His research focuses on System Security, especially Virtualization Security.

---

Yiming Tao received the B.S. degree in software engineering from University of Electronic Science and technology, Chengdu, China in 2022 and now a postgraduate in Cyberspace Security from Zhejiang University, Hang Zhou, China.

---

Gaoning Pan is a PhD student at Zhejiang University, China, under the supervision of Chunming Wu. He is a member of the AAA CTF Team. He also plays CTFs as a member of A*0*E. His research focuses on System Security, especially Virtualization Security. He has reported several vulnerabilities in KVM、QEMU and Virtualbox, which were confirmed and credited in multiple advisories. He has published several papers in top-tier academic conferences, including ACM CCS, USENIX Security. His representative work V-Shuttle has won ACM CCS 2021’s best paper award. Also, he has nomination for 2022 most innovative research Pwnie Award.

#HITB2023HKT

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

array(10) { [0]=> object(stdClass)#4438 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "gMxtgoW0yx4" ["related_video_title"]=> string(70) "#HITB2023HKT D2T1 - KeyBleed: Attacking The OneKey Mini - Eric Michaud" ["posted_time"]=> string(19) "1 год назад" ["channelName"]=> string(35) "Hack In The Box Security Conference" } [1]=> object(stdClass)#4411 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "xlb6g8w01fc" ["related_video_title"]=> string(37) "Enabling RISC-V Development with QEMU" ["posted_time"]=> string(19) "5 лет назад" ["channelName"]=> string(20) "RISC-V International" } [2]=> object(stdClass)#4436 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "QEZ4D17Fu40" ["related_video_title"]=> string(69) "HTB x UNI CTF 2021: HackTheBox University Capture The Flag Qualifiers" ["posted_time"]=> string(21) "3 года назад" ["channelName"]=> string(9) "CryptoCat" } [3]=> object(stdClass)#4443 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "RMnBHbfZShk" ["related_video_title"]=> string(61) "Linux kernel, DPDK и kernel bypass (Степан Репин)" ["posted_time"]=> string(21) "9 дней назад" ["channelName"]=> string(29) "Истовый Инженер" } [4]=> object(stdClass)#4422 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "BT38K6NqETE" ["related_video_title"]=> string(125) "Эксперт по кибербезопасности о ваших паролях, вирусах и кибератаках" ["posted_time"]=> string(27) "6 месяцев назад" ["channelName"]=> string(22) "Раскадровка" } [5]=> object(stdClass)#4440 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "_rkBx62J3Mk" ["related_video_title"]=> string(68) "Российско-украинская война - на карте" ["posted_time"]=> string(21) "4 часа назад" ["channelName"]=> string(21) "Гео-История" } [6]=> object(stdClass)#4435 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "aircAruvnKk" ["related_video_title"]=> string(101) "Но что такое нейронная сеть? | Глава 1. Глубокое обучение" ["posted_time"]=> string(19) "7 лет назад" ["channelName"]=> string(11) "3Blue1Brown" } [7]=> object(stdClass)#4445 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "RnHC1XiNWS8" ["related_video_title"]=> string(94) "Венедиктов – страх, Симоньян, компромиссы / вДудь" ["posted_time"]=> string(19) "3 дня назад" ["channelName"]=> string(10) "вДудь" } [8]=> object(stdClass)#4421 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "8UPDF-Is9o0" ["related_video_title"]=> string(118) "Китай представил самых безумных дронов на выставке UAV SHENZHEN EXPO 2025!" ["posted_time"]=> string(19) "2 дня назад" ["channelName"]=> string(12) "Alex Robolab" } [9]=> object(stdClass)#4439 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "FklYFxRWY_s" ["related_video_title"]=> string(164) "⚡️НОВОСТИ | ИЗРАИЛЬ УДАРИЛ ПО ИРАНУ | ПОЖАР. ПОГИБЛИ ПЯТЬ ДЕТЕЙ | МИЛЛИОННЫЕ ПОТЕРИ РОССИИ" ["posted_time"]=> string(23) "5 часов назад" ["channelName"]=> string(29) "Ходорковский LIVE" } }
#HITB2023HKT D2T1 - KeyBleed: Attacking The OneKey Mini - Eric Michaud

#HITB2023HKT D2T1 - KeyBleed: Attacking The OneKey Mini - Eric Michaud

Enabling RISC-V Development with QEMU

Enabling RISC-V Development with QEMU

HTB x UNI CTF 2021: HackTheBox University Capture The Flag Qualifiers

HTB x UNI CTF 2021: HackTheBox University Capture The Flag Qualifiers

Linux kernel, DPDK и kernel bypass (Степан Репин)

Linux kernel, DPDK и kernel bypass (Степан Репин)

Эксперт по кибербезопасности о ваших паролях, вирусах и кибератаках

Эксперт по кибербезопасности о ваших паролях, вирусах и кибератаках

Российско-украинская война - на карте

Российско-украинская война - на карте

Но что такое нейронная сеть? | Глава 1. Глубокое обучение

Но что такое нейронная сеть? | Глава 1. Глубокое обучение

Венедиктов – страх, Симоньян, компромиссы / вДудь

Венедиктов – страх, Симоньян, компромиссы / вДудь

Китай представил самых безумных дронов на выставке UAV SHENZHEN EXPO 2025!

Китай представил самых безумных дронов на выставке UAV SHENZHEN EXPO 2025!

⚡️НОВОСТИ | ИЗРАИЛЬ УДАРИЛ ПО ИРАНУ | ПОЖАР. ПОГИБЛИ ПЯТЬ ДЕТЕЙ | МИЛЛИОННЫЕ ПОТЕРИ РОССИИ

⚡️НОВОСТИ | ИЗРАИЛЬ УДАРИЛ ПО ИРАНУ | ПОЖАР. ПОГИБЛИ ПЯТЬ ДЕТЕЙ | МИЛЛИОННЫЕ ПОТЕРИ РОССИИ

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]