Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

DNS Remote Code Execution: Finding the Vulnerability 👾 (Part 1)

hacking

pwn2own

exploit

dns

hacker

vulnerability research

ghidra

ida

reverse engineering

Автор: Flashback Team

Загружено: 16 мар. 2023 г.

Просмотров: 295 431 просмотр

Описание:

Learn tricks and techniques like these, with us, in our amazing training courses!
https://flashback.sh/training

In 2019 and 2020, we DOMINATED the router Wide Area Network or WAN category in the Pwn2Own hacker competition. In this category, hackers attack network devices with previously unknown vulnerabilities, from external networks such as the Internet.

Unfortunately, by 2021 our competitors reversed engineered our techniques, and the game was up.

Today, we are starting a video series where we will show you our tips, tricks and techniques to find and exploit WAN vulnerabilities in network devices. And we're starting with a beautiful DNS exploit that got us $20,000 in prizes.

Let's get ready to PWN!

In this video, we will tell you the story of how we found CVE-2020-10881 in the Pwn2Own Tokyo 2019 hacking competition and present our Game Plan for exploiting it :-)

00:00 - Intro
00:50 - WAN vs LAN
03:12 - Target Introduction and Recon
05:23 - Finding an Open Port and Fuzzing It
07:48 - Quick Look in Ghidra for Crash Investigation
10:38 - What is conn-indicator Doing?
12:30 - DNS Protocol
17:50 - A Deeper Look in Ghidra
20:33 - DNS Packet Parsing and the Vulnerability
24:51 - Radek's Evil Game Plan
28:03 - Our Training

Did you enjoy this video? Then follow us on Twitter, and subscribe to our channel for more awesome hacking videos.

~ Flashback Team
https://flashback.sh
  / flashbackpwn  

Background track: "Hackers" by Karl Casey ‪@WhiteBatAudio‬​

DNS Remote Code Execution: Finding the Vulnerability 👾 (Part 1)

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

DNS Remote Code Execution: Writing the Exploit 💣 (Part 2)

DNS Remote Code Execution: Writing the Exploit 💣 (Part 2)

How We Hacked a TP-Link Router and Took Home $55,000 in Pwn2Own

How We Hacked a TP-Link Router and Took Home $55,000 in Pwn2Own

DHCP Explained - протокол динамической конфигурации хоста

DHCP Explained - протокол динамической конфигурации хоста

🔴 LIVE: Avatar: The Last Airbender - Season Two Marathon ⛰ | Book 2: Earth | Avatar

🔴 LIVE: Avatar: The Last Airbender - Season Two Marathon ⛰ | Book 2: Earth | Avatar

Master MikroTik Spanning Tree Protocol CONFIGURATION in 10 Minutes with CLI

Master MikroTik Spanning Tree Protocol CONFIGURATION in 10 Minutes with CLI

Wireshark Tutorial for Beginners | Network Scanning Made Easy

Wireshark Tutorial for Beginners | Network Scanning Made Easy

Programming ▫️ Coding ▫️ Hacking ▫️ Designing Music 🦠

Programming ▫️ Coding ▫️ Hacking ▫️ Designing Music 🦠

Hacker's Guide to UART Root Shells

Hacker's Guide to UART Root Shells

КАК УСТРОЕН TCP/IP?

КАК УСТРОЕН TCP/IP?

Windows Security Tips

Windows Security Tips

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]