Herramienta para entender cómo corren las aplicaciones en Kubernetes
- September 2, 2019
- tuxotron
- Visualización de recursos de forma visual y las dependencias entre estos.
- Nos permite hacer port-forwarding a un pod. Es decir, podemos mapear un puerto local, a un puerto remoto de un pod. De esta forma podemos acceder al mismo sin tener que crear un servicio.
- Ampliable a través de plugins.
- Acceso a logs de forma continua.
- Fácil navegación por el clúster.
- Filtrado de búsquedas por etiquetas.
- …
Kubernetes es una plataforma, que ya trabajes en desarrollo, seguridad u operaciones, debes conocer porque en algún momento, no muy lejano, te tocará tratar con ella, sino lo haces ya.
Octant es una herramienta de VMWare que nos ofrece información en tiempo de real sobre un clúster de Kubernetes al que tengamos acceso. Su objetivo es que ésta sea parte del conjunto de herramientas del desarrollador, aunque evidentemente puede ser usada por cualquiera.
Entre sus características podemos encontrar:
En Kubernetes existe una interfaz gráfica que práticamente permite hacer todo lo mencionado anteriormente, a excepción del port-forwarding y el uso de plugins. De hecho el panel de control de Kubernetes, nos permite crear objetos, borrarlos, modificarlos, etc. Mientras que Octant, sin la instalación de plugins, actualmente sólo nos permite navegar por el clúster y ver el estado del mismo, es decir, no nos permite modificarlo. Aquí la gran diferencia entre estos es que el panel de control de Kubernetes se instala como parte del clúster, mientras que Octant corre de forma local, es decir, que siempre y cuando tengas acceso a un cluster de Kubernetes, puedes correr Octant y poder navegar por el mismo de forma gráfica.
Recuerda que el panel de control gráfico de Kubernetes, no es un componente requerido. Es opcional, y no es el único que existe. De hecho, cada producto construido encima de Kubernete, suele tener su propio panel de control gráfico: Openshift, GKE, EKS, etc.
Si quieres ver la diferencia entre el panel de control de Kubernetes y Octant puedes ejecutar ambos en tu sistema.
Usando minikube sólo tienes que ejecutar (minikube debe estar corriendo):
minikube dashboard
Este comando abrirá el panel de control de minikube (oficial de Kubernetes) en el navegador.
Para ver Octant, lo primero es instalarlo, cuyas instrucciones están disponibles en el enlace de arriba, así el cómo ejecutarlo. Por defecto Octant escucha por el puerto 7777, pero éste se puede cambiar a través de la variable de entorno OCTANT_LISTENER_ADDR
, por ejemplo:
OCTANT_LISTENER_ADDR=0.0.0.0:8900 octant
Ó
export OCTANT_LISTENER_ADDR=0.0.0.0:8900
octant
Si estás interesado en la creación de plugins para Octant, puedes visitar la documentación, que curiosamente tienes que correr localmente usando hugo, misma plataforma sobre la que corre este blog :).
Cómo kubectl usa la API de Kubernetes
- August 19, 2019
- tuxotron
Como ya sabes, y si no lo sabes te lo cuento ahora, en Kubernetes, cualquier tipo de consulta o comando se lleva a cabo a través de llamadas a la API del mismo. El componente encargado de recibir y procesar dichas peticiones se llama: API Server. Este componente se encuentra en el nodo o nodos maestros del cluster.
Mi compañero y amigo Cybercaronte y yo ya hemos publicado varios artículos relacionados con Kubernetes, en los cuales si has leído, sabrás que existe una herramienta con la que podemos intereactuar con nuestro clúster desde la línea de comandos: kubectl
. Aunque existen interfaces gráficas, la forma más común y usada es a través de dicha herramienta.
Las opciones que esta utilidad provee son bastante amplias. En esta entrada vamos a hablar sólo de un parámetro común a prácticamente todas las opciones ofrecidas por kubectl
: la verbosidad (verbosity).
Para saber que ocurre cuando ejecutamos un comando con kubectl
, podemos usar la opción -v o –v. Esta opción acepta a su vez un número, el cual indica el nivel de verbosidad que queremos obtener. Dicho número va desde el 0 al 9, y la información que reporta kubectl
con cada número es la siguiente:
Si ejecutamos el sisguiente comando:
kubectl get pods
NAME READY STATUS RESTARTS AGE
nginx-7bb7cd8db5-8z6t8 1/1 Running 0 33s
Vemos que kubectl
nos devuelve los pods que tenemos corriendo en el espacio de nombres default.
Ahora hagamos los mismo con vervosidad de nivel 5:
kubectl get pods -v=5
I0819 17:02:54.174578 30833 get.go:564] no kind "Table" is registered for version "meta.k8s.io/v1beta1" in scheme "k8s.io/kubernetes/pkg/api/legacyscheme/scheme.go:30"
NAME READY STATUS RESTARTS AGE
nginx-7bb7cd8db5-8z6t8 1/1 Running 0 26s
Como se puede observar, en este caso, además de los pods que hay corriendo, obtenemos información extra. Los niveles del 0 al 5 nos vienen muy bien para depurar o ver que acciones lleva a cabo kubectl
, pero los níveles en los que quiero hacer hincapié en esta entrada son del 6 al 9.
Activando estos niveles, no sólo son muy útiles para depurar y ver que hace kubectl
, pero también son muy educativos, sobre todo si nos queremos familiarizar con su API, ya que estos niveles nos muestran que llamadas a la API hace kubectl
.
Veamos un ejemplo en nivel 6: (sólo voy a dejar las líneas que nos interesa)
kubectl get pods -v=6
...
I0819 17:11:39.565753 30923 round_trippers.go:438] GET https://192.168.99.110:8443/api/v1/namespaces/default/pods?limit=500 200 OK in 12 milliseconds
...
Como se puede ver, para obtener los pods del espacio de nombre actual (default), kubectl
hace una llamada a https://192.168.99.110:8443/api/v1/namespaces/default/pods?limit=500
que además, podemos apreciar que limita el número de pods a 500, con lo que si tienes más de 500 pods corriendo en tu espacio de nombre y kubectl
sólo te devuelve 500, ya sabes el porqué ;).
Ahora subamos de nivel:
kubectl get pods -v=7
...
I0819 17:22:29.600084 31029 round_trippers.go:416] GET https://192.168.99.110:8443/api/v1/namespaces/default/pods?limit=500
I0819 17:22:29.600108 31029 round_trippers.go:423] Request Headers:
I0819 17:22:29.600118 31029 round_trippers.go:426] Accept: application/json;as=Table;v=v1beta1;g=meta.k8s.io, application/json
I0819 17:22:29.600132 31029 round_trippers.go:426] User-Agent: kubectl/v1.15.2 (darwin/amd64) kubernetes/f627830
I0819 17:22:29.612086 31029 round_trippers.go:441] Response Status: 200 OK in 11 milliseconds
...
La diferencia con el nivel 6, es que además de los recursos que son llamados, también podemos ver las cabeceras HTTP con las que se llaman a dichos recursos.
El nivel 8 y el 9, además de las cabeceras, nos muestra el contenido del cuerpo de la petición (si existe) y respuesta (el nivel 9 muestra el contenido sin truncar), veamos otro ejemplo:
kubectl get pods -v=8
...
I0819 17:22:22.188395 31000 request.go:947] Response Body: {"kind":"Table","apiVersion":"meta.k8s.io/v1beta1","metadata":{"selfLink":"/api/v1/namespaces/default/pods","resourceVersion":"70162"},"columnDefinitions":[{"name":"Name","type":"string","format":"name","description":"Name must be unique within a namespace. Is required when creating resources, although some resources may allow a client to request the generation of an appropriate name automatically. Name is primarily intended for creation idempotence and configuration definition. Cannot be updated. More info: http://kubernetes.io/docs/user-guide/identifiers#names","priority":0},{"name":"Ready","type":"string","format":"","description":"The aggregate readiness state of this pod for accepting traffic.","priority":0},{"name":"Status","type":"string","format":"","description":"The aggregate status of the containers in this pod.","priority":0},{"name":"Restarts","type":"integer","format":"","description":"The number of times the containers in this pod have been restarted.","priority":0},{"name":"Age","type":"string [truncated 2611 chars]
...
Veamos un ejemplo de un comando un poco más complejo dónde se requiera el uso de varias llamadas:
kubectl describe pod nginx-7bb7cd8db5-8z6t8 -v=6
...
I0819 17:26:27.770772 31121 round_trippers.go:438] GET https://192.168.99.110:8443/api/v1/namespaces/default/pods/nginx-7bb7cd8db5-8z6t8 200 OK in 12 milliseconds
I0819 17:26:27.777728 31121 round_trippers.go:438] GET https://192.168.99.110:8443/api/v1/namespaces/default/pods/nginx-7bb7cd8db5-8z6t8 200 OK in 2 milliseconds
I0819 17:26:27.786906 31121 round_trippers.go:438] GET https://192.168.99.110:8443/api/v1/namespaces/default/events?fieldSelector=involvedObject.name%3Dnginx-7bb7cd8db5-8z6t8%2CinvolvedObject.namespace%3Ddefault%2CinvolvedObject.uid%3D9e77227d-cc08-4365-aeab-c0bbbfc1c1d8 200 OK in 2 milliseconds
...
Como se puede observar el comando describe
requiere más de una llamada a la API. Por último veamos que ocurre durante la creación de un deployment
con el comando run
:
kubectl run nginx2 --image nginx -v=8
...
I0819 17:29:23.727063 31398 round_trippers.go:416] GET https://192.168.99.110:8443/apis/apps/v1?timeout=32s
I0819 17:29:23.727097 31398 round_trippers.go:423] Request Headers:
...
I0819 17:29:23.749539 31398 request.go:947] Request Body: {"kind":"Deployment","apiVersion":"apps/v1","metadata":{"name":"nginx2","creationTimestamp":null,"labels":{"run":"nginx2"}},"spec":{"replicas":1,"selector":{"matchLabels":{"run":"nginx2"}},"template":{"metadata":{"creationTimestamp":null,"labels":{"run":"nginx2"}},"spec":{"containers":[{"name":"nginx2","image":"nginx","resources":{}}]}},"strategy":{}},"status":{}}
I0819 17:29:23.749618 31398 round_trippers.go:416] POST https://192.168.99.110:8443/apis/apps/v1/namespaces/default/deployments
I0819 17:29:23.749631 31398 round_trippers.go:423] Request Headers:
I0819 17:29:23.749638 31398 round_trippers.go:426] Content-Type: application/json
I0819 17:29:23.749645 31398 round_trippers.go:426] User-Agent: kubectl/v1.15.2 (darwin/amd64) kubernetes/f627830
...
En este caso vemos como no sólo se hacen peticiones GET, sino también POST, y gracias al nivel 8 podemos ver el contenido de dichas peticiones.
Así puedes ir probando comandos y jugando con los niveles de verbosidad. Si quieres aprender más sobre la API de Kuberntes, además de su documentación obviamente, usando la verbosidad puedes aprender un poco más de forma algo más interactiva.
Happy Hacking!
Material Black Hat USA 2019
- August 18, 2019
- tuxotron
- Every Security Team is a Software Team Now
- Detecting Deep Fakes with Mice
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Williams-Detecting-Deep-Fakes-With-Mice.pdf)
- [Download White Paper] (http://i.blackhat.com/USA-19/Wednesday/us-19-Williams-Detecting-Deep-Fakes-With-Mice-wp.pdf)
- Bypassing the Maginot Line: Remotely Exploit the Hardware Decoder on Smartphone
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Gong-Bypassing-The-Maginot-Line-Remotely-Exploit-The-Hardware-Decoder-On-Smartphone.pdf)
- [Download White Paper] (http://i.blackhat.com/USA-19/Wednesday/us-19-Gong-Bypassing-The-Maginot-Line-Remotely-Exploit-The-Hardware-Decoder-On-Smartphone-wp.pdf)
- A Decade After Bleichenbacher '06, RSA Signature Forgery Still Works
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Chau-A-Decade-After-Bleichenbacher-06-RSA-Signature-Forgery-Still-Works.pdf)
- [Download White Paper] (http://i.blackhat.com/USA-19/Wednesday/us-19-Chau-A-Decade-After-Bleichenbacher-06-RSA-Signature-Forgery-Still-Works-wp.pdf)
- ClickOnce and You're in - When Appref-ms Abuse is Operating as Intended
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Burke-ClickOnce-And-Youre-In-When-Appref-Ms-Abuse-Is-Operating-As-Intended.pdf)
- [Download White Paper] (http://i.blackhat.com/USA-19/Wednesday/us-19-Burke-ClickOnce-And-Youre-In-When-Appref-Ms-Abuse-Is-Operating-As-Intended-wp.pdf)
- Legal GNSS Spoofing and its Effects on Autonomous Vehicles
- Biometric Authentication Under Threat: Liveness Detection Hacking
- Battle of Windows Service: A Silver Bullet to Discover File Privilege Escalation Bugs Automatically
- SSO Wars: The Token Menace
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Munoz-SSO-Wars-The-Token-Menace.pdf)
- [Download White Paper] (http://i.blackhat.com/USA-19/Wednesday/us-19-Munoz-SSO-Wars-The-Token-Menace-wp.pdf)
- Monsters in the Middleboxes: Building Tools for Detecting HTTPS Interception
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Valenta-Monsters-In-The-Middleboxes-Building-Tools-For-Detecting-HTTPS-Interception.pdf)
- Exploiting the Hyper-V IDE Emulator to Escape the Virtual Machine
- Hacking for the Greater Good: Empowering Technologists to Strengthen Digital Society
- Dragonblood: Attacking the Dragonfly Handshake of WPA3
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Vanhoef-Dragonblood-Attacking-The-Dragonfly-Handshake-Of-WPA3.pdf)
- [Download White Paper] (http://i.blackhat.com/USA-19/Wednesday/us-19-Vanhoef-Dragonblood-Attacking-The-Dragonfly-Handshake-Of-WPA3-wp.pdf)
- The Most Secure Browser? Pwning Chrome from 2016 to 2019
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Feng-The-Most-Secure-Browser-Pwning-Chrome-From-2016-To-2019.pdf)
- [Download White Paper] (http://i.blackhat.com/USA-19/Wednesday/us-19-Feng-The-Most-Secure-Browser-Pwning-Chrome-From-2016-To-2019-wp.pdf)
- Attacking and Defending the Microsoft Cloud (Office 365 & Azure AD)
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Metcalf-Attacking-And-Defending-The-Microsoft-Cloud.pdf)
- PicoDMA: DMA Attacks at Your Fingertips
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Sandin-PicoDMA-DMA-Attacks-At-Your-Fingertips.pdf)
- APIC’s Adventures in Wonderland
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Matula-APICs-Adventures-In-Wonderland.pdf)
- [Download White Paper] (http://i.blackhat.com/USA-19/Wednesday/us-19-Matula-APICs-Adventures-In-Wonderland-wp.pdf)
- [Download Tool] (https://www.ernw.de/download/om/blackhat/us-19-Matula-Block-APICs-Adventures-In-Wonderland-Exploits.zip)
- Behind the Scenes: The Industry of Social Media Manipulation Driven by Malware
- Attacking Electric Motors for Fun and Profit
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Jablonski-Attacking-Electric-Motors-For-Fun-And-Profit.pdf)
- [Download White Paper] (http://i.blackhat.com/USA-19/Wednesday/us-19-Jablonski-Attacking-Electric-Motors-For-Fun-And-Profit-wp.pdf)
- Sensor and Process Fingerprinting in Industrial Control Systems
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Ochoa-Sensor-And-Process-Fingerprinting-In-ICS.pdf)
- HTTP Desync Attacks: Smashing into the Cell Next Door
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Kettle-HTTP-Desync-Attacks-Smashing-Into-The-Cell-Next-Door.pdf)
- [Download White Paper] (http://i.blackhat.com/USA-19/Wednesday/us-19-Kettle-HTTP-Desync-Attacks-Smashing-Into-The-Cell-Next-Door-wp.pdf)
- [Download Tool] (https://github.com/portswigger/desynchronize)
- Behind the Scenes of Intel Security and Manageability Engine
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Hasarfaty-Behind-The-Scenes-Of-Intel-Security-And-Manageability-Engine.pdf)
- All the 4G Modules Could be Hacked
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Shupeng-All-The-4G-Modules-Could-Be-Hacked.pdf)
- New Vulnerabilities in 5G Networks
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Shaik-New-Vulnerabilities-In-5G-Networks.pdf)
- [Download White Paper] (http://i.blackhat.com/USA-19/Wednesday/us-19-Shaik-New-Vulnerabilities-In-5G-Networks-wp.pdf)
- I’m Unique, Just Like You: Human Side-Channels and Their Implications for Security and Privacy
- It’s Not What You Know, It’s What You Do: How Data Can Shape Security Engagement
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Sedova-Know-How-Data-Can-Shape-Security-Engagement.pdf)
- Cyber Insurance 101 for CISO’s
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Smith-Cyber-Insurance-101-For-CISOs.pdf)
- The Path Less Traveled: Abusing Kubernetes Defaults
- Selling 0-Days to Governments and Offensive Security Companies
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Shwartz-Selling-0-Days-To-Governments-And-Offensive-Security-Companies.pdf)
- Selling 0-Days to Governments and Offensive Security Companies
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Shwartz-Selling-0-Days-To-Governments-And-Offensive-Security-Companies.pdf)
- Infiltrating Corporate Intranet Like NSA - Pre-auth RCE on Leading SSL VPNs
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Tsai-Infiltrating-Corporate-Intranet-Like-NSA.pdf)
- Integration of Cyber Insurance Into A Risk Management Program
- Come Join the CAFSA - Continuous Automated Firmware Security Analysis
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Mulliner-Come-Join-The-CAFSA-Continuous-Automated-Firmware-Security-Analysis.pdf)
- [Download White Paper] (http://i.blackhat.com/USA-19/Wednesday/us-19-Mulliner-Come-Join-The-CAFSA-Continuous-Automated-Firmware-Security-Analysis-wp.pdf)
- Worm Charming: Harvesting Malware Lures for Fun and Profit
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Amini-Worm-Charming-Harvesting-Malware-Lures-For-Fun-And-Profit.pdf)
- MITRE ATT&CK: The Play at Home Edition
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Nickels-MITRE-ATTACK-The-Play-At-Home-Edition.pdf)
- Look, No Hands! – The Remote, Interaction-less Attack Surface of the iPhone
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Silvanovich-Look-No-Hands-The-Remote-Interactionless-Attack-Surface-Of-The-iPhone.pdf)
- Chip.Fail - Glitching the Silicon of the Connected World
- Lessons From Two Years of Crypto Audits
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Aumasson-Lessons-From-Two-Years-Of-Crypto-Audits.pdf)
- Responding to a Cyber Attack with Missiles
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Hypponen-Responding-To-A-Cyber-Attack-With-Missiles.pdf)
- Finding a Needle in an Encrypted Haystack: Leveraging Cryptographic Abilities to Detect the Most Prevalent Attacks on Active Directory
- Controlled Chaos: The Inevitable Marriage of DevOps & Security
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Shortridge-Controlled-Chaos-The-Inevitable-Marriage-Of-DevOps-And-Security.pdf)
- Arm IDA and Cross Check: Reversing the Boeing 787's Core Network
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Santamarta-Arm-IDA-And-Cross-Check-Reversing-The-787-Core-Network.pdf)
- The Cyber Shell Game – War, Information Warfare, and the Darkening Web
- He Said, She Said – Poisoned RDP Offense and Defense
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Baril-He-Said-She-Said-Poisoned-RDP-Offense-And-Defense.pdf)
- [Download White Paper] (http://i.blackhat.com/USA-19/Wednesday/us-19-Baril-He-Said-She-Said-Poisoned-RDP-Offense-And-Defense-wp.pdf)
- How Do Cyber Insurers View The World?
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Prevost-How-Insurers-View-The-World.pdf)
- Internet-Scale Analysis of AWS Cognito Security
- Messaging Layer Security: Towards a New Era of Secure Group Messaging
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Robert-Messaging-Layer-Security-Towards-A-New-Era-Of-Secure-Group-Messaging.pdf)
- Hacking Your Non-Compete
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Stone-Hacking-Your-Non-Compete.pdf)
- [Download White Paper] (http://i.blackhat.com/USA-19/Wednesday/us-19-Stone-Hacking-Your-Non-Compete-wp.pdf)
- Hunting for Bugs, Catching Dragons
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Joly-Hunting-For-Bugs-Catching-Dragons.pdf)
- Flying a False Flag: Advanced C2, Trust Conflicts, and Domain Takeover
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Landers-Flying-A-False-Flag-Advanced-C2-Trust-Conflicts-And-Domain-Takeover.pdf)
- Going Beyond Coverage-Guided Fuzzing with Structured Fuzzing
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Metzman-Going-Beyond-Coverage-Guided-Fuzzing-With-Structured-Fuzzing.pdf)
- Transparency in the Software Supply Chain: Making SBOM a Reality
- Deconstructing the Phishing Campaigns that Target Gmail Users
- Cybersecurity Risk Assessment for Safety-Critical Systems
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Vessels-Cybersecurity-Risk-Assessment-For-Safety-Critical-Systems.pdf)
- PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary
- Defense Against Rapidly Morphing DDOS
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Tyagi-Defense-Against-Rapidly-Morphing-DDOS.pdf)
- Reverse Engineering WhatsApp Encryption for Chat Manipulation and More
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Zaikin-Reverse-Engineering-WhatsApp-Encryption-For-Chat-Manipulation-And-More.pdf)
- Detecting Malicious Files with YARA Rules as They Traverse the Network
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-Bernal-Detecting-Malicious-Files-With-YARA-Rules-As-They-Traverse-The-Network.pdf)
- MINimum Failure - Stealing Bitcoins with Electromagnetic Fault Injection
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Wednesday/us-19-OFlynn-MINimum-Failure-Stealing-Bitcoins-With-EMFI.pdf)
- [Download Tool] (github.com/newaetech/phywhisperer-usb)
- Mobile Interconnect Threats: How Next-Gen Products May be Already Outdated
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Teissier-Mobile-Interconnect-Threats-How-Next-Gen-Products-May-Be-Already-Outdated.pdf)
- On Trust: Stories from the Front Lines
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Farshchi-On-Trust-Stories-From-The-Front-Lines.pdf)
- WebAuthn 101 - Demystifying WebAuthn
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Brand-WebAuthn-101-Demystifying-WebAuthn.pdf)
- Attack Surface as a Service
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Westelius-Attack-Surface-As-A-Service.pdf)
- Woke Hiring Won’t Save Us: An Actionable Approach to Diversity Hiring and Retention
- GDPArrrrr: Using Privacy Laws to Steal Identities
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Pavur-GDPArrrrr-Using-Privacy-Laws-To-Steal-Identities.pdf)
- [Download White Paper] (http://i.blackhat.com/USA-19/Thursday/us-19-Pavur-GDPArrrrr-Using-Privacy-Laws-To-Steal-Identities-wp.pdf)
- The Future of Securing Intelligent Electronic Devices Using the IEC 62351-7 Standard for Monitoring
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Carcano-The-Future-Of-Securing-IED-Using-The-IEC62351-7-Standard-For-Monitoring.pdf)
- Testing Your Organization's Social Media Awareness
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Wilkin-Testing-Your-Organizations-Social-Media-Awareness.pdf)
- Death to the IOC: What's Next in Threat Intelligence
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Soman-Death-To-The-IOC-Whats-Next-In-Threat-Intelligence.pdf)
- Planning a Bug Bounty: The Nuts and Bolts from Concept to Launch
- Playing Offense and Defense with Deepfakes
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Price-Playing-Offense-And-Defense-With-Deepfakes.pdf)
- All Your Apple are Belong to Us: Unique Identification and Cross-Device Tracking of Apple Devices
- The Enemy Within: Modern Supply Chain Attacks
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Doerr-The-Enemy-Within-Modern-Supply-Chain-Attacks.pdf)
- Information Security in the Public Interest
- Breaking Through Another Side: Bypassing Firmware Security Boundaries from Embedded Controller
- Project Zero: Five Years of 'Make 0Day Hard'
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Hawkes-Project-Zero-Five-Years-Of-Make-0day-Hard.pdf)
- Rough and Ready: Frameworks to Measure Persistent Engagement and Deterrence
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Healey-Rough-and-Ready-Frameworks-To-Measure-Persistent-Engagment-and-Deterrence.pdf)
- [Download White Paper] (http://i.blackhat.com/USA-19/Thursday/us-19-Healey-Rough-and-Ready-Frameworks-to-Measure-Persistent-Engagement-and-Deterrence-wp.pdf)
- 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
- Denial of Service with a Fistful of Packets: Exploiting Algorithmic Complexity Vulnerabilities
- Women in Security: Building a Female InfoSec Community in Korea, Japan, and Taiwan
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Nakajima-Women-In-Security-Building-A-Female-InfoSec-Community-In-Korea-Japan-And-Taiwan.pdf)
- [Download White Paper] (http://i.blackhat.com/USA-19/Thursday/us-19-Nakajima-Women-In-Security-Building-A-Female-InfoSec-Community-In-Korea-Japan-And-Taiwan-wp.pdf)
- Rogue7: Rogue Engineering-Station Attacks on S7 Simatic PLCs
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Bitan-Rogue7-Rogue-Engineering-Station-Attacks-On-S7-Simatic-PLCs.pdf)
- [Download White Paper] (http://i.blackhat.com/USA-19/Thursday/us-19-Bitan-Rogue7-Rogue-Engineering-Station-Attacks-On-S7-Simatic-PLCs-wp.pdf)
- Operational Templates for State-Level Attack and Collective Defense of Countries
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Conti-Operational-Templates-for-State-Level-Attack-and-Collective-Defense-of-Countries.pdf)
- [Download White Paper] (http://i.blackhat.com/USA-19/Thursday/us-19-Conti-Operational-Templates-for-State-Level-Attack-and-Collective-Defense-of-Countries-wp.pdf)
- Process Injection Techniques - Gotta Catch Them All
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Kotler-Process-Injection-Techniques-Gotta-Catch-Them-All.pdf)
- [Download White Paper] (http://i.blackhat.com/USA-19/Thursday/us-19-Kotler-Process-Injection-Techniques-Gotta-Catch-Them-All-wp.pdf)
- [Download Tool] (https://github.com/SafeBreach-Labs/pinjectra)
- Bounty Operations: Best Practices and Common Pitfalls to Avoid in the First 6-12 Months
- DevSecOps : What, Why and How
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Shrivastava-DevSecOps-What-Why-And-How.pdf)
- Breaking Encrypted Databases: Generic Attacks on Range Queries
- Finding Our Path: How We're Trying to Improve Active Directory Security
- API-Induced SSRF: How Apple Pay Scattered Vulnerabilities Across the Web
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Maddux-API-Induced-SSRF-How-Apple-Pay-Scattered-Vulnerabilities-Across-The-Web.pdf)
- Exploiting Qualcomm WLAN and Modem Over The Air
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Pi-Exploiting-Qualcomm-WLAN-And-Modem-Over-The-Air.pdf)
- [Download White Paper] (http://i.blackhat.com/USA-19/Thursday/us-19-Pi-Exploiting-Qualcomm-WLAN-And-Modem-Over-The-Air-wp.pdf)
- Practical Approach to Automate the Discovery and Eradication of Open-Source Software Vulnerabilities at Scale
- Managing for Success: Maintaining a Healthy Bug Bounty Program Long Term
- Ghidra - Journey from Classified NSA Tool to Open Source
- Firmware Cartography: Charting the Course for Modern Server Compromise
- 0-days & Mitigations: Roadways to Exploit and Secure Connected BMW Cars
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Cai-0-Days-And-Mitigations-Roadways-To-Exploit-And-Secure-Connected-BMW-Cars.pdf)
- [Download White Paper] (http://i.blackhat.com/USA-19/Thursday/us-19-Cai-0-Days-And-Mitigations-Roadways-To-Exploit-And-Secure-Connected-BMW-Cars-wp.pdf)
- Infighting Among Russian Security Services in the Cyber Sphere
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Zenz-Infighting-Among-Russian-Security-Services-in-the-Cyber-Sphere.pdf)
- Behind the scenes of iOS and Mac Security
- Zombie Ant Farming: Practical Tips for Playing Hide and Seek with Linux EDRs
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Snezhkov-Zombie-Ant-Farming-Practical-Tips-For-Playing-Hide-And-Seek-With-Linux-EDRs.pdf)
- Predictive Vulnerability Scoring System
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Roytman-Jacobs-Predictive-Vulnerability-Scoring-System.pdf)
- [Download White Paper] (http://i.blackhat.com/USA-19/Thursday/us-19-Roytman-Predictive-Vulnerability-Scoring-System-wp.pdf)
- Towards Discovering Remote Code Execution Vulnerabilities in Apple FaceTime
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Huang-Towards-Discovering-Remote-Code-Execution-Vulnerabilities-In-Apple-FaceTime.pdf)
- Backdooring Hardware Devices by Injecting Malicious Payloads on Microcontrollers
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Berta-Backdooring-Hardware-Devices-By-Injecting-Malicious-Payloads-On-Microcontrollers.pdf)
- [Download White Paper] (http://i.blackhat.com/USA-19/Thursday/us-19-Berta-Backdooring-Hardware-Devices-By-Injecting-Malicious-Payloads-On-Microcontrollers-wp.pdf)
- Securing the System: A Deep Dive into Reversing Android Pre-Installed Apps
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Stone-Securing-The-System-A-Deep-Dive-Into-Reversing-Android-Preinstalled-Apps.pdf)
- Preventing Authentication Bypass: A Tale of Two Researchers
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Jaiswal-Preventing-Authentication-Bypass-A-Tale-Of-Two-Researchers.pdf)
- Automation Techniques in C++ Reverse Engineering
- Inside the Apple T2
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Davidov-Inside-The-Apple-T2.pdf)
- Making Big Things Better the Dead Cow Way
- [Download White Paper] (http://i.blackhat.com/USA-19/Thursday/us-19-Menn-Making-Big-Things-Better-The-Dead-Cow-Way-wp.pdf)
- Critical Zero Days Remotely Compromise the Most Popular Real-Time OS
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Seri-Critical-Zero-Days-Remotely-Compromise-The-Most-Popular-Real-Time-OS.pdf)
- [Download White Paper] (http://i.blackhat.com/USA-19/Thursday/us-19-Seri-Critical-Zero-Days-Remotely-Compromise-The-Most-Popular-Real-Time-OS-wp.pdf)
- Fantastic Red-Team Attacks and How to Find Them
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Smith-Fantastic-Red-Team-Attacks-And-How-To-Find-Them.pdf)
- The Discovery of a Government Malware and an Unexpected Spy Scandal
- Attacking iPhone XS Max
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Wang-Attacking-IPhone-XS-Max.pdf)
- Securing Apps in the Open-By-Default Cloud
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Howes-Securing-Apps-In-The-Open-By-Default-Cloud.pdf)
- Adventures in the Underland: The CQForensic Toolkit as a Unique Weapon Against Hackers
- HostSplit: Exploitable Antipatterns in Unicode Normalization
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Birch-HostSplit-Exploitable-Antipatterns-In-Unicode-Normalization.pdf)
- [Download White Paper] (http://i.blackhat.com/USA-19/Thursday/us-19-Birch-HostSplit-Exploitable-Antipatterns-In-Unicode-Normalization-wp.pdf)
- Hacking Ten Million Useful Idiots: Online Propaganda as a Socio-Technical Security Project
- Everybody be Cool, This is a Robbery!
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Campana-Everybody-Be-Cool-This-Is-A-Robbery.pdf)
- A Compendium of Container Escapes
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Edwards-Compendium-Of-Container-Escapes.pdf)
- The Future of ATO
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Martin-The-Future-Of-ATO.pdf)
- Exploring the New World : Remote Exploitation of SQLite and Curl
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Qian-Exploring-The-New-World-Remote-Exploitation-Of-SQLite-And-Curl.pdf)
- [Download White Paper] (http://i.blackhat.com/USA-19/Thursday/us-19-Qian-Exploring-The-New-World-Remote-Exploitation-Of-SQLite-And-Curl-wp.pdf)
- How to Detect that Your Domains are Being Abused for Phishing by Using DNS
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Hoelzel-How-To-Detect-That-Your-Domains-Are-Being-Abused-For-Phishing-By-Using-DNS.pdf)
- Debug for Bug: Crack and Hack Apple Core by Itself - Fun and Profit to Debug and Fuzz Apple Kernel by lldb Script
- Shifting Knowledge Left: Keeping up with Modern Application Security
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Stanislav-Shifting-Knowledge-Left-Keeping-Up-With-Modern-Application-Security.pdf)
- Paging All Windows Geeks – Finding Evil in Windows 10 Compressed Memory
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Sardar-Paging-All-Windows-Geeks-Finding-Evil-In-Windows-10-Compressed-Memory.pdf)
- [Download White Paper] (http://i.blackhat.com/USA-19/Thursday/us-19-Sardar-Paging-All-Windows-Geeks-Finding-Evil-In-Windows-10-Compressed-Memory-wp.pdf)
- Breaking Samsung’s ARM TrustZone
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Peterlin-Breaking-Samsungs-ARM-TrustZone.pdf)
- Command Injection in F5 iRules
- [Download Presentation Slides] (http://i.blackhat.com/USA-19/Thursday/us-19-Jerkeby-Command-Injection-In-Irules-Loadbalancer-Scripts.pdf)
- [Download White Paper] (http://i.blackhat.com/USA-19/Thursday/us-19-Jerkeby-Command-Injection-In-Irules-Loadbalancer-Scripts-wp.pdf)
- Moving from Hacking IoT Gadgets to Breaking into One of Europe's Highest Hotel Suites
- Lessons and Lulz: The 5th Annual Black Hat USA NOC Report
Ya podemos disfrutar también del material de muchas de las presentaciones de Black Hat USA 2019:
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec