Recon Conference
Recon Conference
  • 116
  • 23 646
Recon2023-EVM- SamshingVirtualFunctionPointersOnTheHeightsOfMountElbrus
Elbrus is a 40 year old Russian CPU family currently targeted at the Russian government and military market. This talk will use an old C++ virtual function pointer exploit technique as the basis for exploring Elbrus’s instruction set architecture, which contains some unique features such as very long instruction words (VLIWs) and register windowing.
Elbrus is a Russian CPU architecture that first debuted in 1979. It was the first superscalar, out-of-order execution processor developed in the Soviet Union. The architecture was extended to be a VLIW architecture with Elbrus 3 in 1990, and the current iteration is known as Elbrus 2000, or E2K for short. Elbrus is designed in Russia but currently manufactured by TSMC in Taiwan because of a lack of Russian production facilities capable of producing chips at advanced technology nodes.
The Elbrus project comes from the Moscow Center of SPARC Technologies (now shortened to just MCST). MCST currently produces new Elbrus chips and Elbrus-based PCs, laptops, and servers. The Russian military has reportedly ordered thousands of ruggedized laptops based on the Elbrus-1S+, although there appears to be very little deployment of these systems if any.
There is currently very little public documentation on Elbrus because MCST controls most documentation under nondisclosure agreements. This means we don’t have full processor documentation like we normally would for a commercial CPU, but there are a few public resources. Thanks to a good neighbor we also had access to an Elbrus-1S+ machine and used it to play around with some code examples. This machine has a compiler called lcc, which is the MCST compiler based on gcc. The options for disassembly at the moment are limited to ldis, which is part of lcc, and objdump, which is part of the binutils package put out by the OpenE2K group.
In Phrack no. 56 (circa AD 2000), “rix” published “Smashing C++ VPTRs.” This was a natural follow-on to the classic “Smashing the Stack for Fun and Profit” by Aleph One (Phrack no. 49,1996). rix’s article demonstrated how stack smashing could be used to exploit C++ programs when objects that have virtual function pointers (VPTRs) are created on the stack. Turns out this technique is still quite usable despite new security mitigations. So we first updated "Smashing C++ VPTRs." for 64-bit x86, and then compiled with lcc. Recompiling for Elbrus "just worked." So we'll use disassembled snippets from this example to explore the Elbrus architecture. The talk will cover the VLIW instruction formatting, the basic instruction set, register windowing, calls and branches, and the hidden Elbrus call stack.
มุมมอง: 538

วีดีโอ

Recon 2023 - Maxime Rossi and Damiano Melotti - Dissecting the Modern Android Data Encryption Scheme
มุมมอง 51711 หลายเดือนก่อน
Following our research on the Titan M, the security chip made by Google for their Android smartphones, we received a request from someone who had broken their device and was asking how they could recover the data despite the main SoC being dead. This question aroused our curiosity, and gave us the opportunity to play the forensic role and investigate how we could attack user data encryption on ...
Recon 2023 Simon Scannell Remotely Exploiting An Antivirus Engine
มุมมอง 30011 หลายเดือนก่อน
ClamAV is an open-source antivirus engine maintained by Cisco. As it is freely available, it is widely used across a large number of software products, like email servers, and appliances. This means that if an attacker can fully compromise the AV engine running in one of those products, they could access incoming and outgoing emails and for an appliance even control the network traffic of an or...
Recon 2023 Travis Goodspeed Recent Experiments with Mask ROMs
มุมมอง 78511 หลายเดือนก่อน
Truly read-only memory is sometimes found as a ROM encoded in a mask layer of a microcontroller. This is hard to extract electrically when the debugging protocol is undocumented, so many of these chips are dumped photographically after chemically decapsulating the chip with nitric acid, delayering it with hydrofluoric acid, and if they look identical, staining the ones to be a little darker tha...
Recon 2023 Nick Gregory & Pete Markowsky Be Kind Please Rewind
มุมมอง 26411 หลายเดือนก่อน
Record/replay or "time travel" debuggers let developers record a trace of a program's execution and later replay it, allowing them to revisit past execution states and diagnose bugs that may be difficult to reproduce. These tools have existed on Linux and Windows for many years, however no such tool has ever been created for macOS. In this talk, we'll present our work towards creating a record/...
Recon 2023 Natalie Silvanovich How To Hack Shannon Baseband
มุมมอง 64311 หลายเดือนก่อน
Samsung baseband modems provide mobile network functionality to a variety of devices. Project Zero reviewed the Samsung 'Shannon' Exynos 5300 modem used by the Google Pixel 7, discovering and reporting several vulnerabilities. While many of these could only be exploited using a local base-station or compromised mobile network, some could be accessed remotely cross-carrier, requiring only a root...
Recon2023-LukeJenkins-GRU’s toolkit: A deep dive into the disruptive arsenal
มุมมอง 342ปีที่แล้ว
State-backed actors generally have multiple tools in their kit to conduct cyber operations, but in recent years we've seen an uptick in the number of APT groups using disruptive tooling. One of the most prolific groups conducting disruptive cyber operations is part of the Russian Military Intelligence, also known as the GRU. Since the beginning of the invasion in February 2022, we’ve seen 12 wi...
Recon 2023 Tal Lossos NVMe
มุมมอง 243ปีที่แล้ว
NVMe technology is part of every Could Service Provider, and nowadays, Cloud Services are perhaps the most important cornerstone of modern computing. For this technology to work effectively, there’s a need for a reliable communication standard between the different services and their storage, and that’s exactly where NVMe comes to play. In this session, we’ll see how I discovered a pre-auth rem...
Recon 2023 - Nika Korchok - Portrait of the artist as a young vx-er: This painting is an MBR bootkit
มุมมอง 576ปีที่แล้ว
This talk focuses on the application of techniques from the era of MS-DOS malware to the generation/creation of novel work - using the assembly programming techniques from reversed malware samples to create art. The talk provides a primer on the fundamentals of MS-DOS architecture, and delves into the various infection/stealth/persistence techniques of some notable MS-DOS era bootkits, highligh...
Recon 2023 - Colin O'Flynn - Adventures of My Oven (Pinocchio) with ChipWhisperer
มุมมอง 739ปีที่แล้ว
You probably wouldn't consider power analysis & fault injection being a required skill set for your oven repair person. But when your oven is actively lying to you and not just broken, a new type of repair is needed beyond just replacing a heating element. This talk starts from a common complaint: how a range of Samsung ovens show you only the set temperature, and the actual temperature varies ...
Johannes Willbold - Cracking the final frontier: Reverse engineering and exploiting LEO satellites
มุมมอง 489ปีที่แล้ว
This talk presents a comprehensive security analysis of low-earth satellites, which have gained immense popularity in the "New Space" era. Despite their growing numbers, the security of these satellites remains uncertain. After introducing the essential architectural components of satellites, we dive into the approach to reverse engineer satellites and exploit their vulnerabilities. Using emula...
Recon 2023 - Olivia Locca Fraser - Backdoor Lockpick
มุมมอง 152ปีที่แล้ว
The recently bankrupt Chinese tech giant Phicomm installed a cryptographically locked backdoor on each and every one of the routers they released over the past several years. In this talk, I will show how I reverse engineered the backdoor protocol and discovered a series of zero day vulnerabilities in that protocol's implementation. I will also demonstrate a tool I developed to exploit these vu...
Recon 2023 - Erik Egsgard - The Hunt for Red October - One Ping Too Many
มุมมอง 652ปีที่แล้ว
The windows networking stack has been the source of various vulnerabilities over the years, a few of which could lead to remote code execution. This talk will discuss the internals of windows networking, how to uncover its secrets through reverse engineering and will conclude with details of some recently patched vulnerabilities (including CVE-2023-23415 aka Ping of Death). Erik Egsgard is a Pr...
Recon 2023-Michael Harbison - Hello 1994:Abusing Windows Explorer via Component Object Model in 2023
มุมมอง 260ปีที่แล้ว
PlugX, a fully-featured remote access tool with a Chinese nexus, has been active in the wild for over a decade. However, a new variant was recently discovered to be using older, lesser-known Windows APIs via Component Object Model (COM) for staging and concealment - never-before-seen techniques. Leveraging an undesirable behavior in Windows Explorer, the malware uses COM to create folders that ...
Recon 2023 - Mathilde Venault - Press Play To Restart: Under the Hood of the Windows Restart Manager
มุมมอง 433ปีที่แล้ว
From the early days of operating systems, malware authors have attempted to hijack legitimate OS components for malicious purposes, which makes it essential to identify and understand the potential threats they represent. Today, let’s explore one uncommonly hijacked Windows component: the Restart Manager. Introduced in Windows Vista, the Restart Manager aims to help reduce the number of reboots...
Recon 2023 - Willy R. Vasquez - The Most Dangerous Codec In The World: Vulnerabilities in H.264
มุมมอง 613ปีที่แล้ว
Recon 2023 - Willy R. Vasquez - The Most Dangerous Codec In The World: Vulnerabilities in H.264
Recon 2023 - Daniel Wegemer - Enabling Security Research On Qualcomm Wifi Chips
มุมมอง 495ปีที่แล้ว
Recon 2023 - Daniel Wegemer - Enabling Security Research On Qualcomm Wifi Chips
Recon 2023 - Tim Blazytko - Unveiling Secrets In Binaries using Code Detection Strategies
มุมมอง 1.5Kปีที่แล้ว
Recon 2023 - Tim Blazytko - Unveiling Secrets In Binaries using Code Detection Strategies
Recon 2023 - Ice Ice Baby: Coppin' RAM With DIY Cryo-Mechanical Robot
มุมมอง 752ปีที่แล้ว
Recon 2023 - Ice Ice Baby: Coppin' RAM With DIY Cryo-Mechanical Robot
recon2017 brx Reverse Engineering Satellite Based IP Content Distribution by Taylor Jacob
มุมมอง 177ปีที่แล้ว
recon2017 brx Reverse Engineering Satellite Based IP Content Distribution by Taylor Jacob
recon2017brx Harnessing Intel Processor Trace on Windows for fuzz by andrea allievi richard johnson
มุมมอง 152ปีที่แล้ว
recon2017brx Harnessing Intel Processor Trace on Windows for fuzz by andrea allievi richard johnson
Recon 2018 Brussels - Reverse Engineering Windows Defender’s JavaScript Engine
มุมมอง 484ปีที่แล้ว
Recon 2018 Brussels - Reverse Engineering Windows Defender’s JavaScript Engine
Recon Brussels 2018 - DIY ARM Debugger for Wi-Fi Chips
มุมมอง 103ปีที่แล้ว
Recon Brussels 2018 - DIY ARM Debugger for Wi-Fi Chips
Recon Brussels 2018 - Subverting your server through its BMC: the HPE iLO4 case
มุมมอง 189ปีที่แล้ว
Recon Brussels 2018 - Subverting your server through its BMC: the HPE iLO4 case
Recon Brussels 2018 - Visiting The Snake Nest
มุมมอง 62ปีที่แล้ว
Recon Brussels 2018 - Visiting The Snake Nest
Recon Brussels 2018 - Reversing IoT: Xiaomi ecosystem
มุมมอง 144ปีที่แล้ว
Recon Brussels 2018 - Reversing IoT: Xiaomi ecosystem
Recon Brussels 2018 - Starcraft: Emulating a buffer overflow for fun and profit
มุมมอง 262ปีที่แล้ว
Recon Brussels 2018 - Starcraft: Emulating a buffer overflow for fun and profit
Recon Brussels 2018 - Robin Hood vs Cisco ASA AnyConnect
มุมมอง 73ปีที่แล้ว
Recon Brussels 2018 - Robin Hood vs Cisco ASA AnyConnect
Recon Brussels 2018 - Hacking Toshiba Laptops
มุมมอง 185ปีที่แล้ว
Recon Brussels 2018 - Hacking Toshiba Laptops
Recon Brussels 2018 - Neurosurgery for Industrial Routers: Security of Sarian OS
มุมมอง 53ปีที่แล้ว
Recon Brussels 2018 - Neurosurgery for Industrial Routers: Security of Sarian OS

ความคิดเห็น

  • @FredGriselda-z1f
    @FredGriselda-z1f 10 วันที่ผ่านมา

    Johnson Linda Taylor Susan Robinson Karen

  • @MartinKirk-y5v
    @MartinKirk-y5v 28 วันที่ผ่านมา

    Martin Dorothy Jackson Elizabeth Clark Joseph

  • @RoyanaHaque
    @RoyanaHaque หลายเดือนก่อน

    Hall Robert Robinson Donna Allen Sharon

  • @AmyThompson-s8e
    @AmyThompson-s8e หลายเดือนก่อน

    Garcia Frank Thomas Matthew Young Brenda

  • @idan4329
    @idan4329 หลายเดือนก่อน

    Dude's accent and explanations are so unclear.

  • @dy5topian
    @dy5topian หลายเดือนก่อน

    the logic puzzle has now answer!

  • @guttlescoast941
    @guttlescoast941 5 หลายเดือนก่อน

    when was this presentation made???

  • @victorshamparov7646
    @victorshamparov7646 8 หลายเดือนก่อน

    LCC compiler for Elbrus is not a ported GCC, though ported GCC also exists. LCC looks like GCC for user to simplify migration from other ISA's with GCC, but it has own optimizer and own codegen. It even doesn't support GCC frontends except gfortran (which was specially ported for LCC), and it uses EDG and clang frontends for C, C++.

  • @scottgoodson4838
    @scottgoodson4838 11 หลายเดือนก่อน

    Amazing talk! The slide visuals seem to be delayed by 30-60 seconds though, which makes it harder to follow. Any chance of a reupload that fixes the sync?

  • @nibbles_
    @nibbles_ 11 หลายเดือนก่อน

    Great research as always from Natalie

  • @ilyar7161
    @ilyar7161 ปีที่แล้ว

    No sound half of the talk

  • @ilyar7161
    @ilyar7161 ปีที่แล้ว

    This is so underrated!

  • @ilyar7161
    @ilyar7161 ปีที่แล้ว

    Excellent talk, presented really well

  • @DmitryVoytik
    @DmitryVoytik ปีที่แล้ว

    I really enjoyed watching the presentation! We should hire this guy. 🙂

  • @zoenagy9458
    @zoenagy9458 ปีที่แล้ว

    PLC NEVER ment to be secure

  • @michaelliuzzi
    @michaelliuzzi ปีที่แล้ว

    awesome talk

  • @camelotenglishtuition6394
    @camelotenglishtuition6394 ปีที่แล้ว

    Absolutely love her work, great job Natalie.

  • @Satoshi.gmxorg
    @Satoshi.gmxorg ปีที่แล้ว

    Wait cryptocurrency is renewable green energy

  • @Satoshi.gmxorg
    @Satoshi.gmxorg ปีที่แล้ว

    I'm sorry but that is wrong I owe cryptocurrency Market and who the fuck are you

  • @CyReVolt
    @CyReVolt ปีที่แล้ว

    You call it bloatware, OEMs call it value add... heh. Kudos, nice work! 🥳