@BlackHatOfficialYT
  @BlackHatOfficialYT
Black Hat | Second Breakfast: Implicit and Mutation-Based Serialization Vulnerabilities in .NET @BlackHatOfficialYT | Uploaded 8 months ago | Updated 34 minutes ago
This talk describes novel attacks against .NET serialization that bypass current state-of-the-art mitigations.

These attacks include serialization exploits of platforms that don't use well-known .NET serializers, "mutation" attacks that can exploit deserialization even when the serialized data cannot be tampered with, and techniques for bypassing serialization binders. New remote code execution vulnerabilities in MongoDB, LiteDB, ServiceStack.Redis, RavenDB, MartenDB, JSON.Net and the .NET JavaScriptSerializer are all demonstrated....

By: Will Pearce

Full Abstract and Presentation Materials:
blackhat.com/us-23/briefings/schedule/#second-breakfast--implicit-and-mutation-based-serialization-vulnerabilities-in-net-32128
Second Breakfast: Implicit and Mutation-Based Serialization Vulnerabilities in .NETHouston, We Have a Problem: Analyzing the Security of Low Earth Orbit SatellitesBreaking Theoretical Limits: The Gap Between Virtual NICs and Physical Network CardsCloud Console Cartographer: Tapping Into Mapping- Slogging Thru LoggingInternational Threat Actors are Targeting Children to Steal Money from Banks & Major CorporationsChinas Military Cyber Operations: Has the Strategic Support Force Come of Age?Collide+Power: The Evolution of Software-based Power Side-Channels AttacksUncovering Azures Silent Threats: A Journey into Cloud VulnerabilitiesLogoFAIL: Security Implications of Image Parsing During System BootKeynote: Industrialising Cyber Defence in an Asymmetric WorldKnow Thy Enemy: The Taxonomies That Meta Uses to Map the Offensive Privacy SpaceAll You Need is Guest

Second Breakfast: Implicit and Mutation-Based Serialization Vulnerabilities in .NET @BlackHatOfficialYT

SHARE TO X SHARE TO REDDIT SHARE TO FACEBOOK WALLPAPER