DEF CON 31 - Weaponizing Plain Text  ANSI Escape Sequences as a Forensic Nightmare - STÖK

DEF CON 31 - Weaponizing Plain Text ANSI Escape Sequences as a Forensic Nightmare - STÖK

DEFCONConference

1 год назад

111,768 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

@FriendlyNeighborhoodNitpicker
@FriendlyNeighborhoodNitpicker - 14.10.2023 08:52

Never heard of him, but he is quite a fun presenter. And I will never work with log files the same way again. I knew about these back in the day, and also what you could do with them on terminals because I use a lot of ncurses stuff,, but I never really thought of the impact they could have through injection.

Ответить
@nonickch
@nonickch - 15.10.2023 02:32

Hey, it's 98 again.
I remember my takeaway from back then was to use less instead of more

Ответить
@DJChadHardcastle
@DJChadHardcastle - 21.10.2023 16:40

Loved this! Stök always impresses!

Ответить
@tiagotiagot
@tiagotiagot - 22.10.2023 08:44

Wow, he got video and audio to work live first try!

Ответить
@myndzi
@myndzi - 25.10.2023 07:59

Fun and interesting talk. I discovered an angle on this many years ago on IRC. UTF-8 sequences can contain certain valid control codes in the 2nd byte and onwards, allowing you to "smuggle" them past sanitization when configuration of things doesn't line up. For example, some users' IRC clients would receive and interpret the byte sequences as UTF-8 but their terminal would honor the control codes. \x9B from the C1 control codes worked as a CSI when I played with it, and can be the second byte of a valid UTF-8 character.

Ответить
@kahunablinginz6838
@kahunablinginz6838 - 29.10.2023 23:39

I'm disappointed how the audience was silent when he said you could print stuff
.. hahaha the audience must not be programmers 🤣🤣🤣

Ответить
@cybrshdw5465
@cybrshdw5465 - 06.11.2023 16:39

I had a friend back in the early to mid 1990's tell another friend of mine he put an ansi bomb into a video memory of a BBS me and him had a good laugh but my other friend ended up called the bbs provider and tell them that he had done this and they ended up shutting down the POP dial IN number for a week

Ответить
@teletele9320
@teletele9320 - 10.11.2023 15:58

25 years ago a friend of mine and me implemented a BBS/Chat-Server in plain Java (Java1.2 on linux it was) to replace an existing old c implementation variant which was not maintainable anymore as uni-project.
it never got live as the admins of the existing missed features and we did want to code further (after one and a half year extensive daily coding)without going live. we got our uni credits and we learned so much during that time

we played a lot with ESC sequences, cursors tabs backspace/delete full color mode and stuff, all stuff which was not possible or mediocre in the c implementation. we did a serverside ncurses like gui builder and and and.
and we made it optional to write colored logs Critical in bold red, Medium in yellow and status messages were green with esc sequences
all full bells and whistles...

at that time until your talk i saw yesterday, i never thought of abusing them for any evil stuff... man we were so naiv and good meaning :D

thx for the great talk and bringing back a lot of great memories

Ответить
@mario196705
@mario196705 - 11.11.2023 15:43

nice talk.. i dont knowe so much about ANSI security but did get a lot wiser. thank you very much 4 all time you put in. so easy when you explain it.

Ответить
@ZebaBaloch-d4l
@ZebaBaloch-d4l - 13.11.2023 07:03

That's pure gold
Hay stock I know u are going through a lot mantlly
I really hope u ll get well soon
And u come back soon
May the karma be with u

Ответить
@ThePredator315000
@ThePredator315000 - 13.11.2023 09:55

the G.O.A.T

Ответить
@chsovi7164
@chsovi7164 - 16.11.2023 05:23

my immediate thought after hearing about changing colours and needing to end the colour change with another escape sequence was that you could make all text the same colour as the terminal background. or maybe just some of the text

Ответить
@robertbruce7686
@robertbruce7686 - 19.11.2023 15:36

Woke me up... 😂. Excellent presentation and wired dude. 👍👍

Ответить
@Luftbubblan
@Luftbubblan - 21.11.2023 09:29

Snyggt jobbat

Ответить
@Btc_2012
@Btc_2012 - 23.11.2023 09:54

If you put it at .75 playback speed its a lot better

Ответить
@MrRoboticBrain
@MrRoboticBrain - 20.12.2023 07:34

This talk makes me scared of using cat! Every once in a while i open a binary log/file with cat accidentally and the terminal rightfully barfs at me for doing it. But i never imagined rouge escape sequences could actually cause that much damage when abused by an attacker! yikes!

Ответить
@thewholeworldblurred
@thewholeworldblurred - 08.01.2024 19:32

This guy and his videos got me into infosec. So glad to see my boy at DefCon!

Ответить
@DAngotti22
@DAngotti22 - 07.02.2024 23:22

what a freakin' incredible presentation ~ the timing so poignant and comedic, while never undermining the seriousness of the situation. i'd work with this guy

Ответить
@albaragone2632
@albaragone2632 - 15.02.2024 05:43

Great presentation, you are a fun crazy man!
Kind regards.
Mrs. Ragone

Ответить
@freem4nn129
@freem4nn129 - 18.03.2024 07:01

nice ! best energy ever

Ответить
@huangnova
@huangnova - 09.04.2024 14:47

Woohoo!!!! STOK great talk man!

Ответить
@ConanDuke
@ConanDuke - 29.04.2024 16:07

His accent makes it impossible.
I'll read the transcript, Thor.

Ответить
@mirozbiro
@mirozbiro - 17.05.2024 17:59

what is a real content?

Ответить
@SleepyMagii
@SleepyMagii - 23.07.2024 01:14

Yoo Stök!!
Youre amazing, one of the best !

Ответить
@Drew-my5sd
@Drew-my5sd - 23.07.2024 10:24

The best professor

Ответить
@1738Creations
@1738Creations - 18.08.2024 15:17

Sorry, this guy is a knob. I made it 14 seconds in. He's an embarrassment to a once respected community.

Ответить
@joshw1356
@joshw1356 - 07.09.2024 03:41

The smartest Dudeson

Ответить
@SamKnowsNothingAtAll
@SamKnowsNothingAtAll - 24.09.2024 16:48

Is this the guy behind all the stickers I used to see with that moniker? If so that’s super cool…

Ответить
@thespacecowboy420
@thespacecowboy420 - 28.09.2024 01:24

Yet another example of devs who are forced to be clever to keep a job doing stupid and unnecessary things that make no sense and are insecure.

Ответить
@mrhassell
@mrhassell - 16.10.2024 14:45

system log = /dev/null

Ответить
@mrhassell
@mrhassell - 16.10.2024 14:51

Never seen a man, get so excited about a colon.

Ответить
@lGRSHl
@lGRSHl - 18.10.2024 17:00

Excellent talk, and really cool demonstrations.. Got my brain thinking

Ответить
@pjdominey
@pjdominey - 25.10.2024 20:34

Back in the dark ages when I began my computer career on VAX/VMS in 19.. I knew nothing of escape sequences, so when I redirected my DCL program to a screen - the whole office went berserk - starting and stopping the printer and the plotter, falsh sequences on the terminal screens, beeping the terminal, my co-worker just panicked and ran out the room. I couldn't do anything but stand there laughing my arse off :)

Ответить
@elvinaguero4651
@elvinaguero4651 - 26.10.2024 03:31

Wow, that's a presentation Wow... now I can't trust my old log files lol...

Ответить
@jtreg
@jtreg - 27.10.2024 04:38

take off the damn shades, you might find the bloody podium.

Ответить
@bluesquare23
@bluesquare23 - 27.10.2024 18:45

At the very least I learned that you can advertise to sysadmins via logs which is fantastic.

Ответить
@KDural
@KDural - 03.11.2024 16:33

Totally on some kind of drugs... :-´)

Ответить
@TexasBig
@TexasBig - 04.11.2024 17:04

❤AWESOME❤

Ответить
@adamrowsell938
@adamrowsell938 - 06.11.2024 02:51

Rappers dont kill people, hackers doo😮

Ответить
@Akira-ky7qz
@Akira-ky7qz - 18.11.2024 01:18

he's the coolest guy in the room in every room

Ответить
@nigampatel6383
@nigampatel6383 - 30.11.2024 12:38

he know 0 coding

Ответить
@naumbtothepaine0
@naumbtothepaine0 - 14.12.2024 05:33

Absolutely wonderful presentation

Ответить
@MFoster392
@MFoster392 - 28.12.2024 20:15

Awesome info :)

Ответить