One of the biggest (best ;)) IT security-oriented conferences in Poland finished three days ago, in the wednesday evening. In the very first place, I would like to congratulate all the organisers, for their decision on where the event should be held, as well as how it should look like – during these two days, I had plenty of real fun!
CONFidence 2010 took place in Poland, on 25th and 26th of May, in the Kijów Cinema. The lectures were presented on two, independent tracks (thus everyone was able to find something for himself in any given moment), and regarded numerous, important security fields. In my opinion (and because of my specific interests), the best speeches were given by Sebastian Fernandez – “General notes about exploiting Windows x64“, Mario Heidreich – “The Presence and Future of Web Attacks Multi-Layer Attacks and XSSQLI” and Alexey Tikhonow – “De-blackboxing of digital camera”. I am really looking forward to see the slides being published as soon as possible. Meanwhile, you can find the complete conference schedule at http://2010.confidence.org.pl/agenda.
The ESET company (NOD32 software producent) has recently decided to organise two competitions with fun prizes – some detailed information can be found here. In short: the purpose of the first one was to create or project a security-related application of any kind. The second one was directed towards the conference attendees, as the goal was to find a correct serial key associated to a chosen user name, in a specially prepared executable file. A team consisting of Gynvael Coldwind and me managed to meet the latter objective, and therefore win the competition :-) Due to the above, a short blog entry/article should be released soon, covering the exact way of generating a correct serial, having as little knowledge about the input data verification mechanisms, as only possible (stay tuned ;)). The CrackMe can be still downloaded from the CONFidence website: http://2010.confidence.org.pl/ESET/banner.html, and I encourage every one and each of you to take a look at this one.
Moreover, I had the pleasure (once more, with Gynvael‘s collaboration) to carry out one of the last presentations, dedicated to the Windows kernel vulnerabilities (related to CSRSS and the system registry), which I have often mentioned lately. I think this is a perfect opportunity to publish some advisory documents, containg more relevant, detailed information about the vulns, of a more technical nature. Below you can find a complete list of these:
- Windows CSRSS Local Privilege Elevation Vulnerability (CVE-2010-0023)
- Windows Kernel Null Pointer Vulnerability (CVE-2010-0234)
- Windows Kernel Symbolic Link Value Vulnerability (CVE-2010-0235)
- Windows Kernel Memory Allocation Vulnerability (CVE-2010-0236)
- Windows Kernel Symbolic link Creation Vulnerability (CVE-2010-0237)
- Windows Kernel Symbolic link Information Disclosure (CVE-2010-0237)
- Windows Kernel Registry Key Vulnerability (CVE-2010-0238)
Furthermore, a package including all the above advisories is available to be downloaded here (864 kB).
The slides presented during our lecture can be found here (1.6 MB).
I strongly encourage every conference attendee to share your opinion regarding the conference itself, as well as specifically the material talked over by us. ;)
Nice crack-me and good work !
I hope you’ll enjoy your psp :p
How many times did you passed on the crack-me ?
I solved it and developed a keygen but it take me a relative long time to code an emulator for the VM with sufficient optimization (to simplify boolean equations).
I’m waiting for your solution now ;)
I’m not finished with the keygen yet. did you ‘reverse’ it or did you ‘brute’ it ?
@Baboon
Haha, I am obviously enjoying my PSP ;D The solution is going to appear as soon as I’ve got a few minutes to describe it ;)
@Ange: We did both; brute-force it on the CONFidence2010 event (it was a time challenge, the faster the better), and reverse it thereafter ;)