Presentations
A Touch of Pwn - Attacking Windows Hellow Fingerprint authentication
Jesse D’Aguanno and Timo Teräs
Microsoft engaged us to evaluate the security of the top fingerprint sensors used for Windows biometric authentication.
This presentation details our vulnerability research process — which entailed extensive reverse engineering of software and hardware, breaking cryptographic implementation flaws in a custom TLS, and deciphering and reimplementing proprietary protocols — to go from very little knowledge about biometric authentication, to ultimately achieving full bypass of Windows Hello authentication on all three of our research targets.
- Conference Name: BlueHat USA 2023
- Location: Redmond, WA
- Click To Download PDF (8.2 MB)
- Accompanying Blog Post
Blackjacking - Owning the Enterprise via the Blackberry
Jesse D’Aguanno
In this presentation, Jesse D’Aguanno demonstrated utilizing the trust relationship between the Blackberry Enterprise Server (BES) infrastructure and the BB handhelds to bypass perimeter controls and compromise an internal corporate network.
- Conference Name: DEF CON
- Location: Las Vegas, NV
- Click To Download PPT (4.8 MB)
Mach Shellcodes and Injectable OS X Rootkits
Jesse D’Aguanno
This presentation demonstrates utilizing the mach interfaces in the OS X kernel to manipulate the kernel from user space (i.e. Shellcode) to manipulate kernel structures. Example shellcodes are included.
- Conference Name: RECon
- Location: Montreal, Canada
- Click To Download PDF (4.5 MB)
IRK: Crafting OS X Kernel Rootkits
Jesse D’Aguanno
Apple’s OS X operating system has been gaining in popularity. This presentation details how to manipulate the OS X kernel in order to successfully hide an attackers activities and maintain access.
- Conference Name: BlackHat USA
- Location: Las Vegas, NV
- Click To Download PDF (11 MB)
NFC Hacking: The Easy Way
Eddie Lee
Blackwing’s Eddie Lee presents NFCProxy - A proof of concept tool that can be used to demonstrate insecurities in near field communication (NFC) and contactless credit cards. The tool can also be useful in NFC protocol analysis for further NFC security research. Tool and source available at: http://sourceforge.net/p/nfcproxy/
- Conference Name: DEF CON
- Location: Las Vegas, NV
- Click To Download PDF (4.4 MB)