Content List
![](https://encryptedhacks.org/wp-content/uploads/2023/09/king-1024x576.png)
- Lateral Movement & Privilege Escalation in GCP; Compromise Organizations without Dropping an Implant
- All You Ever Wanted to Know about the AMD Platform Security Processor and were Afraid to Emulate
- IMP4GT – IMPersonation Attacks in 4G NeTworks
- Building a Vulnerability Disclosure Program that Works for Election Vendors and Hackers
- A Hacker’s Guide to Reducing Side-Channel Attack Surfaces Using Deep-Learning
- Demystifying Modern Windows Rootkits
- My Cloud is APT’s Cloud – Investigating and Defending Office 365
- Hunting Invisible Salamanders – Cryptographic (in)Security with Attacker-Controlled Keys
- Office Drama on macOS
- Remote Timing Attacks on TPMs, AKA TPM-Fail
- Decade of the RATs – Custom Chinese Linux Rootkits for Everyone
- About Directed Fuzzing and Use-After-Free – How to Find Complex & Silent Bugs
- CloudLeak – DNN Model Extractions from Commercial MLaaS Platforme
- Routopsy – Modern Routing Protocol Vulnerability Analysis and Exploitation
- Uncommon Sense – Detecting Exploits with Novel Hardware Performance Counters and ML Magic
- Security Research on Mercedes-Benz – From Hardware to Car Control
- Virtually Private Networks
- Plundervolt – Flipping Bits from Software without Rowhammer
- Operation Chimera – APT Operation Targets Semiconductor Vendors
- A Framework for Evaluating and Patching the Human Factor in Cybersecurity
- NoJITsu – Locking Down JavaScript Engines
- Hiding Process Memory via Anti-Forensic Techniques
- EtherOops – Exploring Practical Methods to Exploit Ethernet Packet-in-Packet Attacks
- Building Cyber Security Strategies for Emerging Industries in Sub Saharan Africa
- Industrial Protocol Gateways Under Analysis
- When Lightning Strikes Thrice – Breaking Thunderbolt 3 Security
- Beyond Root – Custom Firmware for Embedded Mobile Chipsets
- Superman Powered by Kryptonite – Turn the Adversarial Attack into Your Defense Weapon
- Lamphone – Real-Time Passive Reconstruction of Speech Using Light Emitted from Lamps
- Emulating Samsung’s Baseband for Security Testing
- Hacking the Voter – Lessons from a Decade of Russian Military Operations
- Detecting Access Token Manipulation
- Escaping Virtualized Containers
- Ruling StarCraft Game Spitefully — Exploiting the Blind Spot of AI-Powered Game Bots
- Practical Defenses Against Adversarial Machine Learning
- Reverse Engineering the Tesla Battery Management System to increase Power Available
- Needing the DoH – The Ongoing Encryption and Centralization of DNS
- Policy Implications of Faulty Cyber Risk Models and How to Fix Them
- A Little Less Speculation, a Little More Action – Deep Dive into Fuchsia’s Mitigations for CPU Side
- Kr00k – Serious Vulnerability Affected Encryption of Billion+ Wi-Fi Devices
- Experimenting with Real-Time Event Feeds
- Black-Box Laser Fault Injection on a Secure Memory
- Portable Document Flaws 101
- Breaking VSM by Attacking SecureKernel
- TiYunZong Exploit Chain to Remotely Root Modern Android Devices – Pwn Android Phones from 2015-2020
- I calc’d Calc – Exploiting Excel Online
- Reversing the Root – Identifying the Exploited Vulnerability in 0-days Used In-The-Wild
- Breaking Brains, Solving Problems – Lessons Learned from 2 Years of Setting puzzles for InfoSec Pros
- Room for Escape – Scribbling Outside the Lines of Template Security
- Breaking Samsung’s Root of Trust – Exploiting Samsung S10 Secure Boot
- IoT Skimmer – Energy Market Manipulation through High-Wattage IoT Botnets
- Improving Mental Models of End-to-End Encrypted Communication
- Exploiting Kernel Races through Taming Thread Interleaving
- Fooling Windows through Superfetch
- Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities
- Dive into Apple IO80211FamilyV2
- HTTP Request Smuggling in 2020 – New Variants, New Defenses and New Challenges
- Demigod – The Art of Emulating Kernel Rootkits
- Spectra – Breaking Separation Between Wireless Chips
- Stealthily Access Your Android Phones – Bypass the Bluetooth Authentication
- An Unauthenticated Journey to Root – Pwning Your Company’s Enterprise Software Servers
- You have No Idea Who Sent that Email – 18 Attacks on Email Sender Authentication
- Carrying our Insecurities with Us – The Risks of Implanted Medical Devices in Secure Spaces
- How I Created My Clone Using AI – Next-Gen Social Engineeringg
- Multiple Bugs in Multi-Party Computation – Breaking Cryptocurrency’s Strongest Wallets
- Detecting Fake 4G Base Stations in Real Time
- iOS Kernel PAC, One Year Later
- Web Cache Entanglement – Novel Pathways to Poisoning
- Heroku Abuse Operations – Hunting Wolves in Sheep’s Clothing
- A Decade After Stuxnet’s Printer Vulnerability – Printing is Still the Stairway to Heaven
- Making an Impact from India to the Rest of the World by Building & Nurturing Women Infosec Community
- Engineering Empathy – Adapting Software Engineering Principles and Process to Security
- Healthscare – An Insider’s Biopsy of Healthcare Application Security
- Stopping Snake Oil with Smaller Healthcare Providers – Addressing Security with Actionable Plans
- Discovering Hidden Properties to Attack the Node.js Ecosystem
- Repurposing Neural Networks to Generate Synthetic Media for Information Operations
- The Paramedic’s Guide to Surviving Cybersecurity
- OTRazor – Static Code Analysis for Vulnerability Discovery in Industrial Automation Scripts
- Hacking the Supply Chain – The Ripple20 Vulnerabilities Haunt Tens of Millions of Critical Devices
- When TLS Hacks You
- The Dark Side of the Cloud – How a Lack of EMR Security Controls Helped Amplify the Opioid Crisis
- Whispers Among the Stars – A Practical Look at Perpetrating Satellite Eavesdropping Attacks
- FASTCash and INJX_Pure – How Threat Actors Use Public Standards for Financial Fraud
- EdTech – The Ultimate APT
- Election Security – Securing America’s Future
- Finding New Bluetooth Low Energy Exploits via Reverse Engineering Multiple Vendors’ Firmwares
- Hacking Public Opinion
- Mind Games – Using Data to Solve for the Human Element
- Stress Testing Democracy Election Integrity During A Global Pandemic
- The Devils in the Dependency Data Driven Software Composition Analysis
- We Went to Iowa and All We Got were These Felony Arrest Records
0 Comments