Publications

Slides

Biting the Apple that feeds you - macOS Kernel Fuzzing

This talk aimed to cover the research which has been undertaken following on from the Defcon presentation on MWR's platform agnostic kernel fuzzing, to automatically identify critical flaws within Apple macOS.

+ read more

Whitepaper

Kernel Driver mmap Handler Exploitation

This paper aims to guide it's reader towards building a working exploit for Linux kernel driver memory mapping issues. This research was largely motivated due to the lack of public step by step documentation on how...

+ read more

Land, Configure Microsoft Office, Persist

One software product that red teamers will almost certainly find on any compromised workstation is Microsoft Office. This talk discussed the ways that native functionality within Office can be abused to obtain persistence.A wide range of...

+ read more

Slides

UAC 0day, all day!

In July of 2017 Ruben Boonen delivered a 4 hour workshop at DefCon on User Account Control (UAC). The workshop demonstrated fundamental design flaws in the current implementation of UAC and provided attendees with the required knowledge/tools...

+ read more

Slides

Logic Bug Hunting in Chrome on Android

Memory corruption exploits are requiring greater and greater investment in time and effort to bypass the latest mitigations in applications like Chrome and the underlying operating system.

+ read more

Whitepaper

A Behavioural-based Approach to Ransomware Detection

This whitepaper provides motivation for the use of machine-learned behaviour for ransomware detection.

+ read more

Slides

A Window into Ring0

Sam Brown presented 'A Window into Ring0' at Securi-Tay 2017.

+ read more

Whitepaper

Hello MS08-067, My Old Friend

This paper aims to guide it's reader towards building a working exploit for MS08-067, specifically targeting 64-bit systems. This was largely motivated due to the lack of known publicly available exploits  against 64-bit machines not patched...

+ read more

Slides

One Template To Rule 'Em All

Kostas Lintovois presented "One Template To Rule 'Em All" at T2 2016.

+ read more

Slides

A Penetration Tester’s Guide to the Azure Cloud

The wide adoption and the benefits of cloud computing has led many users and enterprises to move their applications and infrastructure towards the Cloud.

+ read more

Slides

Needle: Finding Issues within iOS Applications

Marco Lancini presented "Needle: Finding Issues within iOS Applications" at OWASP AppSec USA 2016, on Friday the 14th of October 2016.

+ read more

Slides

Static Analysis for Code and Infrastructure

Nick Jones presented "Static Analysis for Code and Infrastructure" at DevSecCon 2016. His talk covered the theory behind a number of the techniques commonly used to analyze applications.

+ read more