Clip 5/8 Speakers: Mario Vuksan, Tomislav Pericin & Brian Karney Exploiting archive formats can lead to steganographic data hiding and to processing errors with serious forensic consequences. These formats are very interesting as they are commonly found on every PC, Apple or Linux machine, and it is popularly believed that they are well understood and trusted. Can exploits ever be present in file formats that have been in use for over ten or even twenty years? Through deep format analysis, beyond fuzzing, we look at what goes wrong when the format specifications are interpreted differently. Can you trust programs that work with archives? Can you even trust your antivirus? We will answer these questions and disclose for the first time 15 newly discovered vulnerabilities in ZIP, 7ZIP, RAR, CAB and GZIP file formats revealing the impact they have on anti-malware scanners, digital forensic, security gateways and IPS appliances. This talk will include demo of ArchiveInsider, a new forensics tool that detects and extracts hidden data and fully validates vulnerable file formats. We will demonstrate file format steganography, file malformation, and even data “self destruction,” all with tools that you use and trust. For more information or presentation slides go to the Blackhat site (bit.ly
Subscribe to our NewsletterLoading...
Tag CloudAnti Virus Protection Backtrack Blackhat Blog Botnet Cisco Cloud Security Cracking Cyber Security cyber security conference Data Security Educational Purposes Exploit Free Anti Virus Google Hack Hacking Hard Drive Recovery Honey Pot Honeypot Internet Security Lessons Learned Linux Mainstream Malware Management Tools Metasploit Mitm Network Security Nmap Passwords Penetration Penetration Testing Remote Exploit Security Test Speakers Ssl Steganography Symantec Testing Tool Voip Testing Vulnerabilities Wireshark Zero Day Zeus