DeepSec 2017

Thursday, November 16, 2017 22 months ago Vienna, Austria

MWR is pleased to announce that Alex Plaskett will be presenting at DeepSec in Vienna this year.

Event Description

DeepSec brings together the world's most renowned security professionals from academics, Government, industry, and the underground hacking community to meet and exchange knowledge.

Talk presented by MWR

  • Time: 12:00:00
  • Room: Left Pirouette
  • Topic: Lock, Stock and Two Smoking Apples - XNU Kernel Security
  • Speakers: Alex Plaskett
  • Description: This talk will aim to cover the research which has been undertaken following on from the DefCon presentation on MWR's platform agnostic kernel fuzzing, to automatically identify critical flaws within Apple macOS.

    It was observed that there have been limited attempts to create automated kernel fuzzing solutions for macOS, hence the drive to modify our existing frameworks to support the platform and develop support utility tooling to aid vulnerability research.

    This talk will focus on how the researchers approached developing fuzzing automation to test the core subsystems of the XNU kernel and the insights gained. The talk will also highlight architectural differences between other supported platforms which needed to be addressed whilst performing integration into the framework.

    The old adage of 'different fuzzers find different bugs' will also be explored, as we look into the effectiveness of using targeted fuzzing for specific components considered most likely to yield vulnerabilities.

    An in-memory fuzzer based on a combination of static and dynamic analysis was also constructed to target these components with the aim to achieve greater code coverage, efficiency and to allow attacks on other privileged components within macOS via IPC.

    Finally we will discuss the issues discovered by the fuzzers and highlight future improvements which could be made to the tooling going forward to increase coverage and effectiveness.

    It is also the aim to release the code developed, easing other researchers who may wish to develop similar fuzzers and provide additional tooling to the macOS research community to aid in vulnerability hunting. Specifically we will release python tooling for capture, replay and mutation of macOS IPC based communication, corpus generation and monitoring, together with the existing kernel fuzzer platform integration targeting core kernel subsystems.




You can register for tickets here.

Get tickets

Accreditations & Certificates

MWR is an accredited member of The Cyber Security Incident Response Scheme (CSIR) approved by CREST (Council of Registered Ethical Security Testers).
MWR is certified under the Cyber Incident Response (CIR) scheme to deal with sophisticated targeted attacks against networks of national significance.
We are certified to comply with ISO 9001 and 14001 in the UK, internationally accepted standards that outline how to put an effective quality and environmental management systems in place.
MWR is certified to comply with ISO 27001 to help ensure our client information is managed securely.
As an Approved Scanning Vendor MWR is approved by PCI SSC to conduct external vulnerability scanning services to PCI DSS Requirement 11.2.2.
We are members of the Council of Registered Ethical Security Testers (CREST), an organisation serving the needs of the information security sector.
MWR is a supplier to the Crown Commercial Service (CCS), which provides commercial and procurement services to the UK public sector.
MWR is a Qualified Security Assessor, meaning we have been qualified by PCI to validate other organisation's adherence to PCI DSS.
As members of CHECK we are measured against high standards set by NCSC for the services we provide to Her Majesty's Government.
MWR’s consultants hold Certified Simulated Attack Manager (CCSAM) and Certified Simulated Attack Specialist (CCSAS) qualifications and are authorized by CREST to perform STAR penetration testing services.