Cedric Halbronn

407 Followers
175 Following
349 Posts
Security researcher
Pwn2Own 2021, Pwn2Own 2022
#RE #exploitdev
Websitehttps://ezseclab.com/
Today is your last chance to register to my Windows Kernel Exploitation training delivered at #hexacon in Paris/France https://www.hexacon.fr/trainer/halbronn/
Hexacon - Conference – Speakers

Discover the accepted talks for this edition!

Hexacon
Want to move to Real World Binary Exploitation? Grab this last opportunity of the year and register to my Windows Exploit Engineering Foundation training at #hexacon https://www.hexacon.fr/trainer/halbronn/
Hexacon - Conference – Speakers

Discover the accepted talks for this edition!

Hexacon
Has anyone had/decided-not-to-have an intern specifically in a vuln research team? We're debating it at work but some people are skeptical WRT the amount of work we'd be putting in mentoring (we aren't prepared to half-ass it), vs the amount of business value we'd get out. Candidates are strong (having CVEs for example) but it's a big ask to put them on a fortigate (for example) and expect results - and at the same time, it's not fair to give an intern a hard project which is likely going to give them a confidence hit. How did you / how could I manage this? Ideally I don't want to give interns non-research work (like the usual 'set up a lab'), I know they want to be finding bugs. Plus we've got the university sponsoring it wanting clear projects and targets, which can be really difficult in a research team. Any tips? If it helps, our team looks at 0day/nday and our usual output is blogposts and fingerprinting scripts (usually fingerprinting via exploitation - we'd much rather exploit a vuln and detect that than rely on stuff like banners).
3 more weeks before my Windows Kernel Exploitation training at #HEXACON2024
Don't miss out! More info on contents -> https://www.hexacon.fr/trainer/halbronn/
Hexacon - Conference – Speakers

Discover the accepted talks for this edition!

Hexacon
Want to move to Real World Binary Exploitation? Grab this last opportunity of the year and register to my Windows Exploit Engineering Foundation training at #hexacon https://www.hexacon.fr/trainer/halbronn/
Hexacon - Conference – Speakers

Discover the accepted talks for this edition!

Hexacon

I am excited to be back and offer the in-person training course at the awesome conference, #hexacon

https://www.hexacon.fr/trainer/tanda/

Gain hands-on experience with virtualization and learn real-world applications of it.

Hexacon - Conference – Speakers

Discover the accepted talks for this edition!

Hexacon
If you want to learn about real-life bug exploitation in general, my Windows Exploit Engineering Foundation training is what you need. Your last chance to attend of the year will be at Hexacon in October. Register before it is too late https://www.hexacon.fr/trainer/halbronn/
Hexacon - Conference – Speakers

Discover the accepted talks for this edition!

Hexacon

Threw together a quick blog post: WinDbg Time Travelling Debugger is Amazing Magic.

I didn’t know this was a thing at all! It’s shockingly easy to use. Feels like something more people should know about.

https://www.forrestthewoods.com/blog/windbg-time-travelling-debugger-is-amazing-magic/

WinDbg Time Travelling Debugger is Amazing Magic

Intro to WinDbg's amazing Time Travelling Debugger.

If you want to learn about real-life bug exploitation in general, my Windows Exploit Engineering Foundation training is what you need. Your last chance to attend of the year will be at Hexacon in October. Register before it is too late https://www.hexacon.fr/trainer/halbronn/
Hexacon - Conference – Speakers

Discover the accepted talks for this edition!

Hexacon
Today, 16 years ago, Debian published a security advisory announcing CVE-2008-0166, a severe bug in their OpenSSL package that effectively broke the random number generator and limited the key space to a few ten thousand keys. The vulnerability affected Debian+Ubuntu between 2006 and 2008. In 2007, an email signature system called DKIM was introduced. Is it possible that people configured DKIM in 2007, never changed their key, and are still vulnerable to CVE-2008-0166? https://16years.secvuln.info/
16 years of CVE-2008-0166 - Debian OpenSSL Bug

Many DKIM setups used cryptographic keys vulnerable to the 2008 Debian OpenSSL Bug (CVE-2008-0166) in 2024.