Hoofdnavigatie overslaan

Sla dit evenement op

Evenement opgeslagen

OWASP Netherlands Chapter Meeting, 12 Oktober 2017

OWASP Netherlands Chapter

Donderdag 12 oktober 2017 van 18:00 tot 21:30 (CEST)

OWASP Netherlands Chapter Meeting, 12 Oktober 2017


Type Resterend Einde Aantal
Deelnemer   meer info 81 Tickets 10 okt. 2017 Gratis  

Wie gaat erheen?

Je verbindingen laden...

Deel OWASP Netherlands Chapter Meeting, 12 Oktober 2017


OWASP Netherlands Chapter Meeting October 12th, 2017




Playing in the Sandbox: Bypassing Adobe Flash Input Validation

Sandboxing is a popular technique used by vendors to minimize damages that applications might potentially inflict on a system. Dictated by so-called sandbox policies, legitimate and malicious code alike are restricted in their trust boundaries, preventing unauthorized actions.

Input validation plays an important role in enforcing sandbox policies. With input validation, context often matters: given some policy set, some input may be allowed, while the same input may be invalid given another. File paths are a notable example. In Adobe Flash Player, the "remote" sandbox prohibits local file system access but enables remote connections, while the "local-with-filesystem" sandbox enables the opposite use case.

While being a seemingly simple input format, validating file paths becomes increasingly complicated when considering the entire picture. With Flash constituting the intermediate glue between operating systems and a range of host environments - web browsers, Microsoft Office, PDF readers - one has a diverse landscape of path schemes to consider. This leads to challenges in proper input validation, and as it turns out, subtle but unforgiving mistakes.

This talk examines two sandbox escape vulnerabilities I have recently found in Adobe Flash.

Tracked as CVE-2016-4271, the first vulnerability details a local sandbox escape through bypassing input validation, enabling to exfiltrate local data and obtain Windows user credentials. The second vulnerability, dubbed CVE-2017-3085, extends the vulnerability to include a remote sandbox escape, showing by extension that Adobe's patch for the first vulnerability incompletely solved the issue. In analyzing these vulnerabilities, we review the underlying causes that rendered them possible: arbitrary definitions of what constitutes "remote" and "local", insufficient input validation schemes, and unmitigated platform-specific vulnerabilities. Finally, in light of recent efforts to deprecate Adobe Flash, we also discuss how Flash will remain important in the short and long term - as an attack vector, and as an object of study.

How to rob a bank

We are going to digitally rob a bank. Not for profit, but as a friendly match against the security team of this bank. We believe that only perfect practice makes perfect: by simulating an attack as realistically as possible, an organisation is optimally prepared for real incidents. Expect a very practical presentation about modern hacker techniques combined with lessons learned from security teams in defending against targeted attacks.


Björn Ruytenberg

Björn Ruytenberg is an Information Security student at Eindhoven University of Technology and Radboud University. Being a technology enthusiast, he has graduated in the field of Electrical Engineering, and cum laude in the field of Computer Science. His special interests include hardware and software security, in particular when the case at hand stretches across the former disciplines. Aside from his work as a software developer, he is an active participant in bug bounty programs.

Pieter Ceelen

Pieter’s first ‘hack’ was adjusting the sprites in Space Invaders on his MSX and claiming that the aliens now looked like his little sister. 15 Years later he later turned his hobby into profession at KPMG, hacking and advising multinational companies (instead of Space Invaders). In 2016, together with three other experts, Pieter founded Outflank: a company specialised in red teaming and attack simulations. Besides being a very experienced hacker and pentester, Pieter brings years of incident response, forensics and threat intelligence knowledge to the table. This allows him to tune his attacks and use the tools and techniques employed by real attackers in red teaming and attack simulations.


Beta-faculty Huygensgebouw
Heyendaalseweg 135, 6525 AJ Nijmegen
Parkeergarage P11


The OWASP Netherlands Chapter is sponsored by:

200x60 netsparker logo.pngVeraCode logo.pngVest.jpgIntigriti verticaal.jpgEcurify-2016.pngHPE logo 250.pngLogo Informatiebeveiliging-200.pngNixu-logo.pngLogo xebia.jpg

Heb je vragen over OWASP Netherlands Chapter Meeting, 12 Oktober 2017? Neem contact op met OWASP Netherlands Chapter

Sla dit evenement op

Evenement opgeslagen

Waar en wanneer

Radboud Universiteit Nijmegen
Heyendaalseweg 135
6525AJ Nijmegen

Donderdag 12 oktober 2017 van 18:00 tot 21:30 (CEST)

  Aan mijn agenda toevoegen


OWASP Netherlands Chapter

OWASP Foundation is a professional association of global members and is open to anyone interested in learning more about application security. Local chapters are run independently and governed by the Chapter Leader Handbook. As a 501(c)(3) non-profit professional association.

  Contact opnemen met de organisator
OWASP Netherlands Chapter Meeting, 12 Oktober 2017
Evenementen in Nijmegen Netwerkevents Wetenschap en tech

Ben je geïnteresseerd in het organiseren van je eigen evenement?

Doe mee met miljoenen mensen op Eventbrite.

Log in of meld je aan

Je kunt deze tickets alleen in termijnen betalen als je een Eventbrite-account hebt. Log in of meld je aan voor een gratis account om door te gaan.