TALKS & SPEAKERS

Two days of conferences | 15 talks | 23 speakers

Click on a talk to see the speaker's presentation

0-click RCE on Tesla Model 3 through TPMS Sensors

David Berard, Thomas Imbert

0-click RCE on the IVI component: Pwn2Own Automotive edition

Mikhail Evdokimov

AMD Sinkclose: Universal Ring -2 Privilege Escalation

Enrique E Nissim, Krzysztof Okupski

Defense through Offense: Building a 1-click Calling Exploit targeting Messenger for Android

Andrew Calvano, Octavian Guzu, Ryan Hall

DMAKiller: Unleashing the Power of DMA to Escape from QEMU/KVM

Yongkang Jia, Yiming Tao, Xiao Lei

Exploiting File Writes in Hardened Environments - From HTTP Request to ROP Chain in Node.js

Stefan Schiller

Guest Revolution: Our Story of Compromising the Host Kernel from the VMware Guest

Junoh Lee, Gwangun Jung

HSM Security and Exploitation of USB over SPI bug

Sergei Volokitin

Caught in the wild, past, present and future

Clem1

Proxying to Kernel : Streaming vulnerabilities from the Windows Kernel

An-Jie Yang

Pwning Blockchain for Fun and Profit: Exploiting an RCE Vulnerability in the Solana validator

Ginoah

Tales of a RCE in a video game

Thomas Dubier

Unleashing a 0day: Pivoting Capabilities and Conquering the Linux Kernel

Pedro Pinto

Utilizing Cross-CPU Allocation to Exploit Preempt-Disabled Linux Kernel

Mingi Cho, Wongi Lee

What the hell is Windows's CLIP Service - Reversing and exploiting the obfuscated code at its core

Philippe Laulheret

0-click RCE on Tesla Model 3 through TPMS Sensors

Abstract

This presentation describes the research we did for Pwn2Own Vancouver 2024, specifically targeting the Tesla Model 3.
Tesla has designed an Electronic Control Unit (ECU) for security access, named VCSEC. This critical component is responsible for interfacing with users’ smartphones to unlock and start the vehicle, as well as managing the Tire Pressure Monitoring System (TPMS) features.

TPMS sensors, integrated into the car tires, continuously monitor and report tire pressure to the central system. If the tire pressure deviates from the optimal range, the user receives a warning via the infotainment user interface.

VCSEC incorporates multiple communication interfaces. Both TPMS sensors and smartphones use Bluetooth Low Energy (BLE) to communicate with the ECU. Additionally, smartphones can employ the Ultra Wide Band (UWB) interface for enhanced communication.

The core of this presentation is based around a critical vulnerability identified in the TPMS message handling process. This flaw enables remote code execution within the VCSEC, a highly sensitive ECU, allowing attackers to inject and execute arbitrary code.

Consequently, the attacker can send Controller Area Network (CAN) messages across the vehicle’s bus, potentially manipulating other interconnected ECUs.

Furthermore, we will showcase a method to introduce a TPMS sensor without requiring any user interaction, thus demonstrating a true 0-click exploit scenario.

Speakers

David Berard

Synacktiv
@_p0ly_

Bio

David Berard is a security expert in Synacktiv's engineering team. He is specialized in mobile and embedded systems reverse engineering, vulnerability research and exploit development.

Thomas Imbert

Synacktiv
@masthoon

Bio

Thomas Imbert is a security engineer at Synacktiv and previously worked at Microsoft. His area of expertise is in reverse engineering and vulnerability research, with a particular focus on the Windows operating system. He has spoken at several conferences including PacSec and Hack.lu. He has won Pwn2Own Austin 2021 and Vancouver 2023 competitions with his company Synacktiv.

0-click RCE on the IVI component: Pwn2Own Automotive edition

Abstract

As the interest in the automotive security domain dramatically increased throughout the past several years, In-Vehicle Infotainment (IVI) systems became desirable targets for security research activities. These systems, central to a car’s entertainment, navigation, and connectivity functions, have become prime targets for automotive security research due to their extensive integration with other vehicle systems and their potential exposure to external attacks. This led to their appearance as a separate category at the brand-new Pwn2Own Automotive 2024 competition in Tokyo.

The specific target Alpine Halo9 iLX-F509 IVI integrates a variety of external interfaces, including WLAN, Bluetooth, and USB. This rich combination of connectivity options has made the device an intriguing subject for security research. Each interface introduces its own set of potential vulnerabilities and attack vectors, prompting researchers to explore how these different communication channels could be exploited.

In this talk, we delve into the world of IVI systems, showcasing a 0-click RCE exploitation of a slick Use-After-Free (UAF) vulnerability in Bluetooth stack. The vulnerability was revealed during the Pwn2Own competition, where it demonstrated how the PCAutomotive team could achieve full RCE on behalf of the root user without any user interaction involved. We will guide you through the entire process, from the initial discovery of the vulnerability to the meticulous steps involved in crafting a 96% reliable exploit. The session begins with an overview of Alpine Halo9 hardware enumeration and the Bluetooth stack architecture within Alpine IVI systems, highlighting the specific components and mechanisms that are related to the UAF flaw. The exploitation phase will be discussed in detail, showing how the UAF vulnerability was leveraged to gain Arbitrary Address Read (AAR) and Arbitrary Address Write (AAW) primitives leading to remote code execution. Finally, we will explore the broader implications of this vulnerability, discussing its impact on the security of IVI systems and the potential risks it poses to the end-users.

Speakers

Mikhail Evdokimov

PCAutomotive
@konatabrk

Bio

Mikhail Evdokimov aka konata is a Senior Security Researcher at PCAutomotive's Security Assessment Team. He specializes in vulnerability research, exploit development, and reverse engineering. His main focus of research is wireless technologies, embedded systems, and kernels.

AMD Sinkclose: Universal Ring -2 Privilege Escalation

Abstract

System Management Mode (SMM) is one of the most powerful execution modes in the x86 architecture and code at this level is invisible to the Hypervisor and OS-level protections, including anti-cheat engines and anti-virus systems. While the BIOS ecosystem’s complexity has led to a multitude of vulnerabilities in firmware over time, vendors are now making strides in delivering patches with greater speed and efficiency. Unfortunately, these efforts are not enough in the presence of a CPU vulnerability.

When studying the documentation of the AMD processor, our team noticed a flaw in one of the critical components required for securing SMM. This silicon-level issue appears to have remained undetected for nearly two decades.

This presentation starts by providing an introduction to SMM and the security mechanisms that the AMD processor provides to support it. Subsequently, it delves into the CPU design flaw and the complete methodology and engineering used to create a universal ring -2 privilege escalation exploit.

Speakers

Enrique E Nissim

IOActive

Bio

Enrique Nissim is a security engineer with over 12 years of professional experience working on vulnerability research. As a Principal Security Consultant at IOActive, he is mainly involved in projects requiring a deep understanding of operating systems, CPU architectures, embedded firmware and software development. Over his career, Enrique has contributed to the security industry with numerous open source tools and has also delivered multiple presentations at several leading events including Black Hat USA, DEF CON, CansecWest, Ekoparty, ZeroNights and Hardwear.io.

Krzysztof Okupski

IOactive
@exminium

Bio

Krzysztof Okupski is a Senior Security Consultant with IOActive where he specializes in embedded security. While he enjoys hacking various targets, he is particularly interested in the nitty-gritty details of platform security where small misconfigurations can lead to critical issues.

Defense through Offense: Building a 1-click Calling Exploit targeting Messenger for Android

Abstract

Messenger is one of the most popular mobile messaging applications in the world with over 1 billion users. Messenger contains a significant amount of C and C++ code, much of which is remotely reachable by clients through messaging and calling attack vectors. Additionally, Messenger is transitioning to a default end to end encrypted experience for messaging and calls providing significant privacy benefits but at the same time shifting more of the application’s attack surface from the server to the client. These factors together contribute to the application being an attractive exploitation target.

To better understand what exploitation looks like on Messenger, we conducted an exercise to build an end to end exploit assuming a remote attacker. The goals were to understand the state of the application’s exploit mitigations and identify areas for improvement. Exploit development is often nuanced based on the target and we wanted to identify and create primitives that were unique to Messenger. The exercise was successful resulting in the creation of a 1-click calling exploit targeting Messenger for Android.

In this presentation, we will first introduce the exploitation scenario and highlight the four internally discovered vulnerabilities we leveraged. These vulnerabilities span features such as calling, messaging, and AR effects. Then we will walk through how we built individual primitives out of these vulnerabilities and chained them together. Specifically, we will explain in detail how we constructed our chain to execute arbitrary code in the Messenger application and how we bypassed modern Android exploit mitigations such as NX pages, ASLR, and the hardened Scudo allocator. Finally, we will walk through the exploit mitigation improvements we identified while building the exploit and how they would have made exploitation much more difficult.

Speakers

Andrew Calvano

Meta

Bio

Andrew is a Security Engineer on Meta’s Product Security team in the United States of America. Andrew’s background is in vulnerability research, reverse engineering, and computer science. He is currently working on securing Messenger and cross platform code used across the Meta family of apps.

Octavian Guzu

Meta
@GuzuOctavian

Bio

Octav is a Security Engineer working for Meta's Product Security team in London, UK. Initially, his work was to detect bugs and raise the security bar of Reality Labs devices. He has then moved to work on Meta's family of apps, where he's currently tackling the security challenges of Messenger.

Ryan Hall

Meta

Bio

Ryan Hall is an Offensive Security Engineer on Meta’s Red Team X where he helps assess the security of the 3rd party software and hardware that Meta relies on. He is an avid vulnerability researcher and reverse engineer who enjoys hacking anything and everything, but has a particular interest in platform and firmware security. Prior to focusing on security, Ryan worked as a kernel developer enabling network devices for high performance computing.

DMAKiller: Unleashing the Power of DMA to Escape from QEMU/KVM

Abstract

In this talk, we will analyze the vendor’s defense design for DMA reentrancy and explain the important flaws in detail. Then, we will detail a reentrancy case which can be used to construct a double free vulnerability in virtio-gpu device while bypass the reentrancy check. At the same time, we will show how to turn a double free vulnerabilty to a arbitrary address write(AAW) by leveraging DMA transfer of virtio devices, which makes the hard-to-exploit vulnerability exploitable-we call this cross-virtio attack. Besides, we will show another reentrancy case bypassing the reentrancy check, which can be used to leak information and affects most DMA devices. Finally, combine AAW with infomation leakage, we will demonstrate how to achieve a full guest-to-host escape exploitation.

Speakers

Yongkang Jia

@J_kangel

Bio

Yongkang Jia(@J_kangel) is a security reseacher. His research focuses on Hardware Security and System Security, especially Virtualization Security. He has reported several vulnerabilities in KVM、QEMU, which were confirmed and credited in multiple advisories. He spoke at HITB2023HKT.

Yiming Tao

Bio

Yiming Tao is a Master student at Zhejiang University, China, under the supervision of Chunming Wu. His research focuses on System Security, especially Virtualization Security.

Xiao Lei

Bio

Xiao Lei is a security researcher. He is a member of the AAA CTF Team. He also plays DEFCON CTF as a member of Katzebin. His research focuses on System Security, especially Virtualization Security. He has reported several vulnerabilities in QEMU and Virtualbox. He spoke at HITBSecConf2023HKT and attened DAF contest in Geekcon 2024 Singapore station.

Exploiting File Writes in Hardened Environments - From HTTP Request to ROP Chain in Node.js

Abstract

Have you ever discovered a file write vulnerability in a web application? If so, this was probably an easy win for RCE. In PHP, it’s enough to write and trigger a .php file. In Python, you can create a site-specific configuration hook, and in other languages, templating files make a good target. You could also employ more generic techniques like dropping an SSH pub key or creating a cronjob. Depending on the web application and the underlying operating system, there are plenty of ways to turn a file write into arbitrary code execution.

But what if your target’s file system is mounted read-only? This makes a file write vulnerability pretty useless. However, on Linux, everything is a file. By leveraging the procfs pseudo file system, unconventional attack surfaces can be reached that are usually not considered in common threat models.

In this talk, we will deep-dive into a Node.js case study and showcase how an HTTP request eventually triggers a ROP chain in Node.js itself to gain remote code execution. While the technique showcased reliably turns a file write vulnerability to RCE for a Node.js application, we see more potential in it and hope to inspire you to pop more shells in hardened environments.

Speakers

Stefan Schiller

Sonar
@scryh_

Bio

Stefan Schiller is a Vulnerability Researcher in the Sonar R&D team. He has been passionate about software and programming since his early childhood. With a background in red teaming, he has been working in the field of offensive IT security for quite a while now. At Sonar, he finds and responsibly discloses vulnerabilities in popular open-source software.

Guest Revolution: Our Story of Compromising the Host Kernel from the VMware Guest

Abstract

In this presentation, we talk about our VMware full chain exploitation showcased at Pwn2Own 2024. We discuss the architecture and attack surface of VMware, followed by a technical analysis into the vulnerabilities we exploited, including information leakage and arbitrary code execution. And we cover our approach to exploiting these vulnerabilities, especially focusing on the challenges we faced and the methodologies to overcome them. Additionally, we will cover a Windows Kernel Elevation of Privilege vulnerability, introducing new exploitation primitive techniques. We then demonstrate how we chained these exploits to achieve a comprehensive attack, concluding with insights and future implications of our work.

Speakers

Junoh Lee

Theori
@bbbig12

Bio

Junoh Lee is vulnerability researcher at Theori. He is interested in reverse engineering and finding a new attack vector, mostly in major OS like Windows and Mac OS. Also, he is interested in exploit techniques, such as writing exploit codes for the latest vulnerabilities by researching ways to bypass the latest mitigations. He is also a CTF player and has played in various world competitions such as DEFCON and WCTF.

Gwangun Jung

Theori
@pr0Ln

Bio

Gwangun Jung is a security researcher at Theori. His main research areas are operating systems, virtualization, red teaming. He is the Pwn2own Vancouver 2024 Virtualization category winner targeting VMware Workstation and received CVEs from Linux/VMware/etc.

HSM Security and Exploitation of USB over SPI bug

Abstract

A Hardware Security Module (HSM) is one of the most secure devices designed to store cryptographic keys securely and prevent attacks ranging from remote to physical access. This talk will offer an in-depth exploration of HSM security and present a vulnerability discovered in PowHSM, an open-source HSM solution built on the Ledger Nano S device. The presentation will detail the process of identifying the vulnerability in the USB stack and demonstrate a proof-of-concept (PoC) for recovering private keys from the device.

Speakers

Sergei Volokitin

Bio

Sergei Volokitin is an independent security researcher with the focus on embedded security and mobile devices. He has a number of publications on Java Card platform attacks and conference presentations on hardware security.

Caught in the wild, past, present and future

Abstract

Keynote

Speakers

Clem1

Google TAG
@_clem1

Bio

Clement Lecigne comes from a vuln-dev background and now researches government-backed hacking threats for the Google Threat Analysis Group. He is especially looking at threat actors using exploits to achieve their goals. In 2023 the Threat Analysis Group caught 25 0-days exploits used in-the-wild and affecting a wide range of products.

Proxying to Kernel : Streaming vulnerabilities from the Windows Kernel

Abstract

Over the past few decades, the attack surface in in-the-wild vulnerabilities has gradually shifted from Win32k to CLFS. Microsoft has been consistently and actively patching these vulnerabilities. Who might become the next target? Last year, MSKSSRV became a hot target for hackers. However, it is just a part of the Kernel Stream.
In this presentation, we are going to reveal the long-overlooked attack surface for priviledge escalation in the Windows Kernel, which we exploited to identify over 10 vulnerabilities in just a few months. Our successful Windows LPE at Pwn2Own Vancouver 2024 was actually one of these vulnerabilities, and it was just the tip of the iceberg. That also allows us to compromise across systems from Windows 7 to Windows 11. Additionally, we delve into a novel proxy-based logical bug class used at Pwn2Own that enables us to pivot ourselves into the kernel to ignore most validations. Meanwhile, we will demonstrate how this kind of bug class can lead to severe consequences, making exploitation straightforward.
Through this talk, we’ll share our discovery of this attack surface and the bug class, providing some case studies on the power and elegance of this type of vulnerabilities. We’ll also introduce techniques for identifying and exploring similar vulnerability patterns, empowering attendees to discover and mitigate future security issues in the Windows ecosystem.

Speakers

An-Jie Yang

DEVCORE
@scwuaptx

Bio

An-Jie Yang, aka Angelboy, is a senior security researcher of DEVCORE and a member of CHROOT security group from Taiwan. He is a vulnerability researcher focusing on Windows related security. He participated in a lot of CTF, such as HITB, DEFCON, Boston key party and won 2nd in DEFCON CTF 25/27 with HITCON CTF Team. In the past two years, he has pwned several products in Pwn2Own Mobile. He also won the title of the “Master of Pwn” at Pwn2Own Toronto 2022 with the DEVCORE team. He has spoken at several conferences such as HITCON, VXCON, AVTokyo, HITB GSEC.

Pwning Blockchain for Fun and Profit: Exploiting an RCE Vulnerability in the Solana validator

Abstract

Blockchain security is not all about smart contracts! While extensive research has been conducted on all kinds of smart contracts, analysis of the underlying infrastructure powering blockchains remains relatively rare. The lack of research in blockchain nodes leaves an enormous attack surface untapped, especially when considering that the complexity of blockchain is akin to browsers and virtual machines, often involving custom VMs, JIT, and not to mention other unique threat models such as consensus failure between validators.

Compared to smart contract bugs, vulnerabilities in the blockchain’s underlying node software can have a far greater impact. A compromised validator undermines the entire network’s integrity by enabling attackers to disrupt or control transactions, manipulate token balances, and eclipse the trustworthiness of the blockchain. With tens of billions of on-chain assets at stake, blockchains are definitely worthy targets to explore.

In this talk, we focus on Solana, a popular blockchain implemented in Rust, which is designed to maximize transaction throughput and address scalability limits seen in other blockchains. We will discuss an RCE bug in the Solana validator, which grants attackers the ability to virtually do anything to the blockchain, from minting new tokens out of thin air to taking over the servers running validators and stealing validator’s private keys. The bug was introduced during Solana’s transition from version 1.14 to 1.16, where a new runtime optimization was implemented. We will provide an overview of Solana’s architecture, examine its internal data storage model design, and explain how the Solana runtime VM interacts with the data storage. Finally, we will conduct a detailed analysis of the bug and its exploitation process, offering insights and guidance for future researchers.

Speakers

Ginoah

@g1n04h

Bio

Ginoah is a vulnerability researcher and former captain of the Balsn CTF team. With a background in red teaming, he pursues bug bounties in his spare time with a few friends under the handle Anatomist.

Tales of a RCE in a video game

Abstract

This talk dives into multiple vulnerabilities in Neverwinter Night Enhanced Edition, an RPG game developed by BioWare in 2002 and reedited by Beamdog in 2018. The game has been receiving regular updates since it’s re-release and there is a small community that play online. In this presentation i will explain how a malicious server can achieve arbitrary code execution on players.

Speakers

Thomas Dubier

Synacktiv
@tomtombinary

Bio

Thomas Dubier is a security researcher and member of Synacktiv's Reverse Engineering team. He has a background in malware analysis and embedded systems reverse engineering. In his free time, he is interested in video games security and published about it.

Unleashing a 0day: Pivoting Capabilities and Conquering the Linux Kernel

Abstract

Some memory corruptions may seem unlikely to be exploitable but hide a secret power waiting to be awakened. In this presentation, I’ll discuss how achieving intermediate capabilities from constrained bugs can lead to generic and well-defined exploitation strategies.
To better understand this, we’ll visit a fairly restrictive Linux Kernel 0-day vulnerability I’ve discovered and exploited to capture the flag of the KernelCTF VRP and win a reward.

Speakers

Pedro Pinto

Ottersec
@_0xTen

Bio

Pedro Pinto is a security researcher specializing in Linux kernel exploitation. He has competed in major CTF events, including the DEF CON CTF Finals 2022 with ELT and Crusaders of Rust. At Ottersec, he focuses on the low-level aspects of blockchain infrastructure and Linux kernel vulnerability research.
From 2022 to 2023, Pedro researched kernel security and binary exploitation at Northwestern University under the guidance of Professor Xinyu Xing.
In early 2024, Pedro exploited the kernelCTF VRP twice: first by patch-gapping a 1-day vulnerability to develop a universal exploit, and second by exploiting a highly restrictive 0-day, for which he received a reward.

Utilizing Cross-CPU Allocation to Exploit Preempt-Disabled Linux Kernel

Abstract

The Linux kernel is widely used in cloud servers, mobile devices, automotive, and more, and its security is becoming increasingly important. To discover vulnerabilities in the Linux kernel, there are bug bounty programs such as Pwn2Own, KernelCTF, and Android VRP.

In this talk, we exploit two vulnerabilities CVE-2023-31248 and CVE-2024-36978. To exploit these vulnerabilities, we introduce a novel exploitation technique “Cross-CPU Allocation”. The first vulnerability is CVE-2023-31248, a vulnerability found in nftables, which was exploited at Pwn2Own 2023. The second vulnerability is CVE-2024-36978, a vulnerability found in the traffic control subsystem found by Hangyu Hua and was firstly exploited by Wongi Lee at the mitigation kernel of kernelCTF. We will discuss the challenges we encountered during the exploit and how we solved them.

Speakers

Mingi Cho

Theori

Bio

Mingi Cho is a senior vulnerability researcher at Theori. His research interests include Linux kernel security and fuzzing. He has recently received rewards from bounty programs such as the KernelCTF, Android VRP, and ChromeOS VRP, and successfully demonstrated an Ubuntu LPE at Pwn2Own 2023. He received his Ph.D. degree in Information Systems from Yonsei University and has published security research papers at conferences, including ACM CCS and USENIX Security. In addition, he has spoken at conferences such as Zer0Con and .HACK.

Wongi Lee

Theori

Bio

Wongi Lee is a junior researcher at Theori. His research interests include Linux kernel security. He is also a CTF player who has competed in various world competitions such as HITCON and DEFCON. He is currently pursuing his bachelor's program at POSTECH.

What the hell is Windows's CLIP Service - Reversing and exploiting the obfuscated code at its core

Abstract

If you’ve ever opened an official Windows driver in IDA, you’ve likely been greeted with some nice quality of life features: the Windows SDK is fairly well documented, Microsoft is amazing and provides symbols that makes reversing so much easier, and so on. But not so fast buckaroo! Open the mysterious CLIP Service driver to be greeted with the sad-face message “.pdb not found” and even worse, half the code is complete gibberish (and by that we don’t mean AT&T syntax). Obfuscated code sections, obfuscated APIs, undocumented kernel structures, quite a mysterious conundrum that makes our reverser-spidey senses tingle. Is there anything spicy hiding in there? Well, let’s find out!

The talk will go over how to deobfuscate this driver implementing Licensing and System Policy, how to communicate with its various APIs and document some of these mysterious data structures the windows kernel uses to communicate with it. We will also cover the vulnerabilities we found and some potential exploitation strategies. Come for the mystery, stay for the exploration of an exciting attack surface!

Speakers

Philippe Laulheret

Cisco Talos
@phLaul

Bio

Philippe Laulheret is a Senior Vulnerability Researcher at Cisco Talos. With a focus on Reverse Engineering and Vulnerability Research, Philippe uses his background in Embedded Security and Software Engineering to poke at complex systems and get them to behave in interesting ways. Philippe presented multiple projects covering hardware hacking, reverse engineering and exploitation at DEF CON, Hardwear.io, Eko Party and more. In his spare time, Philippe enjoys playing CTFs, immersing himself in the beauty of the Pacific Northwest, and exploring the realm of Creative Coding. Philippe holds a MSc in Computer Science from Georgia Tech and a MSc in Electrical and Computer Engineering from Supélec (France).

Prepare your venue at Hexacon

Brace yourselves, it is going to be amazing

Reserve your place

Trainings

Agenda