Posts

Showing posts from July, 2018

Getting ready for Black Hat?

Image
Getting ready for Black Hat? August is right around the corner, our favorite time of the year - Black Hat and DEF CON! SCYTHE is gearing up for a great week in Las Vegas - and we’re especially excited because this is our first official hacker summer camp since officially launching the company last October. Here’s a bit of what we’ll be up to! SCYTHE  will make it’s official debut on Wednesday, August 8 and Thursday, August 9 at the Black Hat Innovation City. To jump-start the day, SCYTHE will be hosting a nice breakfast with our friends at  StackRox . RSVP  here ! Then swing by our exhibit in booth IC2432 on the Business Hall Floor, or better yet, hit us up to  schedule  some one-on-one demo time to see the SCYTHE platform live in action. Friendly SCYTHE experts will be there to provide opportunities to see the SCYTHE automated breach simulation platform and discuss how it might help your organization by providing continuous enterprise insight.  Afte...
Image
Crash Triage Process People tend to think that when a fuzzer finds a bunch of crashes that it’s exciting and fun, and it is… the first time.  However, when there are 181 supposedly-unique crashes and it’s time to go through each of them to determine the impact (aka which ones are exploitable, as opposed to only denial of service), it’s a lot less fun.  In fact, it can be downright grueling. Here’s what the process really looks like: Seed files -> Fuzzers -> Crashing inputs Crashing inputs -> Minimization -> Bucketing -> Per bug crashes Per bug crashes -> automated analysis -> automated triage report Automated triage report + input file -> Human using disassemblers and debuggers -> Proof of Concept Proof of Concept -> exploit development -> exploit If you’re looking for academic work on this topic, it’s often called “root cause analysis” in the literature.  As each step in this process could easily span a series of several lon...