Excited to announce that I will be presenting at BSides Singapore this year.
The topic is adversarial usage of virtual machines during lateral movement. And we will also cover threat hunting and detection ideas.
I have been referring to this technique as the Shadowbunny over the years. :)
The conferences is on September 24th-25th, it will be all virtual and free to attend. Check out the BSidesSG 2020 website and schedule for other talks and details.
My parents were first-generation immigrants from India. They worked hard, made Singapore their home and took all and any challenges head on. They have always lived by the simple philosophy, 'to be the change'. It's a philosophy that I try to live too, and in many ways it's what attracted me to Akamai not too long ago.
Today I’m gonna talk about a class of application security issues I ran across a few times over the years. In particular, let’s discuss race conditions when it comes to files with sensitive content and permissions.
Race conditions can allow an adversary to gain access to sensitive information on machines. Assume a system creates a file that contains sensitive information and afterwards applies permissions to lockdown that file.
Understanding the race condition Let’s look at a practical example seen in the wild a few times.