<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>DEF CON on System Overlord</title><link>https://systemoverlord.com/tags/def-con.html</link><description>Recent content in DEF CON on System Overlord</description><generator>Hugo</generator><language>en-us</language><managingEditor>david@systemoverlord.com (David Tomaschik)</managingEditor><webMaster>david@systemoverlord.com (David Tomaschik)</webMaster><lastBuildDate>Wed, 20 Jul 2022 00:00:00 +0000</lastBuildDate><atom:link href="https://systemoverlord.com/tags/def-con/index.xml" rel="self" type="application/rss+xml"/><item><title>Returning to Hacker Summer Camp</title><link>https://systemoverlord.com/2022/07/20/returning-to-hacker-summer-camp.html</link><pubDate>Wed, 20 Jul 2022 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2022/07/20/returning-to-hacker-summer-camp.html</guid><description>&lt;p&gt;It&amp;rsquo;s that time of year again &amp;ndash; Hacker Summer Camp. (Hacker Summer Camp is the
~weeklong period where several of the largest hacker/information security
conferences take place in Las Vegas, NV, including DEF CON and Black Hat USA.)
This will be the 3rd year in a row where it takes place under the spectre of a
worldwide pandemic, and the first one to be fully in-person again.
&lt;a href="https://bsideslv.org/"&gt;BSidesLV&lt;/a&gt; has returned to in-person, &lt;a href="https://defcon.org/html/defcon-30/dc-30-index.html"&gt;DEF
CON&lt;/a&gt; is in-person only,
&lt;a href="https://www.blackhat.com/"&gt;Black Hat&lt;/a&gt; will be in full swing, and
&lt;a href="https://ringzer0.training/"&gt;Ringzer0&lt;/a&gt; will be offerring in-person trainings.
It&amp;rsquo;s &lt;em&gt;almost&lt;/em&gt; enough to forget there&amp;rsquo;s still an ongoing pandemic.&lt;/p&gt;
&lt;p&gt;I did attend last year&amp;rsquo;s hybrid DEF CON in person, and I&amp;rsquo;ve been around a few
times, so I wanted to share a few tidbits, especially for first timers.
Hopefully it&amp;rsquo;s useful to some of you.&lt;/p&gt;</description></item><item><title>Hacker Summer Camp 2019: The DEF CON Data Duplication Village</title><link>https://systemoverlord.com/2019/09/05/hacker-summer-camp-2019-the-def-con-data-duplication-village.html</link><pubDate>Thu, 05 Sep 2019 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2019/09/05/hacker-summer-camp-2019-the-def-con-data-duplication-village.html</guid><description>&lt;p&gt;One last post from Summer Camp this year (it&amp;rsquo;s been a busy month!) &amp;ndash; this one
about the &amp;ldquo;Data Duplication Village&amp;rdquo; at DEF CON. In addition to talks, the Data
Duplication Village offers an opportunity to get your hands on the highest
quality hacker bits &amp;ndash; that is, copies of somewhere between 15 and 18TB of data
spread across 3 6TB hard drives.&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;d been curious about the DDV for a couple of years, but never participated
before. I decided to change that when I saw &lt;a href="https://amzn.to/2ZJNImn"&gt;6TB Ironwolf NAS
drives&lt;/a&gt; on sale a few weeks before DEF CON. I wasn&amp;rsquo;t
quite sure what to expect, as the description provided by the DDV is a little
bit sparse:&lt;/p&gt;</description></item><item><title>Hacker Summer Camp 2019: What I'm Bringing &amp; Protecting Yourself</title><link>https://systemoverlord.com/2019/07/27/hacker-summer-camp-2019-what-im-bringing.html</link><pubDate>Sat, 27 Jul 2019 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2019/07/27/hacker-summer-camp-2019-what-im-bringing.html</guid><description>&lt;p&gt;I&amp;rsquo;ve begun to think about what I&amp;rsquo;ll take to Hacker Summer Camp this year, and I
thought I&amp;rsquo;d share some of it as part of my Hacker Summer Camp blog post series.
I hope it will be useful to veterans, but particularly to first timers who might
have no idea what to expect &amp;ndash; as that&amp;rsquo;s how I felt my first time.&lt;/p&gt;
&lt;p&gt;Since it&amp;rsquo;s gotten so close, I&amp;rsquo;ll also talk about what steps you should take to
protect yourself.&lt;/p&gt;</description></item><item><title>Hacker Summer Camp 2019 Preview</title><link>https://systemoverlord.com/2019/05/02/hacker-summer-camp-2019-preview.html</link><pubDate>Thu, 02 May 2019 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2019/05/02/hacker-summer-camp-2019-preview.html</guid><description>&lt;p&gt;Every year, I try to distill some of the changes, events, and information
surrounding the big week of computer security conferences in Las Vegas. This
week, including &lt;a href="https://blackhat.com"&gt;Black Hat&lt;/a&gt;, &lt;a href="https://bsideslv.org"&gt;BSides Las
Vegas&lt;/a&gt;, and &lt;a href="https://defcon.org"&gt;DEF CON&lt;/a&gt;, is what some
refer to as &amp;ldquo;Hacker Summer Camp&amp;rdquo; and is likely the largest gathering of computer
security professionals and hackers each year.&lt;/p&gt;</description></item><item><title>Hacker Summer Camp 2018: Wrap-Up</title><link>https://systemoverlord.com/2018/08/25/hacker-summer-camp-2018-wrap-up.html</link><pubDate>Sat, 25 Aug 2018 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2018/08/25/hacker-summer-camp-2018-wrap-up.html</guid><description>&lt;p&gt;I meant to write this post much closer to the end of Hacker Summer Camp, but to
be honest, I&amp;rsquo;ve been completely swamped with getting back into the thick of
things. However, I kept feeling like things were &amp;ldquo;unfinished&amp;rdquo;, so I thought I&amp;rsquo;d
throw together at least a few thoughts from this year.&lt;/p&gt;
&lt;h2 id="bsides-las-vegas"&gt;BSides Las Vegas&lt;/h2&gt;
&lt;p&gt;I can&amp;rsquo;t say much about BSides as a whole this year, as I spent the entire time
Gold Teaming for Pros vs Joes CTF. (Gold Team is responsible for running the
game infrastructure, scoreboard, etc.) It was a great experience to be on Gold
Team, but I do miss having a team to support and educate. Overall, the CTF went
&lt;em&gt;fairly&lt;/em&gt; well, but there were a few bumps that I hope we can avoid next year.&lt;/p&gt;</description></item><item><title>I'm the One Who Doesn't Knock: Unlocking Doors From the Network</title><link>https://systemoverlord.com/2018/08/10/im-the-one-who-doesnt-knock-unlocking-doors-from-the-network.html</link><pubDate>Fri, 10 Aug 2018 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2018/08/10/im-the-one-who-doesnt-knock-unlocking-doors-from-the-network.html</guid><description>&lt;p&gt;&lt;img src="https://systemoverlord.com/img/blog/iot_hacker.png" alt="IoT Hacker"&gt;{:.right}&lt;/p&gt;
&lt;p&gt;Today I&amp;rsquo;m giving a talk in the &lt;a href="https://www.iotvillage.org"&gt;IoT Village&lt;/a&gt; at DEF
CON 26. Though not a &amp;ldquo;main stage&amp;rdquo; talk, this is my first opportunity to speak
at DEF CON. I&amp;rsquo;m really excited, especially with how much I enjoy IoT hacking.
My talk was inspired by the research that lead to
&lt;a href="https://systemoverlord.com/2017/12/18/cve-2017-17704-broken-cryptography-in-istar-ultra-ip-acm-by-software-house.html"&gt;CVE-2017-17704&lt;/a&gt;,
but it&amp;rsquo;s not meant to be a vendor-shaming session. It&amp;rsquo;s meant to be a
discussion of the difficulty of getting physical access control systems that
have IP communications features right. It&amp;rsquo;s meant to show that the designs we
use to build a secure system when you have a classic user interface don&amp;rsquo;t work
the same way in the IoT world.&lt;/p&gt;
&lt;p&gt;(If you&amp;rsquo;re at DEF CON, come check it out at 4:45PM on Friday, August 10 in the
IoT Village.)&lt;/p&gt;</description></item><item><title>Hacker Summer Camp 2018: Cyberwar?</title><link>https://systemoverlord.com/2018/07/19/hacker-summer-camp-2018-cyberwar.html</link><pubDate>Thu, 19 Jul 2018 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2018/07/19/hacker-summer-camp-2018-cyberwar.html</guid><description>&lt;p&gt;I actually thought I was done with the pre-con portion of my Hacker Summer Camp
blog post series, but it turns out that people wanted to know more about &amp;ldquo;&lt;a href="https://www.computerworld.com/article/2974662/network-security/wi-fi-at-def-con-dealing-with-the-worlds-most-dangerous-network.html"&gt;the
most dangerous network in the
world&lt;/a&gt;&amp;rdquo;.
Specifically, I got questions about how to protect yourself in this hostile
environment, like whether people should bring a burner device, how to avoid
getting hacked, what to do after the con, etc.&lt;/p&gt;
&lt;h2 id="the-network"&gt;The Network&lt;/h2&gt;
&lt;p&gt;So, is it &amp;ldquo;the most dangerous network in the world&amp;rdquo;? Well, there&amp;rsquo;s probably
some truth to that in the sense that in terms of &lt;em&gt;density&lt;/em&gt; of threats, it&amp;rsquo;s
likely fairly high. In terms of sheer volume of threats, the open internet is
obviously going to be a leader.&lt;/p&gt;</description></item><item><title>Hacker Summer Camp 2018: Last Minute Tips</title><link>https://systemoverlord.com/2018/07/15/hacker-summer-camp-2018-last-minute-tips.html</link><pubDate>Sun, 15 Jul 2018 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2018/07/15/hacker-summer-camp-2018-last-minute-tips.html</guid><description>&lt;p&gt;This is an update to my &lt;a href="https://systemoverlord.com/2018/05/26/hacker-summer-camp-2018-prep-guide.html"&gt;planning
guide&lt;/a&gt; as we get closer to
Hacker Summer Camp. (We&amp;rsquo;re down to about 3 weeks now!)&lt;/p&gt;
&lt;h2 id="planning-your-time"&gt;Planning Your Time&lt;/h2&gt;
&lt;p&gt;Schedules and details for events have begun to be released. For example, we
have:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.bsideslv.org/schedule/"&gt;BSides Las Vegas Schedule&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://defcon.org/html/defcon-26/dc-26-speakers.html"&gt;DEF CON 26 Speaker List&lt;/a&gt; (No schedule yet!)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://defcon.org/html/defcon-26/dc-26-villages.html"&gt;DEF CON 26 Villages&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://defcon.org/html/defcon-26/dc-26-demolabs.html"&gt;DEF CON 26 Demo Labs&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;It&amp;rsquo;s time to take a look at the lists of events and times and start making your
&amp;ldquo;must do&amp;rdquo; list. Resist the temptation to try to plan every minute &amp;ndash; first, you
won&amp;rsquo;t be able to stick to it, and secondly, you&amp;rsquo;ll feel like it doesn&amp;rsquo;t leave
you time for spur of the moment events. There will be conversations you want to
have, people you want to meet, or unscheduled activities you want to check out.&lt;/p&gt;</description></item><item><title>Hacker Summer Camp 2018: Prep Guide</title><link>https://systemoverlord.com/2018/05/26/hacker-summer-camp-2018-prep-guide.html</link><pubDate>Sat, 26 May 2018 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2018/05/26/hacker-summer-camp-2018-prep-guide.html</guid><description>&lt;p&gt;For those unfamiliar with the term, Hacker Summer Camp is the combination of DEF
CON, Black Hat USA, and BSides Las Vegas that takes place in the hot Las Vegas
sun every summer, along with all the associated parties and side events. It&amp;rsquo;s
the largest gathering of hackers, information security professionals and
enthusiasts, and has been growing for 25 years. In this post, I&amp;rsquo;ll present my
views on how to get the most out of your 2018 trip to the desert, along with
tips &amp;amp; points from some of my friends.&lt;/p&gt;</description></item><item><title>Hacker Summer Camp 2017: Lessons Learned</title><link>https://systemoverlord.com/2017/08/07/hacker-summer-camp-2017-lessons-learned.html</link><pubDate>Mon, 07 Aug 2017 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2017/08/07/hacker-summer-camp-2017-lessons-learned.html</guid><description>&lt;p&gt;In addition to taking stock of how things went at Hacker Summer Camp, I think
it&amp;rsquo;s important to examine the lessons learned from the event. Some of these
lessons will be introspective and reflect on myself and my career, but I think
it&amp;rsquo;s important to share these to encourage others to also reflect on what they
want and where they&amp;rsquo;re going.&lt;/p&gt;
&lt;h2 id="introspections"&gt;Introspections&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;It&amp;rsquo;s still incredibly important to me to be doing hands-on technical work.&lt;/strong&gt;
I do a lot of other things, and they may have significant impact, but I can&amp;rsquo;t
imagine taking a purely leadership/organizational role. I wouldn&amp;rsquo;t be happy,
and unhappy people are not productive people. Finding vulnerabilities, doing
technical research, building tools, are all areas that make me excited to be in
this field and to continue to be in this field.&lt;/p&gt;</description></item><item><title>Hacker Summer Camp 2017: DEF CON</title><link>https://systemoverlord.com/2017/08/05/hacker-summer-camp-2017-def-con.html</link><pubDate>Sat, 05 Aug 2017 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2017/08/05/hacker-summer-camp-2017-def-con.html</guid><description>&lt;p&gt;DEF CON, of course, is the main event of Hacker Summer Camp for me. It&amp;rsquo;s the
largest gathering of hackers in the world, and it&amp;rsquo;s the only opportunity I get
to see some of the people I know in the industry. It&amp;rsquo;s also the most hands-on
of all of the conferences I&amp;rsquo;ve ever attended, and the people running the
villages clearly know their stuff and are super passionate about their area.
Nowhere do I see so much raw talent and excitement for the hacker spirit as at
DEF CON.&lt;/p&gt;</description></item><item><title>Hacker Summer Camp 2017 Planning Guide</title><link>https://systemoverlord.com/2017/07/18/hacker-summer-camp-2017-planning-guide.html</link><pubDate>Tue, 18 Jul 2017 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2017/07/18/hacker-summer-camp-2017-planning-guide.html</guid><description>&lt;p&gt;My hacker summer camp planning posts are among the most-viewed on my blog, and I
was recently reminded I hadn&amp;rsquo;t done one for 2017 yet, despite it being just
around the corner!&lt;/p&gt;
&lt;p&gt;Though many tips will be similar, feel free to check out the two posts from last
year as well:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://systemoverlord.com/2016/02/18/hacker-summer-camp-planning-guide.html"&gt;Hacker Summer Camp Planning Guide&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://systemoverlord.com/2016/07/08/hacker-summer-camp-planning-guide-part-ii.html"&gt;Hacker Summer Camp Planning Guide, Part II&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;If you don&amp;rsquo;t know, Hacker Summer Camp is a nickname for 3 information security
conferences in one week in Las Vegas every July/August. This includes Black
Hat, BSides Las Vegas, and DEF CON.&lt;/p&gt;</description></item><item><title>The Many Badges of DEF CON 25</title><link>https://systemoverlord.com/2017/07/07/the-many-badges-of-def-con-25.html</link><pubDate>Fri, 07 Jul 2017 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2017/07/07/the-many-badges-of-def-con-25.html</guid><description>&lt;p&gt;If you follow DEF CON news at all, you&amp;rsquo;ll know that there&amp;rsquo;s
&lt;a href="https://www.defcon.org/html/defcon-25/dc-25-news.html#dc25badgeannounce"&gt;been some kind of issue with the
badges&lt;/a&gt;.
But don&amp;rsquo;t worry, DEF CON will have badges, but so will the community!&lt;/p&gt;
&lt;p&gt;What do I mean by this? Well, badge hacking has long been a DEF CON tradition,
but in the past few years, we&amp;rsquo;ve seen more and more unofficial badges appearing
at DEF CON. This year seems to be a massive upswing, and while I&amp;rsquo;m sure some of
that was in progress before the badge announcement, &lt;strike&gt;I believe at least some of
it is the community response to the DEF CON badge issue&lt;/strike&gt;. (Edit:
All of the listed badges were apparently in the works before the DEF CON
announcement. Thanks to &lt;a href="https://twitter.com/wbm312"&gt;@wbm312&lt;/a&gt; for setting me
straight.)&lt;/p&gt;</description></item><item><title>DEF CON Quals 2017: beatmeonthedl</title><link>https://systemoverlord.com/2017/04/30/def-con-quals-2017-beatmeonthedl.html</link><pubDate>Sun, 30 Apr 2017 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2017/04/30/def-con-quals-2017-beatmeonthedl.html</guid><description>&lt;p&gt;I played in the DEF CON quals CTF this weekend, and happened to find the
challenge &lt;code&gt;beatmeonthedl&lt;/code&gt; particularly interesting, even if it was in the
&amp;ldquo;Baby&amp;rsquo;s First&amp;rdquo; category. (DC Quals Baby&amp;rsquo;s Firsts aren&amp;rsquo;t as easy as one might
think&amp;hellip;)&lt;/p&gt;
&lt;p&gt;So we download the binary and take a look. I&amp;rsquo;m using
&lt;a href="https://binary.ninja"&gt;Binary Ninja&lt;/a&gt; lately, it&amp;rsquo;s a great tool from the Vector35
guys, and at the right price compared to IDA for playing CTF. :) So I open up
the binary, and notice a few things right away. This is an x86-64 ELF binary
with essentially none of the standard security features enabled:&lt;/p&gt;</description></item><item><title>Hacker Summer Camp 2015: DEF CON</title><link>https://systemoverlord.com/2015/08/14/hacker-summer-camp-2015-def-con/</link><pubDate>Fri, 14 Aug 2015 03:11:12 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2015/08/14/hacker-summer-camp-2015-def-con/</guid><description>&lt;p&gt;So, following up on my post on BSides LV 2015, I thought I&amp;rsquo;d give a summary of DEF CON 23. I can&amp;rsquo;t cover everything I did (after all, what happens in Vegas, stays in Vegas&amp;hellip; mostly) but I&amp;rsquo;m going to cover the biggest highlights as I saw them.&lt;/p&gt;
&lt;p&gt;The first thing to know about my take on DEF CON is that DEF CON is a one-of-a-kind event, somewhere between a security conference and a trip to Mecca. It&amp;rsquo;s one part conference, one part party, and one part social experience. The second thing to know about my take on DEF CON is that I&amp;rsquo;m not there to listen to people speak. If I was just there to listen to people speak, there&amp;rsquo;s the videos posted to YouTube or available on streaming/DVD from the conference recordings. I&amp;rsquo;m at DEF CON to &lt;em&gt;participate&lt;/em&gt;, &lt;em&gt;meet people&lt;/em&gt;, and &lt;strong&gt;hack all the things&lt;/strong&gt;.&lt;/p&gt;</description></item><item><title>DEF CON 22 Recap</title><link>https://systemoverlord.com/2014/08/13/def-con-22-recap/</link><pubDate>Wed, 13 Aug 2014 05:45:33 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2014/08/13/def-con-22-recap/</guid><description>&lt;p&gt;&lt;img src="https://systemoverlord.com/img/blog/badges.jpg" alt="Conference Badges"&gt;&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;m back and recovering with typical post-con fatigue. This year, I made several mistakes, not the least of which was trying to do &lt;a href="http://www.bsideslv.org/"&gt;BSides&lt;/a&gt;, &lt;a href="https://www.blackhat.com/"&gt;Black Hat&lt;/a&gt;, and &lt;a href="https://www.defcon.org/"&gt;DEF CON&lt;/a&gt;. Given the overlapping schedules and the events occurring outside the conferences, this left me really drained, not to mention spending more time transiting between the events than I&amp;rsquo;d like.&lt;/p&gt;
&lt;h3 id="bsides-las-vegas"&gt;BSides Las Vegas&lt;/h3&gt;
&lt;p&gt;B-Sides was a blast, but I spent most of the time I was there playing in the Pros vs Joes CTF run by &lt;a href="https://twitter.com/dichotomy1"&gt;Dichotomy&lt;/a&gt;. This is a particularly nice Capture the Flag competition, since it&amp;rsquo;s based on defending (and attacking) &amp;ldquo;real world&amp;rdquo; networks, rather than the typical Jeopardy-style &amp;ldquo;crack this binary&amp;rdquo; competitions. Most of the problems seen in the real world aren&amp;rsquo;t, in fact, 0-day produced by talented hackers, but in fact configuration weaknesses, outdated software, and insecure practices exploited by script kiddies. PvJ forces you to consider how to harden a &amp;ldquo;corporate&amp;rdquo; environment while still providing the same services. You get a Cisco ASA as your firewall, and can reconfigure services as needed to establish your perimeter and secure your systems. On Day 2, you also get to see just how good you are at breaking in, and just how good (or bad) your opponents are at securing their network.&lt;/p&gt;</description></item><item><title>Weekly Reading List for 8/2/14</title><link>https://systemoverlord.com/2014/08/03/weekly-reading-list-for-8214/</link><pubDate>Sun, 03 Aug 2014 02:02:20 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2014/08/03/weekly-reading-list-for-8214/</guid><description>&lt;p&gt;This has been missing for a few weeks, but it&amp;rsquo;s back!&lt;/p&gt;
&lt;h4 id="why-is-csp-failing"&gt;Why is CSP Failing?&lt;/h4&gt;
&lt;p&gt;&lt;a href="http://mweissbacher.com/publications/csp_raid.pdf"&gt;Why is CSP Failing? Trends and Challenges in CSP Adoption.&lt;/a&gt; Despite being an &amp;ldquo;academic&amp;rdquo; paper, this actually has a lot to offer about why one of the most effective defenses against XSS isn&amp;rsquo;t yet getting widely implemented, and what the implementation costs and strategies are.&lt;/p&gt;
&lt;h4 id="safari-bites-the-dust"&gt;Safari Bites the Dust&lt;/h4&gt;
&lt;p&gt;Ian Beer of Google Project Zero recently &lt;a href="http://googleprojectzero.blogspot.com/2014/07/pwn4fun-spring-2014-safari-part-i_24.html"&gt;popped Safari&lt;/a&gt; and then proceeded to pwn OS X. This post dives into exploiting a WebKit unbounded write bug, and makes it obvious just how many hoops an attacker needs to go through compared to the &amp;lsquo;buffer overflow to overwrite EIP&amp;rsquo; bugs of the &amp;lsquo;good old days&amp;rsquo;. It&amp;rsquo;s a great read, especially if you&amp;rsquo;re new to browser/client exploitation.&lt;/p&gt;</description></item></channel></rss>