ZeroNights 2018. Reload
ZeroNights is an international conference dedicated to the practical aspects of information security. This year, the anniversary conference 2 ^ 3 ZeroNights will be held November 20-21 at Club A2, St. Petersburg. New location - a new conference format.

One hall - one track. Conference reports from IS rock stars and only beginners, but with original and relevant topics, you will hear from the main club scene, which featured Limp Bizkit, Smashing Pumpkins, Fall Out Boy, New Order, and the educational and interactive sections will be held in a separate the hall. The main thing in the speeches is the idea, the thought and the knowledge that tags will perfectly express, and not the usual section names.
New CFP system, you can get acquainted with it on the site . If necessary, the organizing committee will help the speakers to prepare the coolest performance! Do not miss the deadline for applications - October 20.
Own style. ZeroNights 2018 style is a stencilled graffiti, an original street art genre, which grew out of disorderly conduct. He clearly expresses a challenge to society and the individual.

The keynote speaker at ZeroNights 2018 will be our good friend Dillon '@ L33tdawg' Cannabhire, CEO of Hack in The Box . HITB is one of the most famous and oldest security conferences in the world of practical security. HITB organizers hold their conference in Kuala Lumpur, Malaysia, Amsterdam, Beijing and Dubai! To whom, if not them, is it better to know what a security conference is. In his speech, Dillon will tell you how modern hacker conferences have seen in the past, how they developed and will present what to expect from the future.
As always, all the most relevant and important about the protection and attack from security researchers from around the world. Our strict CFP committee selects reports, so be sure that only hardcore is waiting for you at the conference - no advertising, paid speeches or "water".
Innovation last year, which everyone liked so much, that it began to copy other conferences. On WebVillage you will learn about modern attacks on web applications, try yourself as an attacker, find out how the modern web works, and be able to participate in contests! Web Village is a place where people talk about the web, bugbounty, cool finds and funny situations. This year, WebVillage will occupy a separate room for one day of the conference.
This is an area for people interested in hardware and software and hardware security. The opportunity to demonstrate your favorite tools in battle and try something new with real examples. Within two days of ZeroNights, you will be able to discuss attacks on wireless technologies: from simple radio protocols to payment systems, low-level attacks and blackbox analysis techniques of embedded devices, industrial automation. Here you are waiting for reports on the practice and the application of the knowledge gained in solving competitive tasks.
At the conference site, our partners and friendly communities will hold contests for hacking systems and more. Do not forget to check your skills and win valuable prizes! We will tell you more about contests later. In the meantime, start preparing software and hardware for your laptops that will help you with hacking;)

What is a non-party conference? November 20, after the end of the official program, we are going to a party at the A2 nightclub. Networking, communication and meeting with speakers, new projects and your DJ!
Remember, CFP closes on October 20th! You still have the opportunity to perform on the same
stage with the best representatives of the whitehat community.
Tickets for the conference are already on sale, the number is limited. Also soon we will announce the annual ZeroNights HackQuest , where you can win tickets;)

What's new?
One hall - one track. Conference reports from IS rock stars and only beginners, but with original and relevant topics, you will hear from the main club scene, which featured Limp Bizkit, Smashing Pumpkins, Fall Out Boy, New Order, and the educational and interactive sections will be held in a separate the hall. The main thing in the speeches is the idea, the thought and the knowledge that tags will perfectly express, and not the usual section names.
New CFP system, you can get acquainted with it on the site . If necessary, the organizing committee will help the speakers to prepare the coolest performance! Do not miss the deadline for applications - October 20.
Own style. ZeroNights 2018 style is a stencilled graffiti, an original street art genre, which grew out of disorderly conduct. He clearly expresses a challenge to society and the individual.
Main report of the conference

The keynote speaker at ZeroNights 2018 will be our good friend Dillon '@ L33tdawg' Cannabhire, CEO of Hack in The Box . HITB is one of the most famous and oldest security conferences in the world of practical security. HITB organizers hold their conference in Kuala Lumpur, Malaysia, Amsterdam, Beijing and Dubai! To whom, if not them, is it better to know what a security conference is. In his speech, Dillon will tell you how modern hacker conferences have seen in the past, how they developed and will present what to expect from the future.
First approved reports
Speakers - Alexandre Gese, Fabien Périgueux and Jofri Charny
Turning your BMC into a revolving doorDescription of the reportLate installation of patches for BMC and the lack of control over their work almost always leads to the erosion of the security of complex network infrastructures and data centers. A study of HPE iLO systems (4 and 5) revealed a number of vulnerabilities, the operation of one of which allows you to completely compromise the iLO chip with the host system itself. From the report you will learn how the successful exploitation of the found vulnerabilities can turn the iLO BMC into a “revolving door” between the administrative and production networks.
Speakers - Junyou Zhou, Wenshu Wu and Jiantao Li
Who owned thousands of developersDescription of the reportСпикеры расскажут, как в 2018-м году они провели несколько успешных удаленных атак на популярные веб-серверы Git, включая Gitlab, Github enterprise, Gogs и Gitea. Докладчики объяснят, как работает использованная техника, представят обнаруженные уязвимости нулевого дня и абсолютно новую поверхность атаки веб-серверов Git, а также две цепочки атак на Gogs, приводящих к RCE.
Speaker - Denis Selyanin
Researching Marvell Avastar Wi-Fi: from zero knowledge to over-the-air zero-touch RCEDescription of the reportВ прошлом году широко обсуждались уязвимости Wi-Fi чипсетов Broadcom BCM43xx. Эксплуатируя уязвимости в прошивках этих чипов, исследователи могли разработать эксплойты, позволяющие получить доступ к устройству без взаимодействия с пользователем. Какой бы защищенной ни была ОС устройства, в системе присутствует отдельный чип, выполняющий парсинг Wi-Fi фреймов и не имеющий никаких средств защиты от эксплуатации уязвимостей. В этой презентации будут рассмотрены устройство и эксплуатация уязвимостей Wi-Fi чипов Marvell Avastar, возможная поверхность атаки данных устройств и некоторые алгоритмы работы ОС реального времени ThreadX, на основе которой и реализованы прошивки данных устройств, а также техники, позволяющие легче анализировать подобные устройства.
Speaker - Khoksen Kore
Diffing C source codes to binariesDescription of the reportЧасто в ходе проекта реверс-инженеру приходится импортировать символы из открытого доступа или утекших в сеть баз кода в базы данных IDA. Самое очевидное решение, которое приходит в голову в подобных ситуациях, — скомпилировать в binary, выполнить diff и импортировать совпадения. Однако, как правило, проблема осложняется оптимизацией компилятора, набором использованных флагов и прочими техническими моментами. Проблема может стать неразрешимой, поскольку новые версии компилятора не способны корректно обработать исходный код, представленный лишь в виде разрозненных кусков. В данном докладе мы обсудим алгоритмы импорта символов «напрямую» из исходного C-кода в базы данных IDA и представим вниманию слушателей инструмент (который, скорее всего, будет работать в связке с Diaphora), позволяющий это сделать.
Speakers - Ilya Nesterov and Sergey Shekyan
Unveiling the cloak: Click here for linkDescription of the reportДоклад об удивительном мире cloaking-a и о том, как эта технология эволюционировала из простой техники IP-фильтрации в комплексную платформу, используемую для мошенничества и обнаружения ботов. Web cloaking используется для маскировки контента порнографического или пропагандистского характера, криптовалюты, а также веб-сайтов, распространяющих зловредное ПО. Слушатели узнают о потребностях рынка в средствах предотвращения обходов, контроля уровня комплексности cloaking-a, и о том, как изжить web cloaking раз и навсегда. Мы также обсудим, что общего web cloaking имеет с современными методами мошенничества и системами автоматического обнаружения, существующие методологии минимизации последствий web cloaking-a и новые механизмы защиты.
Speakers - Jianing Wang and Junyu Zhou
Ntlm Relay Reloaded: AttackDescription of the reportС момента внедрения протокола NTLM аутентификации в Windows прошло уже много лет. Сами атаки по методу NTLM relay за это время обрели огромную популярность среди злоумышленников, а Microsoft успела выпустить множество патчей для противодействия им. Докладчики расскажут о двух новых векторах атаки. Первый подразумевает кражу NTLM Hash из Chrome (ранее атаки распространялись лишь на IE/Edge). При компрометации связанных с браузером сервисов злоумышленник получает возможность удаленно исполнить свой код без какого-либо взаимодействия с пользователем. Второй заключается в обходе патча MS08-068 и удаленном исполнении кода путем передачи Net-NTLM Hash самой машине. В ходе доклада будет также представлен инструмент, позволяющий автоматизировать проведение подобных атак.
Program:
Reports (15/30/45 minutes)
As always, all the most relevant and important about the protection and attack from security researchers from around the world. Our strict CFP committee selects reports, so be sure that only hardcore is waiting for you at the conference - no advertising, paid speeches or "water".
Webville
Innovation last year, which everyone liked so much, that it began to copy other conferences. On WebVillage you will learn about modern attacks on web applications, try yourself as an attacker, find out how the modern web works, and be able to participate in contests! Web Village is a place where people talk about the web, bugbounty, cool finds and funny situations. This year, WebVillage will occupy a separate room for one day of the conference.
Hardwarezone
This is an area for people interested in hardware and software and hardware security. The opportunity to demonstrate your favorite tools in battle and try something new with real examples. Within two days of ZeroNights, you will be able to discuss attacks on wireless technologies: from simple radio protocols to payment systems, low-level attacks and blackbox analysis techniques of embedded devices, industrial automation. Here you are waiting for reports on the practice and the application of the knowledge gained in solving competitive tasks.
Contests
At the conference site, our partners and friendly communities will hold contests for hacking systems and more. Do not forget to check your skills and win valuable prizes! We will tell you more about contests later. In the meantime, start preparing software and hardware for your laptops that will help you with hacking;)
A party

What is a non-party conference? November 20, after the end of the official program, we are going to a party at the A2 nightclub. Networking, communication and meeting with speakers, new projects and your DJ!
Tickets
Remember, CFP closes on October 20th! You still have the opportunity to perform on the same
stage with the best representatives of the whitehat community.
Tickets for the conference are already on sale, the number is limited. Also soon we will announce the annual ZeroNights HackQuest , where you can win tickets;)