Jeff is a security consultant by day, and sometimes by night. A Technical
Director at NCC Group, he specializes in application security, and regularly
assesses mobile device firmware applications, embedded platforms, web
applications, and "privileged" code of all kinds. He has spoken publicly at
conferences such as DEF CON, ToorCon, RECON, and CCC, covering a wide range of
topics including Android and Java bytecode instrumentation, scriptable
debugging, and, more recently, eBPF and unikernel security. A connoisseur of
exotic candies and snacks, he enjoys starting arguments about text editors and
window managers that he doesn't actually use. Jeff holds an MS in Computer
Science from NYU Poly (Tandon).
Technical DirectorWhat is your company/affiliation(s)? –
NCC GroupTwitter account (full URL) –
Q&A and discussion for the malware block, hosted and moderated by Rayna Stamboliyska. Questions will be gathered from the audience during the four prior talks.
dRuby is a "distributed object system" built into Ruby that is generally known
to be insecure, but which has never been properly audited... until now. In this
talk, we will discuss how dRuby works, where its insecurities lie, and how it
is much more insecure than previously understood to be — which is a feat,
considering that dRuby already provides code execution as a service.
This talk will focus on a discussion of the dRuby API, its
internals, and its underlying wire protocol, covering the security issues
inherent in each along the way. As part of the this, we will also demonstrate
several novel exploitation techniques that can be used against both dRuby
servers and clients, the latter of which have not been known to be vulnerable
until now. Following this, we will discuss some of our work to harden dRuby
against each of the issues we identified. We will then close our talk by
covering our work to exploit the exploits used to compromise dRuby-based
services for some very ironic honeypotting.