Sam Quinn is a Security Researcher on McAfee’s Advanced Threat Research team , focused on finding new vulnerabilities in both software and hardware. Sam has a focus on IOT and embedded devices with knowledge in the fields of reverse engineering and penetration testing.
Security ResearcherWhat is your company/affiliation(s)? –
McAfeeTwitter account (full URL) –
Q&A and discussion for the malware block, hosted and moderated by Marc-Etienne M. Léveillé. Questions will be gathered from the audience during the four prior talks.
During the COVID-19 pandemic students across the country started to participate in e-learning for the first time. While the students had to adapt to new environments so did the software. Since school computers are now being taken home, educational software is exposed to a wider range of threats. If classroom management software was comprised, not only would a school district be affected, but attacks could spread to home devices. This talk will take an in-depth look at the zero-day vulnerabilities discovered by McAfee’s Advanced Threat Research Team in a K-12 classroom management solution used in over 9,000 school districts. The focus will be on how four vulnerabilities combined lead to a wormable unauthenticated remote code execution (RCE) resulting in System level privileges. This presentation will include a technical dissection of the network protocol leading to custom Scapy layers and a demo showing a single click exploit.