Daily Dave

Syndicate content
This technical discussion list covers vulnerability research, exploit development, and security events/gossip. It was started by ImmunitySec founder Dave Aitel and many security luminaries participate. Many posts simply advertise Immunity products, but you can't really fault Dave for being self-promotional on a list named DailyDave.
Updated: 12 min 5 sec ago


26 March, 2018 - 13:57

Posted by David Aitel on Mar 26

So much of BJJ is about transitions from one position to another. For
example, when you have one kind of bugclass, and you apply a methodology
to transform that into another bugclass. For example, recently I saw a
talk during our INFILTRATE dry runs, where someone (not even hacking a
browser or using a scripting language of any kind!) used a "Write Once"
primitive to modify a particular structure such that it assumed the size

To DARPA, re CGC! CC: Everyone else! :)

22 March, 2018 - 12:47

Posted by Dave Aitel on Mar 22

So this experiment is super interesting. And there's a ton of great new

In particular Angora looks extremely good. The paper is well worth a read:

Also note: The metric we want between different fuzzers is, "what bugs does
this one find that others don't"....

Re: Celebrations

12 March, 2018 - 15:16

Posted by Matt Tait on Mar 12

There is a fair argument that we overplay the visibility of the alcohol and
underplay the visibility of the healthy options (eg SAS had morning
exercise on the beach, lots of folks didn't drink at all etc), and that
might be off-putting to new folks entering the field.

No real problem with folks who use alcohol to blow off steam at these
conferences (hell, I had a *lot* of tequila on and off stage this past
week) but it's a good...

Re: Celebrations

12 March, 2018 - 15:07

Posted by Allen on Mar 12

Infiltrate handles this fantastically. A non drinker can blend into
cocktail hour water in hand; without getting dragged into mandatory keg
stands and belching contests you might find at other conferences. By day
the debugger slides damn near require a lucid and caffeine fueled sobriety
so there is actually social pressure against getting hammered the night
before. As an attendee, strolling into the day hung over, 2-3 talks late
feels like a...

Re: Celebrations

12 March, 2018 - 15:02

Posted by Chris Eng on Mar 12

For the record, much of what you see in the Kaspersky pictures are non-alcoholic. Nobody is pressured to drink, but
people still like to participate in the traditions. Most of the spirits consumed on stage are the same color as
water... just saying. ;-)


So today I'm going over the reports released at Kaspersky's SAS conference and for some reason the images of people
drinking on stage stuck out at me. I think...

Re: Celebrations

12 March, 2018 - 12:13

Posted by Alex McGeorge on Mar 12

Hi All,

We've been talking a lot internally about substance abuse and addiction
within the larger infosec community. Our having a no-drinks ticket
option (contact admin@ for details) is a result of these conversations.
We've also talked about hosting an Alcoholics Anonymous and Narcotics
Anonymous (AA & NA) meeting during the conference. To that end, we've
reserved a conference room and will provide refreshments for such a...

Re: Celebrations

12 March, 2018 - 11:19

Posted by Jared DeMott on Mar 12

To go a step further, there's actually many Believers in our field -- and
often there's an informal church service/bible study/sharing time -- that
will get put together if a given security conference falls over a Sunday
morning. :) I've enjoyed many of those.

Re: Celebrations

12 March, 2018 - 11:13

Posted by Curt Wilson on Mar 12

My own offensive community relations are long in the tooth these days,
however your comment about addiction is relevant. Many people damage their
lives, and others lives so badly with it. Kudos for having a non-alcohol
option. A clear head and a healthy liver become even more important as the
inevitable aging process occurs. Hackers of the 80’s and 90’s are getting
old :)


12 March, 2018 - 09:52

Posted by David Aitel on Mar 12


So today I'm going over the reports released at Kaspersky's SAS
conference and for some reason the images of people drinking on stage
stuck out at me. I think it's because half my facebook feed, when I
bother to log in to see what the schedule at the local BJJ gym is, is
people in *our community* talking about their recovery from addiction.

I know DefCon has this tradition of drinking on stage too, and GCon did,

Offering Gold Level Internet Service!

10 March, 2018 - 13:55

Posted by David Aitel on Mar 10

So every country, including the US, has decided that disconnecting from
the outside world in the even of an attack might be a good idea, and
gamed it through pretty thoroughly. Today's DefenseOne article was on

So my question for DARPA PMs is this: What technology can we deploy to
offer an entire country internet...

Re: What's next?

10 March, 2018 - 13:47

Posted by Konrads Smelkovs on Mar 10

I believe that much of apparent lack of capability at western intelligence
organisations is rather a lack of action which is because the goals have
not been set at policy level and enemy was not defined. In Western public
space it wouldn’t be appropriate / possible for heads of state to publicly
declare assassination as a means of diplomacy (the famous phrase of “if
necessary, we’ll whack them in the loo” as an example). When Iran was...

schedule/program for SyScan360 in Singapore 2018

9 March, 2018 - 08:40

Posted by Thomas on Mar 09

hi all

the schedule/program for SyScan360 in Singapore 2018 is out. check it
out at https://www.syscan360.org/en/schedule/

Re: What's next?

7 March, 2018 - 11:34

Posted by the grugq on Mar 07

I like personal IO... that is a good angle.

Thing is, people need to chill the fuck out on IO as cyber. Stuxnet still
happened. NotPetya happened. There are cyber operations which have physical
effects, and so it takes understanding that cyber is bigger than just one
style of operation. There are dimensions, aspects, facets, all of which are
cyber... anything that processes data (people, organisations, systems) is
vulnerable to cyber because...

What's next?

7 March, 2018 - 10:26

Posted by David Aitel on Mar 07

So right now I'm listening to alivestream from BAH
on AI's usage in the military. It's good to get beyond the straight up
Terminator-esque fear that is all the rage in policy circles right now.
I mean, today you saw an article where people were upset that Google was
using TensorFlow and related technologies to recognize objects in drone
data. But...

44CON 2018 CFP Open - 12-15th September, London (UK)

7 March, 2018 - 10:24

Posted by Steve on Mar 07

44CON 2018 is the UK's best annual Security Conference and Training event. The conference spans 2.5 days with training
on the 10th and 11th of September, a free evening event on the 12th of September, and a full two-day conference on the
13th and 14th of September. The event takes place at the ILEC Conference Centre near Earls Court, London. 44CON 2018
includes catering, private bus bar and Gin O'Clock breaks. Early Bird discounted...

RootedCON Security Conference - 1-3 March, Madrid (Spain)

21 February, 2018 - 13:00

Posted by omarbv on Feb 21

On the occasion of the ninth edition of RootedCON, the most important
computer security conference in the country, around 2,000 hackers will
meet to discuss new questions and researchs about the cybersecurity
world, with its risks and threats. National and international experts
have included in their agendas this mandatory appointment to discuss new
vulnerabilities, viruses, and other threats, they will also talk about
countermeasures in order...

little things

7 February, 2018 - 13:17

Posted by Konrads Smelkovs on Feb 07

When you are building a more detailed playbooks for long term strategy, the
little things matter, else they take way too much time. For example, let's
say you get a successful phish in - what do you do first, second, third -
SOC might be hot on your feet so you might only have 15-20 minutes. So you
decide that you might want to exfiltrate something useful for next time
around, such as Offline Address Book.

A quick google unveils a few...

Implants -> Persistence -> Fun! :)

6 February, 2018 - 14:28

Posted by David Aitel on Feb 06

Persistence is the focus of the newest INNUENDO release and it’s one
we’ve been working on for a long time now. If you’ve not seen our
release video which goes over these things in some depth it is here:

Persistence is one of those things that you really only figure out in
the wild. Originally INNUENDO was built around the idea of having a
monolithic deployer that could install the implant with a variety of...

EuskalHack Security Congress Call For Papers

6 February, 2018 - 14:26

Posted by Joxean Koret on Feb 06

] EuskalHack Security Congress III Call For Papers [


EuskalHack Security Congress Third Edition is a new proposal from the
EuskalHack Computer Security Association, with the aim to promote the
community growth and the culture in the digital security field. As
usual, in this new edition proximity to our public and technical
quality will be our hallmarks.

This exclusive conference is shaping up as the most relevant in...

Re: Own on install. How grave it is?

5 February, 2018 - 10:29

Posted by shadown [at] gmail on Feb 05

Hi Georgi,

Yes, they had been discussed by Raphael Mudge (the author of armitage) in one of his presentations. Basically in a CTF
they automated exactly that in order to pop the boxes as they were being installed by the CTF participants, using
contaba an automation scripting language he also authored.

Here is a link to the video: