ºÝºÝߣshows by User: saumilshah / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: saumilshah / Fri, 21 Apr 2023 13:13:07 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: saumilshah The Hand That Strikes, Also Blocks /saumilshah/the-hand-that-strikes-also-blocks the-hand-that-strikes-230421131307-417bc238
For over two decades, working as an cybersecurity entrepreneur, researcher and instructor, I have heard over and over again that attacks and defense are two sides of the same coin. But what does it really mean in application? What happens when sophisticated attacks collide with sophisticated defenses? Who wins? This is talk is aimed at a wide audience in cybersecurity – from the strategists to the practitioners. We will discuss Evolution, Attacks, Defense and PEBKAC. What factors shall affect the posture of trustworthiness and safety in the digital world in the next two years to come depend largely on the road we have followed over the past two decades. This talk looks above and beyond, albeit optimistically, about realigning some of the conventional approaches, slowly but strategically shifting mindsets of stakeholders and consumers alike, to bring about a more proactive approach to security.]]>

For over two decades, working as an cybersecurity entrepreneur, researcher and instructor, I have heard over and over again that attacks and defense are two sides of the same coin. But what does it really mean in application? What happens when sophisticated attacks collide with sophisticated defenses? Who wins? This is talk is aimed at a wide audience in cybersecurity – from the strategists to the practitioners. We will discuss Evolution, Attacks, Defense and PEBKAC. What factors shall affect the posture of trustworthiness and safety in the digital world in the next two years to come depend largely on the road we have followed over the past two decades. This talk looks above and beyond, albeit optimistically, about realigning some of the conventional approaches, slowly but strategically shifting mindsets of stakeholders and consumers alike, to bring about a more proactive approach to security.]]>
Fri, 21 Apr 2023 13:13:07 GMT /saumilshah/the-hand-that-strikes-also-blocks saumilshah@slideshare.net(saumilshah) The Hand That Strikes, Also Blocks saumilshah For over two decades, working as an cybersecurity entrepreneur, researcher and instructor, I have heard over and over again that attacks and defense are two sides of the same coin. But what does it really mean in application? What happens when sophisticated attacks collide with sophisticated defenses? Who wins? This is talk is aimed at a wide audience in cybersecurity – from the strategists to the practitioners. We will discuss Evolution, Attacks, Defense and PEBKAC. What factors shall affect the posture of trustworthiness and safety in the digital world in the next two years to come depend largely on the road we have followed over the past two decades. This talk looks above and beyond, albeit optimistically, about realigning some of the conventional approaches, slowly but strategically shifting mindsets of stakeholders and consumers alike, to bring about a more proactive approach to security. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/the-hand-that-strikes-230421131307-417bc238-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> For over two decades, working as an cybersecurity entrepreneur, researcher and instructor, I have heard over and over again that attacks and defense are two sides of the same coin. But what does it really mean in application? What happens when sophisticated attacks collide with sophisticated defenses? Who wins? This is talk is aimed at a wide audience in cybersecurity – from the strategists to the practitioners. We will discuss Evolution, Attacks, Defense and PEBKAC. What factors shall affect the posture of trustworthiness and safety in the digital world in the next two years to come depend largely on the road we have followed over the past two decades. This talk looks above and beyond, albeit optimistically, about realigning some of the conventional approaches, slowly but strategically shifting mindsets of stakeholders and consumers alike, to bring about a more proactive approach to security.
The Hand That Strikes, Also Blocks from Saumil Shah
]]>
107 0 https://cdn.slidesharecdn.com/ss_thumbnails/the-hand-that-strikes-230421131307-417bc238-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Debugging with EMUX - RIngzer0 BACK2WORKSHOPS /slideshow/debugging-with-emux-ringzer0-back2workshops/252145590 debugging-with-emux-back2workshops-2022-220708073557-d000f020
The EMUX IoT Firmware Emulation Framework currently provides near native userland emulation for ARM and MIPS IoT devices. EMUX is actively used Saumil's popular ARM IoT Exploit Laboratory training for over 5 years. The Debugging with EMUX workshop shall be in two parts: Part 1 (30 minutes) - Setting up EMUX in 7 minutes - A tour of EMUX internals - EMUX utilities - Tracing userland processes within EMUX Part 2 (90 minutes) - Debugging an ARM IoT target in EMUX - Debugging a MIPS IoT Target in EMUX - Crash dump analysis ]]>

The EMUX IoT Firmware Emulation Framework currently provides near native userland emulation for ARM and MIPS IoT devices. EMUX is actively used Saumil's popular ARM IoT Exploit Laboratory training for over 5 years. The Debugging with EMUX workshop shall be in two parts: Part 1 (30 minutes) - Setting up EMUX in 7 minutes - A tour of EMUX internals - EMUX utilities - Tracing userland processes within EMUX Part 2 (90 minutes) - Debugging an ARM IoT target in EMUX - Debugging a MIPS IoT Target in EMUX - Crash dump analysis ]]>
Fri, 08 Jul 2022 07:35:57 GMT /slideshow/debugging-with-emux-ringzer0-back2workshops/252145590 saumilshah@slideshare.net(saumilshah) Debugging with EMUX - RIngzer0 BACK2WORKSHOPS saumilshah The EMUX IoT Firmware Emulation Framework currently provides near native userland emulation for ARM and MIPS IoT devices. EMUX is actively used Saumil's popular ARM IoT Exploit Laboratory training for over 5 years. The Debugging with EMUX workshop shall be in two parts: Part 1 (30 minutes) - Setting up EMUX in 7 minutes - A tour of EMUX internals - EMUX utilities - Tracing userland processes within EMUX Part 2 (90 minutes) - Debugging an ARM IoT target in EMUX - Debugging a MIPS IoT Target in EMUX - Crash dump analysis <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/debugging-with-emux-back2workshops-2022-220708073557-d000f020-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The EMUX IoT Firmware Emulation Framework currently provides near native userland emulation for ARM and MIPS IoT devices. EMUX is actively used Saumil&#39;s popular ARM IoT Exploit Laboratory training for over 5 years. The Debugging with EMUX workshop shall be in two parts: Part 1 (30 minutes) - Setting up EMUX in 7 minutes - A tour of EMUX internals - EMUX utilities - Tracing userland processes within EMUX Part 2 (90 minutes) - Debugging an ARM IoT target in EMUX - Debugging a MIPS IoT Target in EMUX - Crash dump analysis
Debugging with EMUX - RIngzer0 BACK2WORKSHOPS from Saumil Shah
]]>
138 0 https://cdn.slidesharecdn.com/ss_thumbnails/debugging-with-emux-back2workshops-2022-220708073557-d000f020-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Unveiling EMUX - ARM and MIPS IoT Emulation Framework /slideshow/unveiling-emux-arm-and-mips-iot-emulation-framework/250870040 emux-ringzer0-dec2021-211220092803
After 4 years, ARMX is changing its call sign. EMUX now features both ARM and MIPS device emulation, in a unified framework! Join us as we unveil EMUX and take you into the inner workings of emulating both ARM and MIPS IoT devices. We will be releasing a new Docker image featuring a MIPS CTF challenge to test your MIPS exploit development skills. ºÝºÝߣs from my workshop at Ringzer0's December 2021 Workshop Advent Calendar.]]>

After 4 years, ARMX is changing its call sign. EMUX now features both ARM and MIPS device emulation, in a unified framework! Join us as we unveil EMUX and take you into the inner workings of emulating both ARM and MIPS IoT devices. We will be releasing a new Docker image featuring a MIPS CTF challenge to test your MIPS exploit development skills. ºÝºÝߣs from my workshop at Ringzer0's December 2021 Workshop Advent Calendar.]]>
Mon, 20 Dec 2021 09:28:03 GMT /slideshow/unveiling-emux-arm-and-mips-iot-emulation-framework/250870040 saumilshah@slideshare.net(saumilshah) Unveiling EMUX - ARM and MIPS IoT Emulation Framework saumilshah After 4 years, ARMX is changing its call sign. EMUX now features both ARM and MIPS device emulation, in a unified framework! Join us as we unveil EMUX and take you into the inner workings of emulating both ARM and MIPS IoT devices. We will be releasing a new Docker image featuring a MIPS CTF challenge to test your MIPS exploit development skills. ºÝºÝߣs from my workshop at Ringzer0's December 2021 Workshop Advent Calendar. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/emux-ringzer0-dec2021-211220092803-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> After 4 years, ARMX is changing its call sign. EMUX now features both ARM and MIPS device emulation, in a unified framework! Join us as we unveil EMUX and take you into the inner workings of emulating both ARM and MIPS IoT devices. We will be releasing a new Docker image featuring a MIPS CTF challenge to test your MIPS exploit development skills. ºÝºÝߣs from my workshop at Ringzer0&#39;s December 2021 Workshop Advent Calendar.
Unveiling EMUX - ARM and MIPS IoT Emulation Framework from Saumil Shah
]]>
343 0 https://cdn.slidesharecdn.com/ss_thumbnails/emux-ringzer0-dec2021-211220092803-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Announcing ARMX Docker - DC11332 /slideshow/announcing-armx-docker-dc11332/249367007 dc11332insidearmx-210615103154
First release of ARMX Docker image to the public. ºÝºÝߣs from my talk at DC11332 meetup (West France)]]>

First release of ARMX Docker image to the public. ºÝºÝߣs from my talk at DC11332 meetup (West France)]]>
Tue, 15 Jun 2021 10:31:54 GMT /slideshow/announcing-armx-docker-dc11332/249367007 saumilshah@slideshare.net(saumilshah) Announcing ARMX Docker - DC11332 saumilshah First release of ARMX Docker image to the public. ºÝºÝߣs from my talk at DC11332 meetup (West France) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dc11332insidearmx-210615103154-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> First release of ARMX Docker image to the public. ºÝºÝߣs from my talk at DC11332 meetup (West France)
Announcing ARMX Docker - DC11332 from Saumil Shah
]]>
10121 0 https://cdn.slidesharecdn.com/ss_thumbnails/dc11332insidearmx-210615103154-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Precise Presentations /slideshow/precise-presentations/232228973 precisepresentations-200418112959
A presentation on how to plan and prepare precise presentations. Part of Net Square #TechieThursday sessions with our team.]]>

A presentation on how to plan and prepare precise presentations. Part of Net Square #TechieThursday sessions with our team.]]>
Sat, 18 Apr 2020 11:29:59 GMT /slideshow/precise-presentations/232228973 saumilshah@slideshare.net(saumilshah) Precise Presentations saumilshah A presentation on how to plan and prepare precise presentations. Part of Net Square #TechieThursday sessions with our team. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/precisepresentations-200418112959-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A presentation on how to plan and prepare precise presentations. Part of Net Square #TechieThursday sessions with our team.
Precise Presentations from Saumil Shah
]]>
592 1 https://cdn.slidesharecdn.com/ss_thumbnails/precisepresentations-200418112959-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Effective Webinars: Presentation Skills for a Virtual Audience /slideshow/effective-webinars-presentation-skills-for-a-virtual-audience/230912313 effectivewebinars-200326134035
A webinar on what it takes to conduct an effective webinar! Understand how to prepare your story for an invisible audience, keep them engaged and anticipate "in-flight turbulence". Enjoy!]]>

A webinar on what it takes to conduct an effective webinar! Understand how to prepare your story for an invisible audience, keep them engaged and anticipate "in-flight turbulence". Enjoy!]]>
Thu, 26 Mar 2020 13:40:35 GMT /slideshow/effective-webinars-presentation-skills-for-a-virtual-audience/230912313 saumilshah@slideshare.net(saumilshah) Effective Webinars: Presentation Skills for a Virtual Audience saumilshah A webinar on what it takes to conduct an effective webinar! Understand how to prepare your story for an invisible audience, keep them engaged and anticipate "in-flight turbulence". Enjoy! <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/effectivewebinars-200326134035-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A webinar on what it takes to conduct an effective webinar! Understand how to prepare your story for an invisible audience, keep them engaged and anticipate &quot;in-flight turbulence&quot;. Enjoy!
Effective Webinars: Presentation Skills for a Virtual Audience from Saumil Shah
]]>
1382 1 https://cdn.slidesharecdn.com/ss_thumbnails/effectivewebinars-200326134035-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
INSIDE ARM-X Cansecwest 2020 /saumilshah/inside-armx-cansecwest-2020 cansecwestinsidearmx-200318162047
The closest you will get to a VM for testing IoT devices. The ARM-X IoT Firmware Emulation Framework is a tried-and-tested framework which has led to four 0-days discovered on SoHo routers, IP cameras and VoIP exchanges. In this talk, I shall cover the evolution of ARM-X, demonstrate a few use cases and discuss future directions of IoT firmware emulation.]]>

The closest you will get to a VM for testing IoT devices. The ARM-X IoT Firmware Emulation Framework is a tried-and-tested framework which has led to four 0-days discovered on SoHo routers, IP cameras and VoIP exchanges. In this talk, I shall cover the evolution of ARM-X, demonstrate a few use cases and discuss future directions of IoT firmware emulation.]]>
Wed, 18 Mar 2020 16:20:47 GMT /saumilshah/inside-armx-cansecwest-2020 saumilshah@slideshare.net(saumilshah) INSIDE ARM-X Cansecwest 2020 saumilshah The closest you will get to a VM for testing IoT devices. The ARM-X IoT Firmware Emulation Framework is a tried-and-tested framework which has led to four 0-days discovered on SoHo routers, IP cameras and VoIP exchanges. In this talk, I shall cover the evolution of ARM-X, demonstrate a few use cases and discuss future directions of IoT firmware emulation. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cansecwestinsidearmx-200318162047-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The closest you will get to a VM for testing IoT devices. The ARM-X IoT Firmware Emulation Framework is a tried-and-tested framework which has led to four 0-days discovered on SoHo routers, IP cameras and VoIP exchanges. In this talk, I shall cover the evolution of ARM-X, demonstrate a few use cases and discuss future directions of IoT firmware emulation.
INSIDE ARM-X Cansecwest 2020 from Saumil Shah
]]>
455 1 https://cdn.slidesharecdn.com/ss_thumbnails/cansecwestinsidearmx-200318162047-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyberspace And Security - India's Decade Ahead /slideshow/cyberspace-and-security-indias-decade-ahead/229798227 nullconcyberspaceandsovereignty-200306102425
ºÝºÝߣs from my closing keynote at NULLCON 2020, where we explore evolution, asymmetry, cyberspace, society and sovereignty]]>

ºÝºÝߣs from my closing keynote at NULLCON 2020, where we explore evolution, asymmetry, cyberspace, society and sovereignty]]>
Fri, 06 Mar 2020 10:24:25 GMT /slideshow/cyberspace-and-security-indias-decade-ahead/229798227 saumilshah@slideshare.net(saumilshah) Cyberspace And Security - India's Decade Ahead saumilshah ºÝºÝߣs from my closing keynote at NULLCON 2020, where we explore evolution, asymmetry, cyberspace, society and sovereignty <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/nullconcyberspaceandsovereignty-200306102425-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> ºÝºÝߣs from my closing keynote at NULLCON 2020, where we explore evolution, asymmetry, cyberspace, society and sovereignty
Cyberspace And Security - India's Decade Ahead from Saumil Shah
]]>
1053 2 https://cdn.slidesharecdn.com/ss_thumbnails/nullconcyberspaceandsovereignty-200306102425-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cybersecurity And Sovereignty - A Look At Society's Transformation In Cyberspace /slideshow/cybersecurity-and-sovereignty-a-look-at-societys-transformation-in-cyberspace/227332360 cybersecurityandsovereigntyama-200208053609
Cyberspace is getting militarized. Minds, not just machines are hacked through psychological warfare. Are India's freedom and sovereignty at stake?]]>

Cyberspace is getting militarized. Minds, not just machines are hacked through psychological warfare. Are India's freedom and sovereignty at stake?]]>
Sat, 08 Feb 2020 05:36:09 GMT /slideshow/cybersecurity-and-sovereignty-a-look-at-societys-transformation-in-cyberspace/227332360 saumilshah@slideshare.net(saumilshah) Cybersecurity And Sovereignty - A Look At Society's Transformation In Cyberspace saumilshah Cyberspace is getting militarized. Minds, not just machines are hacked through psychological warfare. Are India's freedom and sovereignty at stake? <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cybersecurityandsovereigntyama-200208053609-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cyberspace is getting militarized. Minds, not just machines are hacked through psychological warfare. Are India&#39;s freedom and sovereignty at stake?
Cybersecurity And Sovereignty - A Look At Society's Transformation In Cyberspace from Saumil Shah
]]>
517 1 https://cdn.slidesharecdn.com/ss_thumbnails/cybersecurityandsovereigntyama-200208053609-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
NSConclave2020 The Decade Behind And The Decade Ahead /slideshow/nsconclave2020-the-decade-behind-and-the-decade-ahead/225197443 nsconclave2020-200127192504
Commemorating 20 years of Net Square! My Keynote talk at NSConclave2020]]>

Commemorating 20 years of Net Square! My Keynote talk at NSConclave2020]]>
Mon, 27 Jan 2020 19:25:04 GMT /slideshow/nsconclave2020-the-decade-behind-and-the-decade-ahead/225197443 saumilshah@slideshare.net(saumilshah) NSConclave2020 The Decade Behind And The Decade Ahead saumilshah Commemorating 20 years of Net Square! My Keynote talk at NSConclave2020 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/nsconclave2020-200127192504-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Commemorating 20 years of Net Square! My Keynote talk at NSConclave2020
NSConclave2020 The Decade Behind And The Decade Ahead from Saumil Shah
]]>
157 1 https://cdn.slidesharecdn.com/ss_thumbnails/nsconclave2020-200127192504-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cybersecurity In India - The Decade Ahead /saumilshah/cybersecurity-in-india-the-decade-ahead-214186529 cybersecurityinindiadecadeahead-200102093043
My thoughts on Sovereignty, Digital Republics, AI, Deepfakes, Deception and the road that lies ahead in 2020.]]>

My thoughts on Sovereignty, Digital Republics, AI, Deepfakes, Deception and the road that lies ahead in 2020.]]>
Thu, 02 Jan 2020 09:30:43 GMT /saumilshah/cybersecurity-in-india-the-decade-ahead-214186529 saumilshah@slideshare.net(saumilshah) Cybersecurity In India - The Decade Ahead saumilshah My thoughts on Sovereignty, Digital Republics, AI, Deepfakes, Deception and the road that lies ahead in 2020. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cybersecurityinindiadecadeahead-200102093043-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> My thoughts on Sovereignty, Digital Republics, AI, Deepfakes, Deception and the road that lies ahead in 2020.
Cybersecurity In India - The Decade Ahead from Saumil Shah
]]>
370 1 https://cdn.slidesharecdn.com/ss_thumbnails/cybersecurityinindiadecadeahead-200102093043-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
INSIDE ARM-X - Countermeasure 2019 /slideshow/inside-armx-countermeasure-2019/191353834 countermeasureintroducingarmx-191107132734
The closest you will get to a VM for testing IoT devices. The ARM-X IoT Firmware Emulation Framework is a tried-and-tested framework which has led to four 0-days discovered on SoHo routers, IP cameras and VoIP exchanges. In this talk, I shall cover the evolution of ARM-X, demonstrate a few use cases and discuss future directions of IoT firmware emulation.]]>

The closest you will get to a VM for testing IoT devices. The ARM-X IoT Firmware Emulation Framework is a tried-and-tested framework which has led to four 0-days discovered on SoHo routers, IP cameras and VoIP exchanges. In this talk, I shall cover the evolution of ARM-X, demonstrate a few use cases and discuss future directions of IoT firmware emulation.]]>
Thu, 07 Nov 2019 13:27:34 GMT /slideshow/inside-armx-countermeasure-2019/191353834 saumilshah@slideshare.net(saumilshah) INSIDE ARM-X - Countermeasure 2019 saumilshah The closest you will get to a VM for testing IoT devices. The ARM-X IoT Firmware Emulation Framework is a tried-and-tested framework which has led to four 0-days discovered on SoHo routers, IP cameras and VoIP exchanges. In this talk, I shall cover the evolution of ARM-X, demonstrate a few use cases and discuss future directions of IoT firmware emulation. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/countermeasureintroducingarmx-191107132734-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The closest you will get to a VM for testing IoT devices. The ARM-X IoT Firmware Emulation Framework is a tried-and-tested framework which has led to four 0-days discovered on SoHo routers, IP cameras and VoIP exchanges. In this talk, I shall cover the evolution of ARM-X, demonstrate a few use cases and discuss future directions of IoT firmware emulation.
INSIDE ARM-X - Countermeasure 2019 from Saumil Shah
]]>
17850 1 https://cdn.slidesharecdn.com/ss_thumbnails/countermeasureintroducingarmx-191107132734-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Introducing ARM-X /saumilshah/introducing-armx introducingarmx-191016044916
Officially announcing my latest project ARM-X Firmware Emulation Framework at HITB Cyberweek 2019]]>

Officially announcing my latest project ARM-X Firmware Emulation Framework at HITB Cyberweek 2019]]>
Wed, 16 Oct 2019 04:49:16 GMT /saumilshah/introducing-armx saumilshah@slideshare.net(saumilshah) Introducing ARM-X saumilshah Officially announcing my latest project ARM-X Firmware Emulation Framework at HITB Cyberweek 2019 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/introducingarmx-191016044916-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Officially announcing my latest project ARM-X Firmware Emulation Framework at HITB Cyberweek 2019
Introducing ARM-X from Saumil Shah
]]>
22712 1 https://cdn.slidesharecdn.com/ss_thumbnails/introducingarmx-191016044916-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The Road To Defendable Systems - Emirates NBD /slideshow/the-road-to-defendable-systems-emirates-nbd/177195704 enbd2019theroadtodefendablesystems-190928204241
"Attack is a technical problem, defense is a political problem". For several years, cyber security has been misjudged as risk reduction. On one hand, business applications and architectures are growing rapidly. On the other hand, the cyber security organisation is struggling to be able to defend them in today's rapidly evolving threat landscape. This talk explores the gap in thought between the owner and the defender of today's business applications and what needs to be done to bridge it. We shall present proactive steps and measures to overcome the last hurdle in building defendable systems.]]>

"Attack is a technical problem, defense is a political problem". For several years, cyber security has been misjudged as risk reduction. On one hand, business applications and architectures are growing rapidly. On the other hand, the cyber security organisation is struggling to be able to defend them in today's rapidly evolving threat landscape. This talk explores the gap in thought between the owner and the defender of today's business applications and what needs to be done to bridge it. We shall present proactive steps and measures to overcome the last hurdle in building defendable systems.]]>
Sat, 28 Sep 2019 20:42:41 GMT /slideshow/the-road-to-defendable-systems-emirates-nbd/177195704 saumilshah@slideshare.net(saumilshah) The Road To Defendable Systems - Emirates NBD saumilshah "Attack is a technical problem, defense is a political problem". For several years, cyber security has been misjudged as risk reduction. On one hand, business applications and architectures are growing rapidly. On the other hand, the cyber security organisation is struggling to be able to defend them in today's rapidly evolving threat landscape. This talk explores the gap in thought between the owner and the defender of today's business applications and what needs to be done to bridge it. We shall present proactive steps and measures to overcome the last hurdle in building defendable systems. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/enbd2019theroadtodefendablesystems-190928204241-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> &quot;Attack is a technical problem, defense is a political problem&quot;. For several years, cyber security has been misjudged as risk reduction. On one hand, business applications and architectures are growing rapidly. On the other hand, the cyber security organisation is struggling to be able to defend them in today&#39;s rapidly evolving threat landscape. This talk explores the gap in thought between the owner and the defender of today&#39;s business applications and what needs to be done to bridge it. We shall present proactive steps and measures to overcome the last hurdle in building defendable systems.
The Road To Defendable Systems - Emirates NBD from Saumil Shah
]]>
649 1 https://cdn.slidesharecdn.com/ss_thumbnails/enbd2019theroadtodefendablesystems-190928204241-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The CISO's Dilemma 44CON 2019 /slideshow/the-cisos-dilemma-44con-2019/171131964 44con2019thecisosdilemma-190912094011
Defending an enterprise is a balancing act. I have worked as an offensive testing vendor to several global organisations over 18 years. This talk explores the challenges that today’s CISOs face - the threat landscape, overall shortage of infosec expertise, the ever evaporating shelf life of infosec products and an increased burden of compliance requirements. I will share my experiences from working with highly effective CISOs and internal infosec teams and what it takes to function on the razor’s edge]]>

Defending an enterprise is a balancing act. I have worked as an offensive testing vendor to several global organisations over 18 years. This talk explores the challenges that today’s CISOs face - the threat landscape, overall shortage of infosec expertise, the ever evaporating shelf life of infosec products and an increased burden of compliance requirements. I will share my experiences from working with highly effective CISOs and internal infosec teams and what it takes to function on the razor’s edge]]>
Thu, 12 Sep 2019 09:40:11 GMT /slideshow/the-cisos-dilemma-44con-2019/171131964 saumilshah@slideshare.net(saumilshah) The CISO's Dilemma 44CON 2019 saumilshah Defending an enterprise is a balancing act. I have worked as an offensive testing vendor to several global organisations over 18 years. This talk explores the challenges that today’s CISOs face - the threat landscape, overall shortage of infosec expertise, the ever evaporating shelf life of infosec products and an increased burden of compliance requirements. I will share my experiences from working with highly effective CISOs and internal infosec teams and what it takes to function on the razor’s edge <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/44con2019thecisosdilemma-190912094011-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Defending an enterprise is a balancing act. I have worked as an offensive testing vendor to several global organisations over 18 years. This talk explores the challenges that today’s CISOs face - the threat landscape, overall shortage of infosec expertise, the ever evaporating shelf life of infosec products and an increased burden of compliance requirements. I will share my experiences from working with highly effective CISOs and internal infosec teams and what it takes to function on the razor’s edge
The CISO's Dilemma 44CON 2019 from Saumil Shah
]]>
1103 0 https://cdn.slidesharecdn.com/ss_thumbnails/44con2019thecisosdilemma-190912094011-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The CISO's Dilemma HITBGSEC2019 /slideshow/the-cisos-dilemma-hitbgsec2019/167315607 hitbgsec2019thecisosdilemma-190829030236
Defending an enterprise is a balancing act. I have worked as an offensive testing vendor to several global organisations over 18 years. This talk explores the challenges that today’s CISOs face - the threat landscape, overall shortage of infosec expertise, the ever evaporating shelf life of infosec products and an increased burden of compliance requirements. I will share my experiences from working with highly effective CISOs and internal infosec teams and what it takes to function on the razor’s edge]]>

Defending an enterprise is a balancing act. I have worked as an offensive testing vendor to several global organisations over 18 years. This talk explores the challenges that today’s CISOs face - the threat landscape, overall shortage of infosec expertise, the ever evaporating shelf life of infosec products and an increased burden of compliance requirements. I will share my experiences from working with highly effective CISOs and internal infosec teams and what it takes to function on the razor’s edge]]>
Thu, 29 Aug 2019 03:02:36 GMT /slideshow/the-cisos-dilemma-hitbgsec2019/167315607 saumilshah@slideshare.net(saumilshah) The CISO's Dilemma HITBGSEC2019 saumilshah Defending an enterprise is a balancing act. I have worked as an offensive testing vendor to several global organisations over 18 years. This talk explores the challenges that today’s CISOs face - the threat landscape, overall shortage of infosec expertise, the ever evaporating shelf life of infosec products and an increased burden of compliance requirements. I will share my experiences from working with highly effective CISOs and internal infosec teams and what it takes to function on the razor’s edge <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/hitbgsec2019thecisosdilemma-190829030236-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Defending an enterprise is a balancing act. I have worked as an offensive testing vendor to several global organisations over 18 years. This talk explores the challenges that today’s CISOs face - the threat landscape, overall shortage of infosec expertise, the ever evaporating shelf life of infosec products and an increased burden of compliance requirements. I will share my experiences from working with highly effective CISOs and internal infosec teams and what it takes to function on the razor’s edge
The CISO's Dilemma HITBGSEC2019 from Saumil Shah
]]>
907 1 https://cdn.slidesharecdn.com/ss_thumbnails/hitbgsec2019thecisosdilemma-190829030236-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Schrödinger's ARM Assembly /slideshow/schrdingers-arm-assembly/150858987 makearmshellcodegreatagainsnoopcon2019-190620103210
My talk on creating ARM/Thumb Polyglot shellcode for obfuscation, signature evasion and downright novelty of approach! Presented at SnoopCon 2019 ]]>

My talk on creating ARM/Thumb Polyglot shellcode for obfuscation, signature evasion and downright novelty of approach! Presented at SnoopCon 2019 ]]>
Thu, 20 Jun 2019 10:32:10 GMT /slideshow/schrdingers-arm-assembly/150858987 saumilshah@slideshare.net(saumilshah) Schrödinger's ARM Assembly saumilshah My talk on creating ARM/Thumb Polyglot shellcode for obfuscation, signature evasion and downright novelty of approach! Presented at SnoopCon 2019 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/makearmshellcodegreatagainsnoopcon2019-190620103210-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> My talk on creating ARM/Thumb Polyglot shellcode for obfuscation, signature evasion and downright novelty of approach! Presented at SnoopCon 2019
Schræ—¦dinger's ARM Assembly from Saumil Shah
]]>
663 4 https://cdn.slidesharecdn.com/ss_thumbnails/makearmshellcodegreatagainsnoopcon2019-190620103210-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
ARM Polyglot Shellcode - HITB2019AMS /slideshow/arm-polyglot-shellcode-hitb2019ams/144481698 makearmshellcodegreatagainhitb2019ams-190508231209
My talk on creating ARM/Thumb Polyglot shellcode for obfuscation, signature evasion and downright novelty of approach! Presented at Hack in the Box Amsterdam 2019]]>

My talk on creating ARM/Thumb Polyglot shellcode for obfuscation, signature evasion and downright novelty of approach! Presented at Hack in the Box Amsterdam 2019]]>
Wed, 08 May 2019 23:12:09 GMT /slideshow/arm-polyglot-shellcode-hitb2019ams/144481698 saumilshah@slideshare.net(saumilshah) ARM Polyglot Shellcode - HITB2019AMS saumilshah My talk on creating ARM/Thumb Polyglot shellcode for obfuscation, signature evasion and downright novelty of approach! Presented at Hack in the Box Amsterdam 2019 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/makearmshellcodegreatagainhitb2019ams-190508231209-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> My talk on creating ARM/Thumb Polyglot shellcode for obfuscation, signature evasion and downright novelty of approach! Presented at Hack in the Box Amsterdam 2019
ARM Polyglot Shellcode - HITB2019AMS from Saumil Shah
]]>
1904 6 https://cdn.slidesharecdn.com/ss_thumbnails/makearmshellcodegreatagainhitb2019ams-190508231209-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
What Makes a Compelling Photograph /slideshow/what-makes-a-compelling-photograph/125960674 theelementsofphotography-181215181852
ºÝºÝߣs from my lectures on Photography As An Art Form. Follow me on facebook at https://www.facebook.com/my.spectral.lines and on Instagram at @therealsaumil.]]>

ºÝºÝߣs from my lectures on Photography As An Art Form. Follow me on facebook at https://www.facebook.com/my.spectral.lines and on Instagram at @therealsaumil.]]>
Sat, 15 Dec 2018 18:18:51 GMT /slideshow/what-makes-a-compelling-photograph/125960674 saumilshah@slideshare.net(saumilshah) What Makes a Compelling Photograph saumilshah ºÝºÝߣs from my lectures on Photography As An Art Form. Follow me on facebook at https://www.facebook.com/my.spectral.lines and on Instagram at @therealsaumil. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/theelementsofphotography-181215181852-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> ºÝºÝߣs from my lectures on Photography As An Art Form. Follow me on facebook at https://www.facebook.com/my.spectral.lines and on Instagram at @therealsaumil.
What Makes a Compelling Photograph from Saumil Shah
]]>
341 2 https://cdn.slidesharecdn.com/ss_thumbnails/theelementsofphotography-181215181852-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Make ARM Shellcode Great Again - HITB2018PEK /slideshow/make-arm-shellcode-great-again-hitb2018pek/121501675 makearmshellcodegreatagainhitb2018pek-181102051527
Compared to x86, ARM shellcode has made little progress. The x86 hardware is largely homogenous. ARM, however, has several versions and variants across devices today. There are several constraints and subtleties involved in writing production quality ARM shellcode which works on modern ARM hardware, not just on QEMU emulators. In this talk, we shall explore issues such as overcoming cache coherency, reliable polymorphic shellcode, ARM egghunting and last but not the least, polyglot ARM shellcode. A bonus side effect of this talk will be creating headaches for those who like to defend agaisnt attacks using age old signature based techniques]]>

Compared to x86, ARM shellcode has made little progress. The x86 hardware is largely homogenous. ARM, however, has several versions and variants across devices today. There are several constraints and subtleties involved in writing production quality ARM shellcode which works on modern ARM hardware, not just on QEMU emulators. In this talk, we shall explore issues such as overcoming cache coherency, reliable polymorphic shellcode, ARM egghunting and last but not the least, polyglot ARM shellcode. A bonus side effect of this talk will be creating headaches for those who like to defend agaisnt attacks using age old signature based techniques]]>
Fri, 02 Nov 2018 05:15:27 GMT /slideshow/make-arm-shellcode-great-again-hitb2018pek/121501675 saumilshah@slideshare.net(saumilshah) Make ARM Shellcode Great Again - HITB2018PEK saumilshah Compared to x86, ARM shellcode has made little progress. The x86 hardware is largely homogenous. ARM, however, has several versions and variants across devices today. There are several constraints and subtleties involved in writing production quality ARM shellcode which works on modern ARM hardware, not just on QEMU emulators. In this talk, we shall explore issues such as overcoming cache coherency, reliable polymorphic shellcode, ARM egghunting and last but not the least, polyglot ARM shellcode. A bonus side effect of this talk will be creating headaches for those who like to defend agaisnt attacks using age old signature based techniques <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/makearmshellcodegreatagainhitb2018pek-181102051527-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Compared to x86, ARM shellcode has made little progress. The x86 hardware is largely homogenous. ARM, however, has several versions and variants across devices today. There are several constraints and subtleties involved in writing production quality ARM shellcode which works on modern ARM hardware, not just on QEMU emulators. In this talk, we shall explore issues such as overcoming cache coherency, reliable polymorphic shellcode, ARM egghunting and last but not the least, polyglot ARM shellcode. A bonus side effect of this talk will be creating headaches for those who like to defend agaisnt attacks using age old signature based techniques
Make ARM Shellcode Great Again - HITB2018PEK from Saumil Shah
]]>
408 2 https://cdn.slidesharecdn.com/ss_thumbnails/makearmshellcodegreatagainhitb2018pek-181102051527-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-saumilshah-48x48.jpg?cb=1682082369 Saumil Shah is the founder and CEO of Net Square, providing cutting edge information security services to clients worldwide. Saumil is an internationally recognized conference speaker and instructor for over 15 years. He is also the co-developer of the wildly successful "Exploit Laboratory" courses and authored two books titled "Web Hacking: Attacks and Defense" and "The Anti-Virus Book". Saumil holds an M.S. in Computer Science from Purdue University, USA and a B.E. in Computer Engineering from Gujarat University. He spends his leisure time playing Pacman, flying kites, traveling around the world and taking pictures. net-square.com https://cdn.slidesharecdn.com/ss_thumbnails/the-hand-that-strikes-230421131307-417bc238-thumbnail.jpg?width=320&height=320&fit=bounds saumilshah/the-hand-that-strikes-also-blocks The Hand That Strikes,... https://cdn.slidesharecdn.com/ss_thumbnails/debugging-with-emux-back2workshops-2022-220708073557-d000f020-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/debugging-with-emux-ringzer0-back2workshops/252145590 Debugging with EMUX - ... https://cdn.slidesharecdn.com/ss_thumbnails/emux-ringzer0-dec2021-211220092803-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/unveiling-emux-arm-and-mips-iot-emulation-framework/250870040 Unveiling EMUX - ARM a...