During the Bsides Athens 2018 conference, I made a presentation on how – during a penetration test exercise – we managed to infiltrate malware and exfiltrate data in/out of a corporate secure laptop, that was using the “Walled Garden” architecture. We managed that by exploiting 0-days, misconfigurations and race conditions on the laptop’s setup.

The talk has been published by the Bsides team here, but since the projector screen is not clearly visible, we have decided to upload the presentation file here.


P.S. Stay tuned for the pending release of the CVEs.

Share This

Share this post with your friends!