During the Bsides 2018 conference, I made a presentation on how – during a exercise – we managed to infiltrate and exfiltrate data in/out of a corporate secure laptop, that was using the “” architecture. We managed that by exploiting , and race conditions on the laptop's setup.

The talk has been published by the Bsides team here, but since the projector screen is not clearly visible, we have decided to upload the presentation file here.


P.S. Stay tuned for the pending release of the CVEs.

Share This

Share this post with your friends!