Search Mailing List Archives


Limit search to: Subject & Body Subject Author
Sort by: Reverse Sort
Limit to: All This Week Last Week This Month Last Month
Select Date Range     through    

[liberationtech] At Stanford, Pegasus Exploits Hack Workshop

Diana Fernández diana at accessnow.org
Fri Jan 20 08:12:43 PST 2017


Hi

There will be a live transmission of this workshop? I am really
interested in participate but I am not able to attend to the event (I am
in Costa Rica).

Please let me know if there will be an online streaming session of this
workshop, it sound quite interesting.

Thanks and regards,

Diana

On 20/01/2017 08:40, Yosem Companys wrote:
> Want to learn about the Pegasus iOS spyware that targeted human rights
> activist Ahmed Mansoor last August? Join us at our hack workshop next
> Tuesday! We will be discussing the Pegasus kernel exploits in detail,
> including a live demo of the exploits in action on OS X.
>
>
>
> Date: Tuesday, January 24, 5:00-6:00 pm
> Location: Shriram 262
>
> The Pegasus spyware (as featured in the New York Times
> <https://www.nytimes.com/2016/08/26/technology/apple-software-vulnerability-ios-patch.html>,
> The Guardian
> <https://www.theguardian.com/world/2016/aug/26/israeli-firm-accused-of-creating-iphone-spyware>,
> Wired
> <https://www.wired.com/2016/08/hacking-group-selling-ios-vulnerabilities-state-actors/>,
> and more
> <https://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/>)
> was written by an Israeli company called the NSO Group, and used to
> target Ahmed Mansoor, an internationally recognized human rights
> activist from the United Arab Emirates. Pegasus exploited several iOS
> vulnerabilities, including three zero-day vulnerabilities not known to
> Apple, worth an estimated one million dollars on the black market.
>
> We will be analyzing a use-after-free vulnerability that was used to
> take control of the kernel. The content will be technical, so
> experience at least at the level of CS107 is preferred. The demo will
> be done on OS X Yosemite version 10.10.5.
>
>
>

-- 
Diana Fernández Sánchez
Security Incident Handler
Access Now Costa Rica | accessnow.org
PGP Fingerprint: 46F2 8351 F17D 674C 467F ED57 904F C8BF 9A96 74D3

* *Get* your tickets for RightsCon Brussels
<https://www.rightscon.org/#tickets>, March 29-31, 2017

* *Protect* digital rights around the world? Support Access Now with a
donation today.
<https://donate.accessnow.org/ea-action/action?ea.client.id=1921&ea.campaign.id=43986>

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.stanford.edu/pipermail/liberationtech/attachments/20170120/abc53d6d/attachment.html>


More information about the liberationtech mailing list