{"id":404,"date":"2024-07-18T22:38:01","date_gmt":"2024-07-19T01:38:01","guid":{"rendered":"https:\/\/brhuecon.com\/2024\/?page_id=404"},"modified":"2025-07-23T22:09:49","modified_gmt":"2025-07-24T01:09:49","slug":"descricao-das-palestras","status":"publish","type":"page","link":"https:\/\/brhuecon.com\/2025\/descricao-das-palestras\/","title":{"rendered":"Descri\u00e7\u00e3o das Palestras"},"content":{"rendered":"\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>T\u00edtulo: MacOS Malware: Breaking Barriers<\/strong><br><strong>Descri\u00e7\u00e3o<\/strong>: Nessa talk, vou compartilhar os principais desafios que encontrei ao desenvolver malwares para MacOS. Isso envolve entender a fundo como o sistema funciona \u2014 desde o papel do launchd na inicializa\u00e7\u00e3o e persist\u00eancia, at\u00e9 como o Gatekeeper e a Notarization bloqueiam a execu\u00e7\u00e3o de bin\u00e1rios n\u00e3o confi\u00e1veis. Tamb\u00e9m vou abordar como o firewall do macOS pode limitar a comunica\u00e7\u00e3o do malware, al\u00e9m das camadas de prote\u00e7\u00e3o como o SIP (System Integrity Protection) e o XProtect, o antiv\u00edrus nativo da Apple. Cada uma dessas barreiras exige t\u00e9cnicas espec\u00edficas de evas\u00e3o e adapta\u00e7\u00e3o, e vou mostrar na pr\u00e1tica como tudo isso impacta o desenvolvimento.<br>Panorama Geral: Desenvolvendo Malware no Ecossistema Apple Breve contextualiza\u00e7\u00e3o do macOS como alvo de ataques. Diferen\u00e7as fundamentais em rela\u00e7\u00e3o ao desenvolvimento de malware para Windows e Linux. O porqu\u00ea de atacar o macOS: motiva\u00e7\u00f5es reais e mitos do \u201cmacOS inviol\u00e1vel\u201d.<br>Launchd: A Porta de Entrada para Persist\u00eancia Como o launchd gerencia processos e inicializa\u00e7\u00f5es. Formas leg\u00edtimas e maliciosas de criar persist\u00eancia via launch agents e launch daemons. Casos reais e pr\u00e1ticas comuns de abuso.<br>Gatekeeper &amp; Notarization: Barreiras para a Execu\u00e7\u00e3o Como o Gatekeeper analisa e bloqueia bin\u00e1rios n\u00e3o confi\u00e1veis. O papel da Notarization no controle de c\u00f3digo \u2014 e como driblar ou contornar esse processo. Demonstra\u00e7\u00f5es pr\u00e1ticas de evas\u00e3o de verifica\u00e7\u00e3o<br>Firewall Nativo: Restri\u00e7\u00f5es de Comunica\u00e7\u00e3o Como o Application Firewall do macOS atua sobre conex\u00f5es de sa\u00edda. Estrat\u00e9gias para evitar detec\u00e7\u00e3o e manter canais de C2 (Command &amp; Control).<br>System Integrity Protection (SIP): Prote\u00e7\u00e3o em N\u00edvel de Sistema O que o SIP protege e por qu\u00ea ele representa um grande obst\u00e1culo.<br>XProtect e o Ecosistema de Prote\u00e7\u00e3o Nativo Como funciona o XProtect, o antiv\u00edrus embutido da Apple. An\u00e1lise de como ele se atualiza e detecta amea\u00e7as. Testes e observa\u00e7\u00f5es pr\u00e1ticas sobre sua efic\u00e1cia e falhas.<br>Evas\u00e3o e Adapta\u00e7\u00e3o: A Arte de Contornar Prote\u00e7\u00f5es T\u00e9cnicas gerais e espec\u00edficas para evas\u00e3o de seguran\u00e7a. Adapta\u00e7\u00e3o do c\u00f3digo malicioso para sobreviver a atualiza\u00e7\u00f5es do sistema. Como os ofensores \u201cpensam como engenheiros da Apple\u201d para manter vantagem.<br>Demonstra\u00e7\u00f5es Pr\u00e1ticas Exemplos Ferramentas utilizadas durante o desenvolvimento e testes. Demonstra\u00e7\u00e3o de impacto das prote\u00e7\u00f5es nativas em tempo real Demonstra\u00e7\u00e3o de impacto das prote\u00e7\u00f5es fornecidas por ferramentas de seguran\u00e7a do mercado.<br><strong>Palestrante:<\/strong> <a href=\"https:\/\/www.linkedin.com\/in\/zozielfreire\/\" target=\"_blank\" rel=\"noopener\" title=\"\">Zoziel Pinto Freire<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>T\u00edtulo: Old Tactics, New Weapons: Abusing Modern Software Stacks for Reliable Shell Access<\/strong><br><strong>Descri\u00e7\u00e3o<\/strong>: For years, Pentestmonkey Reverse Shell Cheat Sheet defined the essentials of post-exploitation. Bash, Python, PHP, (G)Awk, Netcat and others were quick, simple and highly effective tools for gaining shell access. Today, those tools are the first to be flagged, restricted or removed. In real-world hardened environments, the old paths are closed. Meanwhile, new runtimes like Clojure, Racket, NATS-IO, Bun, Crystal, Red Language, Ballerina and others are becoming part of production environments, CI\/CD pipelines and internal developer ecosystems, usually without security teams treating them as risks.<br>This workshop focuses on building practical, working reverse and bind shells using these modern runtimes. Participants will write their own payloads, test them live against targets and leave with working knowledge of how to survive without traditional tooling. Every shell demonstrated will be integrated into the Metasploit Framework with custom modules built for each runtime. Source code, victim and attacker virtual machines and pre-built environments will be provided to ensure every participant can practice during the session.<br>This is not a theory-heavy workshop. It is about operational survival when Python is gone, Netcat is restricted and standard shells are no longer viable. It is about turning runtimes that defenders ignore into reliable offensive footholds. Attendees will leave with ready-to-use payloads, working Metasploit extensions and the technical knowledge to adapt to modern detection-heavy environments.<br><strong>Palestrante:<\/strong> <a href=\"https:\/\/www.linkedin.com\/in\/espreto\" target=\"_blank\" rel=\"noopener\" title=\"Roberto &quot;espret0&quot; Soares\">Roberto &#8220;espret0&#8221; Soares<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>T\u00edtulo: Decoding New PDF Binaries: Unveiling Structures and Techniques in Malware Analysis<\/strong><br><strong>Descri\u00e7\u00e3o<\/strong>: Demonstrate different kind of structures in the binaries as a PDF(header\/ body\/cross-reference table\/trailer), explaining how each session works within a binary, what are the techniques used such as packers, obfuscation with JavaScript (PDF), and more, explaining as well about some anti-disassembly techniques, demonstrating as is the action of these malware\u2019s and where it would be possible to \u201cinclude\u201d a malicious code. By the end of this \u201ctalk\u201d it will be clear to everyone, the differences in binaries structures, how can the researcher should conduct each of these kinds of analyzes, besides, of course, it should seek more basic knowledge, with file structures, software architecture and programming language.<br><strong>Palestrante:<\/strong> <a href=\"https:\/\/filipipires.com\/\" target=\"_blank\" rel=\"noopener\" title=\"\">Filipi Pires<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>T\u00edtulo: The Schr\u00f6dinger&#8217;s ESC1 Vulnerability<\/strong><br><strong>Descri\u00e7\u00e3o<\/strong>: Security tools are often the first lens through which we assess risk, but what if that lens is foggy? In this session, we\u2019ll explore how some enumeration tools may misidentify ESC1 vulnerabilities in Active Directory Certificate Services (ADCS) due to incomplete or misleading interpretation of certificate template ACLs. Through practical examples and lab-based reproductions of real misconfigurations, we\u2019ll revisit the logic behind common detections, examine the nuances of ExtendedRights and ControlAccess permissions, and learn how to verify whether an ESC1 finding is truly exploitable or just noise. After all, Schr\u00f6dinger\u2019s cat might be alive, dead, or have enrollment rights. We\u2019d better open the box. This talk is intended for security professionals with some familiarity with ADCS, red or blue team operations, and ACLs. Attendees will leave with practical insights to improve both offensive assessments and defensive detections.<br><strong>Palestrante:<\/strong> <a href=\"https:\/\/www.linkedin.com\/in\/vilacham\/\" target=\"_blank\" rel=\"noopener\" title=\"\">Matheus Vilach\u00e3<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>T\u00edtulo: AWS Cognito: Hidden Risks Behind Misconfigurations<\/strong><br><strong>Descri\u00e7\u00e3o<\/strong>: Nesse paper vou demonstrar como o AWS Cognito, apesar de ser extremamente seguro e escal\u00e1vel, pode apresentar vulnerabilidades importantes quando mal configurado. A ideia \u00e9 apresentar que os problemas n\u00e3o ocorrem por causa da tecnologia em si, mas sim por implementa\u00e7\u00f5es incorretas realizadas pelos desenvolvedores.<br>AWS Cognito \u00e9 bem intuitivo de configurar e as vezes esquecer de marcar um check nas op\u00e7\u00f5es, pode deixar uma porta de entrada para o sistema\/organiza\u00e7\u00e3o.<br>Vou apresentar falhas que podem servir de ponto de entrada para a organiza\u00e7\u00e3o como selfsignup, privilege escalation e uso de credenciais tempor\u00e1rias da AWS. Tamb\u00e9m cen\u00e1rios que afetam diretamente o cliente final da aplica\u00e7\u00e3o, como bypass de 2FA, altera\u00e7\u00f5es cadastrais indevidas e account takeover mostrando o impacto que essas brechas podem causar.<br><strong>Palestrante:<\/strong> <a href=\"https:\/\/www.linkedin.com\/in\/willian-mm\/\" target=\"_blank\" rel=\"noopener\" title=\"\">Willian Marretti<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>T\u00edtulo: Construindo Defesas Inteligentes com OpenSource<\/strong><br><strong>Descri\u00e7\u00e3o<\/strong>: M\u00e9dias empresas enfrentam um dilema comum: sem or\u00e7amento para solu\u00e7\u00f5es de \u201cquadrante l\u00edder\u201d, acabam vulner\u00e1veis a ataques que sobrecarregam times j\u00e1 enxutos. Nesta talk, vamos explorar como \u00e9 poss\u00edvel construir uma defesa robusta e escal\u00e1vel utilizando ferramentas OpenSource, mantendo o foco em seguran\u00e7a, efici\u00eancia operacional e redu\u00e7\u00e3o de custos. Entenda os caminhos pr\u00e1ticos para proteger seu ambiente sem depender de grandes investimentos.<br><strong>Palestrante:<\/strong> <a href=\"https:\/\/medium.com\/@k0b1z\" target=\"_blank\" rel=\"noopener\" title=\"\">Vitor Sugai<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>T\u00edtulo: Cyber Physical Security &#8211; Um vis\u00e3o geral<\/strong><br><strong>Descri\u00e7\u00e3o<\/strong>: Palestra din\u00e2mica sobre sistemas ciber-f\u00edsicos, onde o apresentador revelar\u00e1 exemplos reais de arquiteturas de seguran\u00e7a adaptadas a diferentes neg\u00f3cios, como automa\u00e7\u00e3o predial, gera\u00e7\u00e3o de energia el\u00e9trica, dispositivos m\u00e9dicos, transporte e ind\u00fastrias de processos (qu\u00edmicos, \u00f3leo e g\u00e1s). Explore os modelos robustos da ISA\/IEC 62443, que definem n\u00edveis de seguran\u00e7a, avalia\u00e7\u00f5es de risco e ciclos de vida de produtos para automa\u00e7\u00e3o industrial, e o NIST SP 800-82 (Rev. 3), guia essencial para seguran\u00e7a em tecnologias operacionais (OT), com topologias de sistemas, requisitos de desempenho e estrat\u00e9gias para mitigar vulnerabilidades \u00fanicas.<br>Na sequ\u00eancia, enfrente a realidade das principais amea\u00e7as e ataques direcionados, incluindo ransomware, malware sofisticado (como ataques zero-day), phishing, invas\u00f5es \u00e0 cadeia de suprimentos e amea\u00e7as internas, que exploram a converg\u00eancia entre IT e OT, causando impactos devastadores em infraestruturas cr\u00edticas.<br><strong>Palestrante:<\/strong> <a href=\"https:\/\/br.linkedin.com\/in\/raphaelpereira\" target=\"_blank\" rel=\"noopener\" title=\"\">Raphael Pereira<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>T\u00edtulo: Panorama do Risco Cibern\u00e9tico no Brasil<\/strong><br><strong>Descri\u00e7\u00e3o<\/strong>: Imagine se um dos mais avan\u00e7ados atores de amea\u00e7as decidisse atacar 117 empresas m\u00e9dias e grandes do Brasil durante um ano. Quais seriam as conclus\u00f5es e impress\u00f5es sobre as superf\u00edcies digitais do pa\u00eds em termos de seguran\u00e7a? Qual seria o impacto potencial de cada um desses ataques? Como se refletiria o n\u00edvel de dificuldade enfrentado, medido em probabilidades reais? E se segment\u00e1ssemos esses dados por verticais, ampliando nossa compreens\u00e3o setorial? Agora, imagine alocar especialistas dedicados, m\u00eas a m\u00eas, em dezenas dessas empresas para realizar assessments de maturidade S\u00c9RIOS \u2013 com evid\u00eancias robustas e um Plano Diretor de Seguran\u00e7a da Informa\u00e7\u00e3o alinhado ao apetite de risco de cada corpora\u00e7\u00e3o. Ao cruzarmos esses dados com Simula\u00e7\u00f5es de Advers\u00e1rio, chegar\u00edamos a um KRI (Key Risk Indicator) que revela a real situa\u00e7\u00e3o do risco cibern\u00e9tico. E se tudo isso j\u00e1 existisse para o deleite de qualquer entusiasta de Cyber Security? Este \u00e9 o 1\u00ba Panorama do Risco Cibern\u00e9tico no Brasil.<br><strong>Palestrante:<\/strong> <a href=\"https:\/\/www.linkedin.com\/in\/alexandrebbrum\/\" target=\"_blank\" rel=\"noopener\" title=\"\">Alexandre Brum<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>T\u00edtulo: MacOS Malware: Breaking BarriersDescri\u00e7\u00e3o: Nessa talk, vou compartilhar os principais desafios que encontrei ao desenvolver malwares para MacOS. Isso envolve entender a fundo como o sistema funciona \u2014 desde o papel do launchd na inicializa\u00e7\u00e3o e persist\u00eancia, at\u00e9 como o Gatekeeper e a Notarization bloqueiam a execu\u00e7\u00e3o de bin\u00e1rios n\u00e3o confi\u00e1veis. Tamb\u00e9m vou abordar&hellip;&nbsp;<a href=\"https:\/\/brhuecon.com\/2025\/descricao-das-palestras\/\" rel=\"bookmark\"><span class=\"screen-reader-text\">Descri\u00e7\u00e3o das Palestras<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","ngg_post_thumbnail":0,"footnotes":""},"class_list":["post-404","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/brhuecon.com\/2025\/wp-json\/wp\/v2\/pages\/404","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/brhuecon.com\/2025\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/brhuecon.com\/2025\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/brhuecon.com\/2025\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/brhuecon.com\/2025\/wp-json\/wp\/v2\/comments?post=404"}],"version-history":[{"count":15,"href":"https:\/\/brhuecon.com\/2025\/wp-json\/wp\/v2\/pages\/404\/revisions"}],"predecessor-version":[{"id":572,"href":"https:\/\/brhuecon.com\/2025\/wp-json\/wp\/v2\/pages\/404\/revisions\/572"}],"wp:attachment":[{"href":"https:\/\/brhuecon.com\/2025\/wp-json\/wp\/v2\/media?parent=404"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}