Four Cool Tools Expected Out of Black Hat

Security professionals, penetration testers and malware investigators are preparing to get energized. In just about a week the hacking community will converge on Las Vegas to drop their biggest discoveries of the year at the podiums of Black Hat USA. This annual confab always offers up a range of great new ideas for defenders, red teamers and security researchers—as well as a boatload of new tools. This year’s show should be no different. The buzz is already growing for a number of previously unseen tools that will help security pros solve tough problems and break things in whole new ways. Here are a few highlights.


Hardware vulnerabilities and exploits are expected to be the number one theme coming out of Black Hat this year, unsurprisingly following up on the fireworks caused by a constant-procession of discoveries building off of the Spectre and Meltdown flaws disclosed earlier in 2018.

Hardware hacker Colin O’Flynn plans to release a new open-source tool he calls Chip-Whisperer-Lint, which when paired with the open-source ChipWhisperer hardware can completely automate discovery of side-channel power analysis attacks on embedded devices. It should be a powerful tool for device makers and security pros auditing the vulnerability of their systems.

NLP Social Engineering Analysis Tool

Social engineering is always on the spear tip of any effective attack campaign. A pair of researchers wants to help security pros get better at detecting it across not just email, but also phone, in person and other messaging formats. In order to do that they believe security tools need to take a content-based approach that can analyze the meaning meaning of the message in a more automated fashion.

In order to do that, they believe Natural Language Processing (NLP) is a must. Ian Harris, a professor at UC Irvine and an NLP and security specialist, along with independent researcher Marcel Carlsson plan on releasing new NLP-based tools that they say can help the security community start to make progress on detecting malicious interactions.

Deserialization Toolkit

Last year insecure deserialization cracked the OWASP Top 10 as one of most troublesome types of bugs that developers and security pros should seek to eradicate from their code.

Deserialization flaws stem from the process of serialization, where programs turn certain objects into plaintext data that will be restored at a later point. Deserialization takes that data and rebuilds it into that object. While most developers today realize they can’t trust user input, they tend to trust data bound for deserialization—which gives attackers the perfect ‘in’ for subverting the process and carrying out a range of attacks.

In the past, the exploitation of deserialization flaws have mostly been manual, but a senior security engineer with Netflix, Ian Haken, will be releasing a new tool and method that automates the discoveries of deserialization ‘gadget chains’ that make a flaw exploitable. He hopes the tool will give defensive teams an easier way to prioritize deserialization bugs based on exploitability.

Kernel Exploit Framework

Much in the same vein, the process of discovering kernel vulnerabilities has been automated to great effect but exploitation up until now has still needed a lot of manual work due to the complexity and scale of kernels. But a trio of researchers is about to change that equation with a new exploitation framework that they told Dark Reading will “help security pros craft ‘powerful working exploits against arbitrary kernel vulnerabilities in a semi-automated fashion.'”

Jimmy Su, head of security research for, and academic researchers Wei Wu and Xinyu Xing of Penn State University plan to release the framework at the show and will disclose a number of exploits found by it that work on kernel flaws that hadn’t been confirmed as exploitable in the past.

*** This is a Security Bloggers Network syndicated blog from Business Insights In Virtualization and Cloud Security authored by Ericka Chickowski. Read the original post at:

Ericka Chickowski

An award-winning freelance writer, Ericka Chickowski covers information technology and business innovation. Her perspectives on business and technology have appeared in dozens of trade and consumer magazines, including Entrepreneur, Consumers Digest, Channel Insider, CIO Insight, Dark Reading and InformationWeek. She's made it her specialty to explain in plain English how technology trends affect real people.

ericka-chickowski has 68 posts and counting.See all posts by ericka-chickowski