Friday, February 6, 2026

[announce] Next NYC*BUG: Weird Code Injection Techniques on FreeBSD With libhijack.pdf, Shawn Webb 2026-03-04

  • Weird Code Injection Techniques on FreeBSD With libhijack.pdf remote presentation, Shawn Webb
    2026-03-04 @ 18:45 local (23:45 UTC) - Backroom of Brass Monkey 55 Little West 12th St
    Remote participation: Plans are to stream via NYC*BUG website. Q&A will be via IRC on libera.chat channel #nycbug - please preface your questions with '[Q]'.

    FreeBSD is a widely-used open source operating system, powering your Playstation 4 and 5, Netflix, Juniper dev ices, and many other devices. libhijack is a post-exploitation tool to make code injection easier. In as littl e as four lines of code, developers can inject a complete shared object into another process fully anonymously.

    libhijack makes it easy to force the target process to create new anonymous memory mappings, inject code into memory-backed file descriptors, and finally call fdlopen on the memfd.

    This presentation walks attendees through various methods in which to stealthily inject code into a target pro cess–some of these methods are new variants of prior work and remain unique to libhijack.

    Shawn Webb is the co-founder of the HardenedBSD Project and the founding president of The HardenedBSD Foundati on, a tax-exmpt not-for-profit 501©3 charitable organization in the US. While Shawn has a few decades of exp erience in infosec, both as a profession and a hobby, he considers himself a perpetual newb. He works for IOAc tive, an offensive security company, spending his time finding vulnerabilities in customer products.

    While working in the NSA's backyard, he had the opportunity to be mentored by two interns–an experience that changed his life. He and his interns focused on the intersection of human rights and information security and cybersecurity.

    Shawn "lattera" Webb also maintains a post-exploitation tool called libhijack. It makes runtime process infect ion and runtime function hooking for remote processes over the ptrace boundary incredibly simple on FreeBSD.

    Nearest NYC Subway is the 14th Street/Eighth Avenue station L, A, C, E.

    To get to the backroom, you must enter the front door, follow the long bar on your left, and walk all the way to the back. At the rear of the BrassMonkey, you will see an alcove for the 3 bathrooms our room is off to your right.

  • More Info: https://www.nycbug.org/

    No comments:

    Post a Comment