Nika Korchok Wakulich
Nika Korchok Wakulich (ic3qu33n) is a Security Consultant at Leviathan Security Group where she works on a range of penetration testing engagements, with a focus on hardware and embedded security. Outside of work, she combines her artistic practice (woodcut prints, painting, drawing, etc.) with her independent security research on passion projects in different areas of security. A few of her current favorites are hardware&firmware RE, DOS malware, bootkits, and writing vx/art demos in x86 asm. When she isn’t making art, reverse engineering or making art as a part of her reverse engineering process, she enjoys learning languages and skateboarding.
You can find her on Instagram as @nikaroxanne, and on Mastodon/Discord/etc. as @ic3qu33n
Sessions
What can the early bootkits of the 1980s and 1990s teach us about bootkits of the present day? Why did vx-ers of that era use graphical payloads and how can their creative stealth and persistence techniques be applied to exploit writing and bootkit development of the present day?
Part history lesson, part malware analysis and part RE extravaganza, this talk will be a greatest hits deep dive into several of the most iconic and memorable moments in early bootkit history — Brain, Stoned, Ping-Pong, and others — and will explore the connection between legacy bootkit techniques and modern UEFI-targeting malware. The talk will then focus on the details of how I reverse engineered the infamous Michaelangelo bootkit and remixed its MBR infection techniques, to create a polymorphic art engine.
In the words of the ‘90s vx-er Spanska: “Coding a virus can be creative.” This talk presents malware art that aims to pay homage to the techniques of notable vx-ers of the ‘80s and ‘90s while adapting their techniques for the modern era.
There will be pretty pictures. There will be core wars. There will be a plethora of assembly language programming tricks.
I’m throwing a party for the ages and serving up a veritable smorgasbord of vintage exploits.
can’t wait to c u there
xoxo
ic3qu33n