Show filters Hide filters

Refine your search

Publication Year
Publisher
1-30 out of 30 results
Change view
  • Sort by:
30:47 Hacktivity English 2015

Modification of the prime generation method of the OpenSSL library

Random numbers are very important in many fields of computer science, especially in cryptography. One of the most important usages of pseudorandom number generators (PRNG) are is key generation methods for cryptographic purposes. In this presentation a modification of the prime generation method of the OpenSSL library will be presented. The modified version of the library passes every well-known statistical tests (e.g NIST test, DIEHARD test), however while an adversary is still able to reconstruct the prime numbers (P,Q) from the public key. The method can be used for malicious purposes as a sophisticated backdoor. The presented research is based on the theory of kleptography and a recently published research paper.
  • Published: 2015
  • Publisher: Hacktivity
  • Language: English
39:31 Hacktivity English 2015

OWASP Security knowledge Framework

We will go trough the aviation industrie to see how they work and how they deal with problems they encounter. Then we show how developers can solve problems using the same methodology. This presentation will show to accomplish the same in the Software Development Life Cycle of your applications in a DevOpS environment where multiple deployments are done in a day and where security is important.
  • Published: 2015
  • Publisher: Hacktivity
  • Language: English
42:06 Hacktivity English 2015

Why Nation-State Malwares Target Telco Networks: Dissection Technical Capabilities of Regin and Its Counterparts

The recent research in malware analysis suggests state actors allegedly use cyber espionage campaigns against GSM networks. Analysis of state-sponsored malwares such as Flame, Duqu, Uruborus and the Regin revealed that these were designed to sustain long-term intelligence-gathering operations by remaining under the radar. Antivirus companies made a great job in revealing technical details of the attack campaigns, however, they have almost exclusively focused on the executables or the memory dump of the infected systems - the research hasn't been simulated in a real environment. In this talk, we are going to break down the Regin framework stages from a reverse engineering perspective - kernel driver infection scheme, virtual file system and its encryption scheme, kernel mode manager- while analyzing its behaviors on a GSM network and making technical comparison of its counterparts - such as TDL4, Uruborus, Duqu2.
  • Published: 2015
  • Publisher: Hacktivity
  • Language: English
37:06 Hacktivity English 2015

Memory corruption vulnerabilities, runtime mitigations and their bypasses

Memory corruption vulnerabilities are ubiquitous and unavoidable issues of our complex applications. There are many exploitation and exploit mitigation techniques offor them as well as bypass methods of for the used or proposed defenses. For instance beyond in addition to the nowadays classic defenses of Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR), there are newer more recent proposals like Control Flow Integrity (CFI) and fine-grained ASLR, even if these solutions are not frequently used in practice today mainly for performance and compatibility reasons. The aim of this talk is to provide an overview of the main achievements of the state -of -the -art academic research in this field, and also to demonstrate and discuss some concrete uses of evasion techniques for bypassing runtime mitigations, like the Enhanced Mitigation Experience Toolkit (EMET) of Microsoft.
  • Published: 2015
  • Publisher: Hacktivity
  • Language: English
46:00 Hacktivity English 2015

Layer 1 encryption and decryption

Ha a fizikai rétegrol beszélünk, mindenki drótokra és optikai kapcsolatokra gondol, miközben a modern kommunikáció jelentos része vezeték nélkül zajlik. A rendelkezésre álló frekvenciaspektrum jobb kihasználáshoz az eszközök frekvenciaugratásos technikákat használnak, azaz mind a leadó-, mind a vevo-berendezés másodpercenként több ezerszer vált frekvenciát. A megfelelo kommunikáció biztosításához a leadót és a vevot szinkronban kell tartani. A kereskedelmi használatban ezt frekvenciaugratásos eloírások biztosítják. Ha a kommunikációt tovább akarjuk titkosítani, csak annyit kell tennünk, hogy nem szabványos eloírást használunk, így harmadik fél nem tudja veszteség nélkül összegyojteni az átvitt adatokat, ez a veszteség pedig megakadályozza a tartalom titkosítását megfejtését. A digitális jelfeldolgozás új eszközt biztosít minden átvitt karakterfüzér azonosítására és összegyujtésére.
  • Published: 2015
  • Publisher: Hacktivity
  • Language: English
51:51 Hacktivity English 2015

Comparing the incomparables

It is common belief that APT groups are masters of exploitation. If anyone, they should know everything about it, right? Our research into the real world uses of the CVE-2014-1761 vulnerability shows that it is far from being true. It is a common practice in the anti-malware world that the security products are compared to each other in comparative tests. Even the tests themselves can be evaluated by the criteria of the Anti-Malware Testing Standards Organization. The only players, who are not rated, are the malware authors. This is for a good reason: their activities cover a wide range of operations, that don’t fully match and can’t be exactly measured. The deep analysis of the samples using the CVE-2014-1761 vulnerability gave us a rare opportunity to compare the skills of a few different malware author groups. This is not a full and comprehensive test, but given the complexity of the exploit we could estimate the skills only in a very narrow slice of the full set: the understanding of the exploit. But the situation is the same as with any other test: if you know exactly what you are measuring, you can make valid conclusions. The presentation will detail the exploitation process, explaining the role and implementation of the RTF elements used in the process, the ROP chain and the shellcodes. We will investigate the different malware families that were using this vulnerability, and discuss the depth of modification into the exploit. This will give us a chance to rate the understanding and exploiting skill of the authors behind these malware families. The comparative analysis gave an opportunity to draw a relationship chart between the different malware families, showing strong correlation with previously known intelligence, and adding a couple of new relations. The final purpose of the comparative analysis is to understand the strengths and weaknesses of our enemies in the cyber warfare. The more we know about them, the greater our chances are for successful defense.
  • Published: 2015
  • Publisher: Hacktivity
  • Language: English
39:41 Hacktivity English 2015

Shall we play a game?

Everybody plays games, and a bunch of us plays computer games. Despite this, very few of usconsider them as interesting targets. Granted, you won't likely be able to hack into a corporate network via games, but you can target the people running the company via their games. You should also consider that a game could grant Not So Admirable people access to your network - the network that all your phones, your cameras, and your smart house components are part of. Hackers tend to ignore the low hanging fruits in favor of beautiful exploits, but we really shouldn't. This is why I have decided to take a look around and see what's already there in the games that allows access to the gamers' network. Thus this research about how game scripting engines can be abused started. I'll show in this talk that using custom game content could easily lead to code execution on our PCs. My targets are popular games and I'll show a wide range of script abuse from the most simple to the very technical ones.
  • Published: 2015
  • Publisher: Hacktivity
  • Language: English
41:37 Hacktivity English 2015

Defend PowerShell Attacks When All Else Fails

PowerShell has gained considerable attention over the past few years in response to increased task automation in the Windows environment. Regardless of PowerShell’s capability to address administrators’ day-to-day operations, it is widely used for penetration testing and even attacking purposes. Specifically designed post-exploitation attacks and payloads by utilizing PowerShell are difficult to prevent on the condition that as the attackers gain privilege accounts. All protections ranging from the control on Execution Policy, Constrained PowerShell to customize the remote endpoints, AppLocker to allow or deny applications from running, to the control of objects with PSLockdownPolicy in PowerShell V3 could be, in some ways, tampered or bypassed to run malicious PowerShell script. Security monitoring by enabling subtle details in PowerShell Event Logs is able to collect useful information when PowerShell is called, but attackers could find a way to alter or disable those legitimately. So far no major study exists to corroborate such a conclusion on about the defense against PowerShell attacks in this condition. Until such a study is undertaken or a new feature is introduced, we have built a PowerShade platform, a prototype in python script to observe, capture, and neutralise PowerShell post-exploitation attacks.
  • Published: 2015
  • Publisher: Hacktivity
  • Language: English
45:56 Hacktivity English 2015

BAB0: A custom sample that bypassed cutting-edge APT attack detection tools

In this talk, we present BAB0, a custom sample that we developed for testing purposes and that bypassed 5 cutting-edge APT attack detection tools. We explain why BAB0 escaped detection both in the phase of infecting the victim and later during continuous communications with a remote C&C server. We show the tricks that we designed and implemented in BAB0 and try to make some demonstrations as well. We also elaborate on the problems of testing anti-APT products in general, and give some hints on new testing methodologies that are currently emerging within the AV test community.
  • Published: 2015
  • Publisher: Hacktivity
  • Language: English
54:53 Hacktivity English 2015

Rocking the pocket book: hacking chemical plant for competition and extortion

Fear of cyber-attacks with catastrophic physical consequences easily capture public imagination. The appeal of hacking a physical process is dreaming about physical damage attacks lighting up the sky in a shower of goodness. Let's face it, after such elite hacking action nobody is going to let one present it at a public conference. As a poor substitute, this presentation will use a simulated plant for Vinyl Acetate production for demonstrating a complete attack, from start to end, directed at persistent economic damage to a production site while avoiding attribution of production loss to a cyber-event. Such an attack scenario could be useful to a manufacturer aiming at putting competitors out of business or as a strong argument in an extortion attack. Designing an attack scenario is a matter of art as much as economic consideration: the cost of an attack can quickly exceed damage worth. The talk will elaborate on multiple factors which constitute attack costs and how to optimize them.
  • Published: 2015
  • Publisher: Hacktivity
  • Language: English
43:41 Hacktivity English 2015

Make "Invisible" Visible: Case Studies in PDF Malware

Due to the popularity of the portable document format (PDF), malware writers continue to use it to deliver malware via web downloads, email attachments and other infection vectors in both targeted and non-targeted attacks. It is known that PDF attackers can break detection by using polymorphic techniques to hide malicious code, randomizing JavaScript, obfuscating embedded shellcode or using cascading filters. Malware writers have always tried hard to develop new techniques to bypass detection. Some recent PDF attack campaigns we have seen are typical examples of such new endeavors from malware writers: a) Simple but effective URL aliasing technique to download malware. b) Using PDF to deliver specific topic related text content for search engine poisoning. c) Encapsulating PDF malware inside a PDF file to break detection. In this paper we will investigate the recent PDF malware campaigns using - and often abusing - these new techniques.
  • Published: 2015
  • Publisher: Hacktivity
  • Language: English
40:13 Hacktivity English 2015

Attacking all your IPv4 devices at home from the Internet via Dual-Stack Lite

The number of Internet connections still increases. More and more providers are not able to assign one public IPv4 address to every client because the IPv4 space has been consumed. In such cases, "Dual-Stack Lite" is a common solution. This protocol is specified in RFC6333 and it allows providers to share their limited IPv4 addresses with all the clients based on an IPv6 network. The presentation will explain the protocol "Dual-Stack Lite" from a security point of view. In the worst case, all IPv4 devices in a home network can be reached directly from the Internet. This could be demonstrated in the past! The presentation will give important information to all those providing services only with IPv4, "Dual-Stack Lite" providers and all respective users.
  • Published: 2015
  • Publisher: Hacktivity
  • Language: English
45:24 Hacktivity English 2015

Post-its, post-its, post-its everywhere (and how they relate to physical keys)

A password shouldn’t be on a post-it note. In plain view. On the console. The password to a locked door is called a key. So if a reporter wants to get the point across that certain people shouldn't have access to a particular key, would it be wise for said reporter to show that key to the world? This talk show how not to run this story, why we should care and maybe make you rethink your physical security a bit.
  • Published: 2015
  • Publisher: Hacktivity
  • Language: English
47:15 Hacktivity English 2015

The Network Behavior of Targeted Attacks

The network patterns of Targeted Attacks are very different from usual malware because of the different goals of the attackers. Therefore, it is difficult to detect targeted attacks looking for DNS anomalies, DGA traffic or HTTP patterns. However, our analysis of targeted attacks reveals novel patterns in their network communication. These patterns were incorporated into our Stratosphere IPS in order to model, identify and detect the traffic of targeted attacks. With this knowledge it is possible to alert attacks in the network within a short time, independently of the malware used. The Stratosphere project analyzes the inherent patterns of malware actions in the network using Machine Learning. It uses Markov Chain's algorithms to find patterns that are independent of static features. These patterns are used to build behavioral models of malware actions that are later used to detect similar traffic in the network. The tool and datasets are freely published.
  • Published: 2015
  • Publisher: Hacktivity
  • Language: English
41:44 Hacktivity English 2015

Hacking cars in the style of Stuxnet

We believe that the most important impact of Stuxnet in the long run is that it provides a blueprint for carrying out similar attacks in different embedded computing environments. To demonstrate this, we started experimenting with attacking cars in the same style as Stuxnet attacked uranium centrifuges. Our experiments show that it is relatively easy to perform dangerous modifications to the settings of different car electronic control units. by sSimply infecting the mechanic's PC or laptop that runs the diagnostic software used to manage those ECUs in the car, and replacing the DLL responsible for communications between the diagnostic software and the CAN bus with a malicious DLL, that we can implements man-in-the-middle type attacks (e.g., replay or modification of commands). As a proof-of-concept, we managed to forge a message that switches off the airbag of an Audi TT without the mechanic noticing the misdeed.
  • Published: 2015
  • Publisher: Hacktivity
  • Language: English
44:20 Hacktivity English 2015

Semi-automated mapping of iOS binaries

Black-box iOS application pentesting is a growing and hot topic. For most pentests, the most pain and effort is are consumed by the initial phases of the work, i.ei.e. basic mapping of the application features and where the individual features are implemented within the binary. We describe a MobileSubstrate based, semi-automatic approach for mapping security related features, such as encryption, jailbreak detection, keychain usage.
  • Published: 2015
  • Publisher: Hacktivity
  • Language: English
37:01 Hacktivity English 2015

Sandbox detection for the masses: leak, abuse, test

Manual processing of malware samples became impossible years ago. Sandboxes are used to automate the analysis of malware samples to gather information about the dynamic behaviour of the malware, both at AV companies and at enterprises. During my research I invented new approaches to detect these sandboxes. I developed a tool, which can collect a lot of interesting information from these sandboxes to create statistics how the current technologies work. I will demonstrate tricks to detect sandboxes. Some sandboxes are not interacting with the Internet in order to block data extraction, but with some DNS-fu the information can be extracted from these appliances as well. If you already have or plan to buy a “magic” malware analysis/detection sandbox, this is a must -see presentation for you. The sandbox detection techniques used in “APT”s like BlackEnergy or DOUBLEFANTASY can be considered old, outdated and lacking in creativeness compared to these new techniques.
  • Published: 2015
  • Publisher: Hacktivity
  • Language: English
44:46 Hacktivity English 2015

Otti Csaba: Security in our hands (?)

A kézgeometria azonosítás egy széles körben elterjedt és használható technológia, amely bizonyos esetekben hatékonyan képes helyettesíteni a környezeti körülményekkel szemben kevésbé ellenálló társait, ugyanakkor kevesen tudják csak azt, hogy valójában hogyan muködik. Élo bemutatónk keretében megvizsgáljuk a technológia elonyeit, hátrányait, felfedjük sebezhetoségeit, és olyan támadásokat hajtunk végre, amelyek túlmutatnak magán a technológián.
  • Published: 2015
  • Publisher: Hacktivity
  • Language: English
33:10 Hacktivity Hungarian 2015

Introducing disc lock opening tools and methods

Mivel a mai zárak legjobbikáról beszélünk, érdemes vizsgálni, hogy a tárcsás zárakkal szerelt lakatok, kerékpár- és motorlakatok, cilinderzárak mind-mind a legmagasabb biztonsági kategóriába tartoznak, és nem utolsósorban a legdrágább zárószerkezeteknek számítanak. Megfelelő speciális szerszámmal és technikával, valamint nem kevés gyakorlással azonban ezek a zárak tervezhető időtartamon belül nyithatók, és a módszer megfelelő tematika mellett elsajátítható. A nyitóeszközök bemutatása mellett belepillantást engedek a módszerbe a tárcsás zárak kategóriáinak bemutatásán keresztül.
  • Published: 2015
  • Publisher: Hacktivity
  • Language: Hungarian
42:50 Hacktivity English 2015

Mining for Bugs with Graph Database Queries

While graph databases are primarily known as the backbone of the modern dating world, this nerd has found a much more interesting application for them: program analysis. This talk aims to demonstrate that graph databases and the typical program representations developed in compiler construction are a match made in heaven, allowing large code bases to be mined for vulnerabilities using complex bug descriptions encoded in simple, and not so simple graph database queries. This talk will bring together two well known but previously unrelated topics: static program analysis and graph databases. After briefly covering the "emerging graph landscape" and why it may be interesting for hackers, a graph representation of programs exposing syntax, control-flow, data-dependencies and type information is presented, designed specifically with bug hunting in mind. Our open-source program analysis platform Joern is then introduced, which implements these ideas and has been successfully used to uncover various vulnerabilities in the Linux kernel. Capabilities and limitations of the system will then be demonstrated live as we craft queries for buffer overflows, memory disclosure bugs and integer-related vulnerabilities.
  • Published: 2015
  • Publisher: Hacktivity
  • Language: English
46:24 Hacktivity English 2013

Hacktivity 2013: Hacking CCTV systems

CCTV systems are in their prime today, and are used all over the world. These systems however can lead to a false sense of security. Most of them use proprietary software, which has not been adequately tested for security vulnerabilities. I will demonstrate this by reverse engineering the firmware, and will use that information to gain root access to the security system remotely. (This will be a demo with an Identivision DVR, and will cover the process all the way from first analizing the security equipment, to reverse engineering the firmware, using the information found to gain remote access to the system. Then I will show some things that can be done, once root access is gained.) I will also explain some of the most common security mistakes that manufacturers and users make with these security systems. I hope to give a general awareness about using their use, and the risks involved.
  • Published: 2013
  • Publisher: Hacktivity
  • Language: English
41:30 Hacktivity English 2015

Chw00t: Breaking Unices' chroot solutions

Chroot is not a security solution, still lots of people use it as it was one. Based on chroot, Jail was introduced in FreeBSD, Containers — in Solaris, and LXC — on Linux. However, Unices implemented chroot in different ways. Some of the implementations are easy to break, some of them are just partly breakable but one thing is sure: you would be surprised how many. The presentation focuses on escape techniques and the tool called chw00t, a small handy one that makes it easy to pop shells out of the chroot environment.
  • Published: 2015
  • Publisher: Hacktivity
  • Language: English
45:12 Hacktivity English 2015

Fitness Tracker: Hack in Progress

Wearables are extremely trendy nowadays, but actually, we know little about their security: what information do they send on us? How reliable are they? Can they be hacked? etc. The fact they rely on proprietary protocols does not help. So, precisely, we focus on understanding the communication with the tracker. Eventually, that's how we learn how to turn the Flex into a wearable random number generator.
  • Published: 2015
  • Publisher: Hacktivity
  • Language: English
51:30 Hacktivity English 2015

Keynote speaker

„It doesn't matter who you are. What matters is to reflect on what is going on in a world where the power play has shifted to the fifth domain.” When international relations shift because of one person taking USB drives for a tour of all three superpowers, when single exploits are worth tens of thousands of dollars to military and law enforcement agencies around the world, while at the same time the underlying vulnerabilities are being declared dual use technologies, a.k.a. weapons, in international arms trade agreements, hacking has definitively changed. A hacker without an illegal past, a voluntary NATO mission co-director that never served in the military, a university teacher without a high school degree – it doesn't matter who you are. What matters is to reflect on what is going on in a world where the power play has shifted to the fifth domain and what that means for you, your families and your country.
  • Published: 2015
  • Publisher: Hacktivity
  • Language: English
40:17 Hacktivity English 2015

Post-Quantum Cryptography: prime questions = primary questions

Edward Snowden szivárogtatásai, illetve a D-Wave Systems és a Lockheed Martin vagy a Google közös ügyletei miatt az utóbbi idoben elotérbe került a kvantumszámítógép és a post-quantum cryptography (pqcrypto) témája, már a szabványosítók körében is: IETF RFC draft dokumentumok, ETSI jelentések születtek a különbözo pqcrypto lehetoségekrol, a Shor algoritmusról, illetve a jelenleg még használható RSA paraméterezés követelményei is szigorodtak a BSI útmutatóiban. Azt tudjuk, hogy léteznek olyan kriptográfiai algoritmusok és mögöttes matematikai problémák, amelyek a kvantumszámítógépet használva is erosnek bizonyulnak, azonban ezek felhasználásáról a jelenlegi X.509-alapú, CA-hierarchiákhoz szokott világban (amelyet az eIDAS EU regulation jogszabály is eloír) még kevés tapasztalat van. Az eloadásban az egyik hash-alapú aláíró algoritmus (LDWM, pqcrypto) tulajdonságait, felhasználhatóságát mutatom be X.509-es adatstruktúrákat használó környezetben.
  • Published: 2015
  • Publisher: Hacktivity
  • Language: English
39:15 Hacktivity English 2015

Hacking Team malware

Nem kell hosszan bemutatni a mára már közismert Remote Control System (RCS) rendszert, amely az olasz Hacking Team cég állami nyomozati szervek (rendorség, titkosszolgálatok stb.) számára fejlesztett terméke. Az a 400 GB adat, amelyet a gyártócégtol elloptak és a netre kitettek, sok gondolkodnivalót ad szakmabelieknek, politikusoknak és a szélesebb közönségnek. Eloadásom három részbol áll: az elso a termék muködésének rövid bemutatása. Milyen rendszer fejlesztettek ki az exploitok célbajuttatására (Exploit Delivery Network - Android, Fake App Store) és a már megfertozött eszközök megfigyelésére (proxy chain). A második rész az Android eszközök megfertozésére használt exploitok részletes elemzése. Bemutatom a bonyolult, meglehetosen összetett, sok lépésbol álló fertozési folyamatot. Ehhez több, vadonatúj 0 day sebezhetoséget használtak fel. Ezeket ugyancsak ismertetem. Az eloadás harmadik részében a „feltunésmentes” muködést szolgáló, az ido elotti felfedezést akadályozó technikákról lesz szó (Virtual Machine és Cuckoo elkerülés, antivirus termékek monitorozása stb.).
  • Published: 2015
  • Publisher: Hacktivity
  • Language: English
42:59 Hacktivity English 2015

Your Web app, those hackers & you

Modern Web application frameworks offer a vast amount of ways to introduce security vulnerabilities. In this talk we'll have an overview of common and not so common patterns of vulnerabilities. The main focus will be Ruby on Rails applications, but also generic patterns which apply to other languages and frameworks will be elaborated. Instead of just showing off with 1337 bugs and exploits, mitigation strategies will also be provided.
  • Published: 2015
  • Publisher: Hacktivity
  • Language: English
39:02 Hacktivity English 2015

I play Jack of Information Disclosure

There is an almost iunescapable conflict between software developers and security engineers. Multiple areas struggle from this conflict: one specifically being threat modeling that does not work because of the lack of cooperation between security engineers and software developers. With the existing methods, security engineers do not get a proper picture of the real risks and software developers get no feeling of what to improve. Gamified threat modeling approaches like Cornucopia and Elevation of Privilege are designed to provide the missing common ground and a process that encourages exchange. As with playing cards, in their turn everyone plays their hand and the group discusses the threat that is described on the played card. The presentation will go through an example application and show the difference between the classical approach to threat modeling and Cornucopia/EoP. The audience is going to learn about a new methodology and get hands- on experience on how to do threat modeling by playing cards.
  • Published: 2015
  • Publisher: Hacktivity
  • Language: English
45:41 Hacktivity English 2015

DDoS protection technology is far from being "install & forget"

Each of these techniques can then also be deployed in few different ways. Both, protection techniques and deployment architectures will obviously affect the quality of protection while under attack. Although many organizations are failing with DDoS protection, I would say, that most of today's attacks can be successfully mitigated. But don't get me wrong, an effective mitigation requires good understanding on how the technology operates plus a deep knowledge of your network and the applications traversing it. No matter what vendors and service providers promise, DDoS protection technology is far from being "install & forget". In this presentation I will discuss common mitigation techniques, deployment methods and misconceptions of DDoS protection.
  • Published: 2015
  • Publisher: Hacktivity
  • Language: English
34:50 Hacktivity English 2015

Secure software, start appreciating your developers!

Over the years, I have been visiting attended quite some a number of security conferences and got more and more frustrated. Bashing developers, blaming them for writing insecure software, not going to security conferences. It is easy to blame, but what’s the point? During this talk I will show why the security community has failed to connect to the developers and, more importantly, how to do it right!
  • Published: 2015
  • Publisher: Hacktivity
  • Language: English
out of 1 pages
Loading...
Feedback

Timings

  202 ms - page object
  120 ms - search
    7 ms - highlighting
    1 ms - highlighting/18836
    2 ms - highlighting/18845
    7 ms - highlighting/18844
    3 ms - highlighting/18843
    1 ms - highlighting/18855
    1 ms - highlighting/18837
    2 ms - highlighting/18839
    0 ms - highlighting/18853
    1 ms - highlighting/18842
    1 ms - highlighting/18848
    0 ms - highlighting/18849
    1 ms - highlighting/18857
    2 ms - highlighting/18854
    4 ms - highlighting/18835
    3 ms - highlighting/18850
    2 ms - highlighting/18831
    1 ms - highlighting/18840
    2 ms - highlighting/18847
    3 ms - highlighting/18858
    2 ms - highlighting/18846
    1 ms - highlighting/18841
    2 ms - highlighting/18856
    2 ms - highlighting/18833
    3 ms - highlighting/18851
    1 ms - highlighting/18834
    3 ms - highlighting/18829
    3 ms - highlighting/18832
    2 ms - highlighting/18852
    3 ms - highlighting/18830
    3 ms - highlighting/18838

Version

AV-Portal 3.7.0 (943df4b4639bec127ddc6b93adb0c7d8d995f77c)