Exploit the possiblities
Showing 1 - 17 of 17 RSS Feed

Files

hitb04-kamal-hilmi.tgz
Posted Oct 26, 2004
Authored by kamal hilmi othman | Site conference.hackinthebox.org

Honeypot and Internet Background Noise - Lesson Learned. HITB 04 presentation by Kamal Hilmi Othman. Recently, honeypots have been one of the hottest issues around network security discussions. This presentation discussed highlights of the honeypot - from its earliest incarnation to the current state of the technology. It also addresses some of the mechanisms that can be deployed in order to capture intruder activity. This also discusses other mechanisms that can be easily deployed without much risk - detecting "Internet Background Noise". The results of implementations were discussed.

MD5 | e2fec23221cb514798e358e36971cbd2
hitb04-toh-swee-hoe.pdf
Posted Oct 23, 2004
Site conference.hackinthebox.org

HITB (Hack In The Box) 2004 Presentation by Toh Swee Hoe: "Information Network Security Issues in the Communications and Multimedia Industry". The converging communications and multimedia industry and rapid technological changes pose new problems to network security. To address the challenges, this paper highlights several of the initiatives that the MCMC (Malaysian Communications and Multimedia Commission) are working on in addresing those concerns.

MD5 | 85d850ae7d9422044277625b313d2852
hitb04-theo-deraadt.zip
Posted Oct 23, 2004
Site conference.hackinthebox.org

Files from HITB (Hack In The Box) 2004 Presentation by Theo de Raadt: "Exploit Mitigation Techniques". Description from HITB: OpenBSD has been auditing software for nearly 10 years, and while we have had significant success, it is clearly not enough. In the last 3 years a new view on preventing attacks has surfaced in the mindset of our group. A software exploit author starts by finding an interesting bug. Writing an exploit is easy because he can rely on a variety of system behaviours which are very deterministic. Many of these behaviours are not required for proper operation. Recently we have developed many new techiques which combine to thwart the attacker, without affecting regular software. We make the Unix process environment difficult to attack much like filling a house full of a variety of burglar traps.

systems | unix, openbsd
MD5 | da567e413cd35d999f790deb258a2236
hitb04-teo-sze-siong.zip
Posted Oct 23, 2004
Site conference.hackinthebox.org

HITB (Hack In The Box) 2004 Presentation by Teo Sze Siong: "Stealth Virus Design Thru Breeding Concept (Non Polymorphic)". Most polymorphic virus design it is not totally flawless because the virus researchers can extract out the important bytes containing the logic of the program and search for the logics signature when scanning for polymorphic viruses. The reason portion signature searching works is because some parts of the code in the virus cannot be modified in order to ensure it works correctly. In order to design a truly stealth virus, we can code a virus that stores a series of program logics in source code to reproduce itself. For example, using the Compiler Class in .NET Framework, we can design a virus to randomly produce another new virus that is totally different from itself. The Compiler Class in the .NET Framework runtime is capable of producing executables from source code without the SDK. Includes Proof of Concept (POC) code samples in C# .NET.

tags | virus, proof of concept
MD5 | da39d7ce0cf6a1265ae29e5645acb057
hitb04-sukhdev-singh.pdf
Posted Oct 23, 2004
Site conference.hackinthebox.org

HITB (Hack In The Box) 2004 Presentation by Sukhdev Singh: "Protecting Your Business From Phishing Attacks".

MD5 | 53bf787245acc52a3aae1ada5d662083
hitb04-sk-chong.pdf
Posted Oct 23, 2004
Site conference.hackinthebox.org

HITB (Hack In The Box) 2004 Presentation by S.K. Chong: "Windows Local Kernel Exploitation". Discusses mechanisms to exploit the Windows Kernel for useful local privilege escalation. Unlike "Shatter Attack" which is usually only useful if an attacker has physical access of the computer, Kernel exploitation will escalate the attacker to the highest level of the kernel itself without any restrictions. The presentation will include usage of undocumented APIs, memory corruption in device drivers, kernel 'shellcode' as well as other relevant tricks to find and exploit the Windows kernel-land for a successful privilege escalation.

tags | kernel, local, shellcode
systems | windows
MD5 | 40f11e5de5304f8d6b4d99219c69caf3
hitb04-shreeraj-shah.pdf
Posted Oct 23, 2004
Site conference.hackinthebox.org

HITB (Hack In The Box) 2004 Presentation by Shreeraj Shah: "Web Services - Attacks and Defense Strategies, Methods and Tools". The web service is the new security Lego Land. The main building blocks are UDDI, SOAP and WSDL. This presentation will briefly touch upon each of these aspects.

tags | web
MD5 | f5527040ba419e69ce57ec9a0c98ce99
hitb04-roberto-fabio.pdf
Posted Oct 23, 2004
Site conference.hackinthebox.org

HITB (Hack In The Box) 2004 Presentation by Roberto Preatoni and Fabio Ghioni: " Asymmetric Warfare and Interception Revealed". Discription from HITB: An indepth explanation of everything you've ever wanted to know about how to evade interception and how you get intercepted anyway. This presentation will cover a strategic (with a little technology) overview of a basic asymmetric warfare battleplans. Items that will be discussed include: 1) Types of interception implemented as of today and what will be implemented in the near future 2) Technology set up for National Security and Critical Infrastructure protection: Defensive and Offensive capabilities of the deployed Multi-Dimensional Asymmetric Warfare Array. 3) Examples of Governmental and Business implementations of the complete array or modules of the above 4) Potential impacts of such technology on both privacy and national security 5) Cyber attacks : an abstract built on Zone-H's experience

MD5 | fbaa10ece09dbb0fb8db3b5e3e9acdf9
hitb04-jose-nazario.pdf
Posted Oct 23, 2004
Site conference.hackinthebox.org

HITB (Hack In The Box) 2004 Presentation by Jose Nazario: "Packet Mastering". Di scusses use of libdnet, libpcat, and libnids.

MD5 | ded07a068493cfb0fd449bcfc9007865
hitb04-grugq.pdf
Posted Oct 23, 2004
Site conference.hackinthebox.org

HITB (Hack In The Box) 2004 Presentation by "The Grugq": "The Art of Defiling: D efeating Forensic Analysis on Unix File Systems". Discusses Unix file system str uctures, talks about forensic tools commonly used, and discusses means of hamper ing forensic investigations. New techniques are also presented. According to the HITB description of this talk, "Anti-forensics has cost the speaker one job. Th is material has never been presented in the North American continent because ant i-forensics scares the feds."

systems | unix
MD5 | de8a33b6c5c04157c66d2fc6c8e58577
hitb04-gareth-davies.pdf
Posted Oct 23, 2004
Site conference.hackinthebox.org

HITB (Hack In The Box) 2004 Presentation by Gareth Davies: "Advanced Information Gathering AKA Google Hacking". Covers Google for target recon. Discusses lesser known aspects of Google - tools such as Athena and Sitedigger and finding misco nfiguration by simply searching for it.

MD5 | 787f6895d5622808fb70f8fe81401039
hitb04-fyodor-meder.pdf
Posted Oct 23, 2004
Site conference.hackinthebox.org

HITB (Hack In The Box) 2004 Presentation by Fyodor Yarochkin and Meder Kydyralie v: "Security Tools Integration Framework (STIF)". A framework for designing and creating a unified environment for network security tools for realtime analysis and sharing via an inference engine.

MD5 | 728de050f1f43eb653379c58e3c51d9c
hitb04-emmanuel-gadaix.pdf
Posted Oct 23, 2004
Site conference.hackinthebox.org

HITB (Hack In The Box) 2004 Presentation by Emmanuel Gadaix: "Phreaking in the 2 1st Century". Blueboxing and "old school" phreaking is basically dead in most of the world. However, is phreaking dead? This presentation discusses phreaking ag ainst signaling by compromising SS7 nodes and discusses mobile platforms like GP RS, SMS+MMS, etc.

MD5 | bc298b63199217aa757b55ffb064176b
hitb04-chew-keong-tan.pdf
Posted Oct 23, 2004
Site conference.hackinthebox.org

HITB (Hack In The Box) 2004 Presentation by Chew Keong Tan: "Defeating Kernel Na tive API Hookers". Win32 Kernel Rootkits modify the behaviour of the system by K ernel Native API hooking. This proposes a technique for defeating hooking rootki ts that hook native APIs by Service Table modification.

tags | kernel
systems | windows
MD5 | 16c0e74736c0f219bc77766c6d6dcac6
hitb04-captain-crunch-02.pdf
Posted Oct 23, 2004
Site conference.hackinthebox.org

HITB (Hack In The Box) 2004 Presentation by John Draper (Captain Crunch): "Secur ity Threats from Spamming" (part 2). Discusses security issues related to the sp ybots and trojans typically used by spammers, when the same spybots and trojans are used by more malicious / underground hackers.

tags | trojan
MD5 | a7df3435bb1d6e8d4f1d3736507aabf2
hitb04-captain-crunch-01.pdf
Posted Oct 23, 2004
Site conference.hackinthebox.org

HITB (Hack In The Box) 2004 Presentation by John Draper (Captain Crunch): "Security Threats from Spamming" (part 1). Discusses security issues related to the spybots and trojans typically used by spammers, when the same spybots and trojans are used by more malicious / underground hackers.

tags | trojan
MD5 | 16b4843a0e111977e560688812baac9c
hitb04-adam-gowdiak.pdf
Posted Oct 23, 2004
Site conference.hackinthebox.org

HITB (Hack In The Box) 2004 Presentation by Adam Gowdiak: "Java 2 Micro Edition (J2ME) Security Vulnerabilities". Java 2 Micro Edition (J2ME) security in detail . This discusses mobile Java, KVM, CLDC and MIDP concepts, and a detailed descri ption of KVM security architecture, its operation, and differences from standard the standard JVM. Several security issues affecting most of J2ME are discussed.

tags | java, vulnerability
MD5 | 1b6f2eb1073ec1d373ab244b2a06d137
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close