what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files

hitb04-kamal-hilmi.tgz
Posted Oct 26, 2004
Authored by kamal hilmi othman | Site conference.hackinthebox.org

Honeypot and Internet Background Noise - Lesson Learned. HITB 04 presentation by Kamal Hilmi Othman. Recently, honeypots have been one of the hottest issues around network security discussions. This presentation discussed highlights of the honeypot - from its earliest incarnation to the current state of the technology. It also addresses some of the mechanisms that can be deployed in order to capture intruder activity. This also discusses other mechanisms that can be easily deployed without much risk - detecting "Internet Background Noise". The results of implementations were discussed.

SHA-256 | 2b95f386971778dfaef94a27131502b819f2c998bb0da751cfa7e935a1cbbe24
hitb04-toh-swee-hoe.pdf
Posted Oct 23, 2004
Site conference.hackinthebox.org

HITB (Hack In The Box) 2004 Presentation by Toh Swee Hoe: "Information Network Security Issues in the Communications and Multimedia Industry". The converging communications and multimedia industry and rapid technological changes pose new problems to network security. To address the challenges, this paper highlights several of the initiatives that the MCMC (Malaysian Communications and Multimedia Commission) are working on in addresing those concerns.

SHA-256 | e90b799cc54a95ccc23176587b0de2874dbece9005aaa7b875715e9317970a16
hitb04-theo-deraadt.zip
Posted Oct 23, 2004
Site conference.hackinthebox.org

Files from HITB (Hack In The Box) 2004 Presentation by Theo de Raadt: "Exploit Mitigation Techniques". Description from HITB: OpenBSD has been auditing software for nearly 10 years, and while we have had significant success, it is clearly not enough. In the last 3 years a new view on preventing attacks has surfaced in the mindset of our group. A software exploit author starts by finding an interesting bug. Writing an exploit is easy because he can rely on a variety of system behaviours which are very deterministic. Many of these behaviours are not required for proper operation. Recently we have developed many new techiques which combine to thwart the attacker, without affecting regular software. We make the Unix process environment difficult to attack much like filling a house full of a variety of burglar traps.

systems | unix, openbsd
SHA-256 | 0e09fb3b197c98b688478e8d2179abe5eb51bbcdf52ac7d0ccf750669eb1b90f
hitb04-teo-sze-siong.zip
Posted Oct 23, 2004
Site conference.hackinthebox.org

HITB (Hack In The Box) 2004 Presentation by Teo Sze Siong: "Stealth Virus Design Thru Breeding Concept (Non Polymorphic)". Most polymorphic virus design it is not totally flawless because the virus researchers can extract out the important bytes containing the logic of the program and search for the logics signature when scanning for polymorphic viruses. The reason portion signature searching works is because some parts of the code in the virus cannot be modified in order to ensure it works correctly. In order to design a truly stealth virus, we can code a virus that stores a series of program logics in source code to reproduce itself. For example, using the Compiler Class in .NET Framework, we can design a virus to randomly produce another new virus that is totally different from itself. The Compiler Class in the .NET Framework runtime is capable of producing executables from source code without the SDK. Includes Proof of Concept (POC) code samples in C# .NET.

tags | virus, proof of concept
SHA-256 | 9edbbb2b968b914c8763e152ef7da10099a54fb25ec27a36e9d0fc1ee1b4b75d
hitb04-sukhdev-singh.pdf
Posted Oct 23, 2004
Site conference.hackinthebox.org

HITB (Hack In The Box) 2004 Presentation by Sukhdev Singh: "Protecting Your Business From Phishing Attacks".

SHA-256 | 60a8deae030b40762c1e90259763eb691585200bf22a485ad322a48aa47872ee
hitb04-sk-chong.pdf
Posted Oct 23, 2004
Site conference.hackinthebox.org

HITB (Hack In The Box) 2004 Presentation by S.K. Chong: "Windows Local Kernel Exploitation". Discusses mechanisms to exploit the Windows Kernel for useful local privilege escalation. Unlike "Shatter Attack" which is usually only useful if an attacker has physical access of the computer, Kernel exploitation will escalate the attacker to the highest level of the kernel itself without any restrictions. The presentation will include usage of undocumented APIs, memory corruption in device drivers, kernel 'shellcode' as well as other relevant tricks to find and exploit the Windows kernel-land for a successful privilege escalation.

tags | kernel, local, shellcode
systems | windows
SHA-256 | 3b0a27ebf4e22e17709d7a4a775a2c4e5de69c307b42ade96b78fb71a7c52ac2
hitb04-shreeraj-shah.pdf
Posted Oct 23, 2004
Site conference.hackinthebox.org

HITB (Hack In The Box) 2004 Presentation by Shreeraj Shah: "Web Services - Attacks and Defense Strategies, Methods and Tools". The web service is the new security Lego Land. The main building blocks are UDDI, SOAP and WSDL. This presentation will briefly touch upon each of these aspects.

tags | web
SHA-256 | c547966dd6835cc87a35eed5fa96c90b60b0f10f95e16735648e931f53b14d5d
hitb04-roberto-fabio.pdf
Posted Oct 23, 2004
Site conference.hackinthebox.org

HITB (Hack In The Box) 2004 Presentation by Roberto Preatoni and Fabio Ghioni: " Asymmetric Warfare and Interception Revealed". Discription from HITB: An indepth explanation of everything you've ever wanted to know about how to evade interception and how you get intercepted anyway. This presentation will cover a strategic (with a little technology) overview of a basic asymmetric warfare battleplans. Items that will be discussed include: 1) Types of interception implemented as of today and what will be implemented in the near future 2) Technology set up for National Security and Critical Infrastructure protection: Defensive and Offensive capabilities of the deployed Multi-Dimensional Asymmetric Warfare Array. 3) Examples of Governmental and Business implementations of the complete array or modules of the above 4) Potential impacts of such technology on both privacy and national security 5) Cyber attacks : an abstract built on Zone-H's experience

SHA-256 | 605b7168d15089625d01d2ab954732be978f534932ec03f631febffe4f06a79c
hitb04-jose-nazario.pdf
Posted Oct 23, 2004
Site conference.hackinthebox.org

HITB (Hack In The Box) 2004 Presentation by Jose Nazario: "Packet Mastering". Di scusses use of libdnet, libpcat, and libnids.

SHA-256 | 8d38113bfa7300a01fe011ff213091301a2138616d626fb16cd992e1362e2815
hitb04-grugq.pdf
Posted Oct 23, 2004
Site conference.hackinthebox.org

HITB (Hack In The Box) 2004 Presentation by "The Grugq": "The Art of Defiling: D efeating Forensic Analysis on Unix File Systems". Discusses Unix file system str uctures, talks about forensic tools commonly used, and discusses means of hamper ing forensic investigations. New techniques are also presented. According to the HITB description of this talk, "Anti-forensics has cost the speaker one job. Th is material has never been presented in the North American continent because ant i-forensics scares the feds."

systems | unix
SHA-256 | 677dc11503060329a4d551c3af2ef24ae966c450e1582b3d9e596f9c6c07a3d8
hitb04-gareth-davies.pdf
Posted Oct 23, 2004
Site conference.hackinthebox.org

HITB (Hack In The Box) 2004 Presentation by Gareth Davies: "Advanced Information Gathering AKA Google Hacking". Covers Google for target recon. Discusses lesser known aspects of Google - tools such as Athena and Sitedigger and finding misco nfiguration by simply searching for it.

SHA-256 | 737e23daacff2f5ffd95b43f35d555d5fd519ffdcadf747e43b32f3befd63329
hitb04-fyodor-meder.pdf
Posted Oct 23, 2004
Site conference.hackinthebox.org

HITB (Hack In The Box) 2004 Presentation by Fyodor Yarochkin and Meder Kydyralie v: "Security Tools Integration Framework (STIF)". A framework for designing and creating a unified environment for network security tools for realtime analysis and sharing via an inference engine.

SHA-256 | 585ce76e7e835c8cdcc9e80056cfc442422445d403f3e8fb8e05d1f7069e0bd7
hitb04-emmanuel-gadaix.pdf
Posted Oct 23, 2004
Site conference.hackinthebox.org

HITB (Hack In The Box) 2004 Presentation by Emmanuel Gadaix: "Phreaking in the 2 1st Century". Blueboxing and "old school" phreaking is basically dead in most of the world. However, is phreaking dead? This presentation discusses phreaking ag ainst signaling by compromising SS7 nodes and discusses mobile platforms like GP RS, SMS+MMS, etc.

SHA-256 | 052dc872d66303fc4716ab5a007369803363bb767903cf4f6d1540a1d40cdd11
hitb04-chew-keong-tan.pdf
Posted Oct 23, 2004
Site conference.hackinthebox.org

HITB (Hack In The Box) 2004 Presentation by Chew Keong Tan: "Defeating Kernel Na tive API Hookers". Win32 Kernel Rootkits modify the behaviour of the system by K ernel Native API hooking. This proposes a technique for defeating hooking rootki ts that hook native APIs by Service Table modification.

tags | kernel
systems | windows
SHA-256 | 4e34f3e743c4a91f43e774a978ae69e5028d46aee7ff79996b5bac10d07ba6ae
hitb04-captain-crunch-02.pdf
Posted Oct 23, 2004
Site conference.hackinthebox.org

HITB (Hack In The Box) 2004 Presentation by John Draper (Captain Crunch): "Secur ity Threats from Spamming" (part 2). Discusses security issues related to the sp ybots and trojans typically used by spammers, when the same spybots and trojans are used by more malicious / underground hackers.

tags | trojan
SHA-256 | aca1096dc4fccf4d8973aaf976e380756aa0a2e7f2ebaa23730161e224a9e225
hitb04-captain-crunch-01.pdf
Posted Oct 23, 2004
Site conference.hackinthebox.org

HITB (Hack In The Box) 2004 Presentation by John Draper (Captain Crunch): "Security Threats from Spamming" (part 1). Discusses security issues related to the spybots and trojans typically used by spammers, when the same spybots and trojans are used by more malicious / underground hackers.

tags | trojan
SHA-256 | 597e56afa74e0ff57f9965f2d81818ecfa112545bd023456275790457cc19a63
hitb04-adam-gowdiak.pdf
Posted Oct 23, 2004
Site conference.hackinthebox.org

HITB (Hack In The Box) 2004 Presentation by Adam Gowdiak: "Java 2 Micro Edition (J2ME) Security Vulnerabilities". Java 2 Micro Edition (J2ME) security in detail . This discusses mobile Java, KVM, CLDC and MIDP concepts, and a detailed descri ption of KVM security architecture, its operation, and differences from standard the standard JVM. Several security issues affecting most of J2ME are discussed.

tags | java, vulnerability
SHA-256 | 70eefe83516ef85c7efae71c39e0278575aa4f3f3b9c7856b2a2391766245399
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close