exploit the possibilities
Showing 1 - 19 of 19 RSS Feed


Posted Oct 12, 2005
Authored by Tony Chor

IE Security - Past, Present and Future. Tony Chor outlines the threats to secure browsing, discuss Microsoft's response with Internet Explorer for Windows XP SP2, and details the implementation of safety features in the upcoming Internet Explorer 7.0, such as the Phishing Filter and Protected Mode (the feature formerly known as Low Rights IE).

systems | windows, xp
MD5 | 8f19551be380c374c1c18f9f5e5b13a2
Posted Oct 12, 2005
Authored by Roelof Temmingh

Assessing Server Security - State of the Art. The talk takes into consideration the progress that has been made in web server security over the last few years, and the progress that has been made in attacking web servers over the same time. The paper visits the new vulnerabilities introduced by web applications and discuss the thinking applied to discover such vulnerabilities. It finally describes the state of the art of web server scanning technology.

tags | web, vulnerability
MD5 | 230a5f551f758a401bbb1186a0dce00d
Posted Oct 12, 2005
Authored by San (XFocus)

Hacking Windows CE - This paper shows a buffer overflow exploitation example in Windows CE. It covers knowledge about the ARM architecture, memory management and the features of processes and threads of Windows CE. It also shows how to write a shellcode in Windows CE including knowledge about decoding shellcode of Windows CE.

tags | overflow, shellcode
systems | windows, ce
MD5 | 6c73f84fe23ec9bb3d1ac4c919629d96
Posted Oct 11, 2005

Conference Graphic

MD5 | 8776d287de80d53c3bc6f5dc1bd42886
Posted Oct 11, 2005
Authored by Mikko Hypponen

Mobile Malware - How exactly do mobile viruses work? We'll have a look at their code and discuss what factors affect their spreading speeds. Virus writers have always been trying to attack new platforms. What draws them now towards the mobile phone? Are phones as a platform simply widespread enough, or is the possibility of making easy money via phone billing systems driving this development? Where are we now and what can we expect to see in the Mobile Malware of the future?

tags | virus
MD5 | e8e8675e736ec885672012e4e8eb5568
Posted Oct 11, 2005
Authored by Dave Aitel

Nematodes (Beneficial Worms) - This presentation presents concepts for taking expoitation frameworks into the next evolution: solving complex security problems by generating robustly controllable beneficial worms. The Why, How, and What of Nematode creation are discussed, along with some concepts in Mesh routing. Problems discussed include legal issues, controlling your worm, writing an intermediate language, the Nematode Intermediate Language (NIL) for writing robust worms, reliability problems, commications protocols, and future work.

tags | worm, protocol
MD5 | e42fc288392a06c2255e543ec15ac8e2
Posted Oct 11, 2005
Authored by Fyodor Yarochkin, Meder Kydyraliev

STIFWare Evolution - Meder and Fyodor have been working on their concept of common framework to unify offensive part of heterogeneous security data and security tools into a single unit - security tools framework. The presentation deals with the evolution of STIF framework into what they call now STIF-ware - a set of STIF relevant modules that would allow the computer security hobbists to build, control and monitor the distributed network of automated hacking agents, guided by set of goals and targets, assigned to the system.

MD5 | 93c0368ab202f180e215595c59b87ec4
Posted Oct 11, 2005
Authored by Jim Geovedi

Hotspot Security - This presentation covers the basic approach behind Wi-Fi hotspot security design and architecture. During the presentation, vulnerabilities and methods for exploiting Wi-Fi hotspots were shown.

tags | vulnerability
MD5 | ce74e4cac2e465a1ab89c4389fd2dd31
Posted Oct 11, 2005
Authored by Joanna Rutkowska

Virginity Verifier - The presentation aims towards defining a detailed list of vital operating system parts as well as a methodology for malware detection. The list will start on such basic levels as actions needed for file system and registry integrity verification, go through user-mode memory validating (detecting additional processes, hooked DLLs, injected threads, etc) and finally end on such advanced topics as defining vital kernel parts which can be altered by modern rootkit-based malware (with techniques like Raw IRP hooking, various DKOM based manipulations or VMM cheating)

tags | kernel, registry
MD5 | c0d3fdb2f21dc50d92bece6f7137a264
Posted Oct 11, 2005
Authored by Dr. Jose Nazario

Analysing All That Data - This presentation will introduce you to a number of techniques for making sense of large collections of data, including sorting and clustering techniques, fuzzy matching, and trend analysis. These techniques have applicability in numerous applications, such as mail filtering and network event analysis.

MD5 | d0829aff0164819389729794a757c132
Posted Oct 11, 2005
Authored by Marc Schoenefeld

Secure Java Programming - The talk is about the causes and effects of coding errors and the techniques to detect them, demonstrated with findings in the current Sun JDK.

tags | java
MD5 | e4012f9e73716a6dda8711b642802f41
Posted Oct 11, 2005
Authored by Nish Bhalla

Analyzing Code for Security Defects - Reviewing code to find vulnerabilities is becoming more and more common. Reviewing code is not only useful from a developers point of view but also from an attacker's point of view. The talk covers the basics of threat analysis, how to assess threats and what are some of the vulnerabilities that could exists in code when performing code reviews for large code bases.

tags | vulnerability
MD5 | 01ce931ebd63e42db8084feb7021aefd
Posted Oct 11, 2005
Authored by Shreeraj Shah

Web Hacking Kung-Fu and Art of Defense - Web attacks are on the rise and new methods of hacking are evolving. This presentation covers the new methodologies for web application footprinting, discovery and information gathering with a new range of tools.

tags | web
MD5 | 17e8afa0c717088cac1ff757c5e00bb9
Posted Oct 11, 2005
Authored by The Grugq

VoIPhreaking: How to make free phone calls and influence people This talk explores the technologies behind VoIP infrastructures, focusing on their weaknesses and faults. LIVE DEMOS were conducted to help illustrate that attacks which violate VoIP system security are not only practical, but are already here. The era of VoIPhreaking has begun.

MD5 | 4ce7dd9dcf877bd5c4c198a4a627e961
Posted Oct 11, 2005
Authored by Anthony Zboralski

Social Engineering Fundamentals - In today's world confidence scams present quite possibly the highest threat to security with in the business world. Control of information, withholding and leaking, can lead to massive failures and losses depending on how skilled the attacker may be. In combination with disinformation and propaganda, social engineering can as fatal as or even lead to loss of customer and shareholder confidence.

MD5 | 2d7f286604dd4f2d30a75cb94ea92b55
Posted Oct 11, 2005
Authored by Fabrice Marie

Hacking Internet Banking Applications - This presentation highlights the solutions to some of the challenges the banks will face online to ensure that their data handling practices are compliant with their country's privacy regulations and banking regulations among others.

MD5 | 12e6750c604b2b31ec66cfd52f458650
Posted Oct 11, 2005
Authored by Raoul Chiesa

x.25 Security - The presentation focuses on X.25 security issues, positioned in present day context and problems. The main intention is to bring personal and professional know-how, background and X.25 penetration testing experiences to the auditorium, with real-life case studies.

MD5 | c4037d2cf2e9a67ae9543bede33f8ab4
Posted Oct 11, 2005

Corp vs Corp - An impressionistic overview of what makes the difference today and in the future (in the digital playground) in the balance of power between economic and military powers. The presentation covers a description of the business behind espionage worldwide as well as the asymmetric organizations that are the real master of puppets.

MD5 | 404050140964f470d6fbac32d2008666
Posted Oct 11, 2005
Authored by Tim Pritlove

Project Blinkenlights - A presentation covering the Blinkenlights light installation in Berlin, Germany and the Arcade project in Paris, France.

MD5 | 9e978ff1a415ff4871efc2cdc881a0b7
Page 1 of 1

Top Authors In Last 30 Days

packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By