what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 21 of 21 RSS Feed

Files

D2T2_-_Benjamin_Hagen_and_Walter_Goulet_-_Real_World_Attacks_Against_3G_Networks_Using_Subscriber_Devices.zip
Posted Apr 21, 2008
Authored by Walter Goulet, Benjamin Hagen | Site conference.hitb.org

Real World Attacks Against 3G Networks Using Subscriber Devices - Cellular networks, like any other data network, requires careful attention to network design such as proper segmentation of subscriber generated traffic from network management and signaling traffic. This presentation discusses an attack penetration method using only standard subscriber equipment to compromise an operator network.

SHA-256 | c2b5f9e80c71804ccb26604ad9550c6930b0b9297f7d33af74c0487029f4cf46
D2T1_-_Daniel_Ingevaldson_-_Virtualization_!=_Security_.zip
Posted Apr 21, 2008
Authored by Daniel S. Ingevaldson | Site conference.hitb.org

Virtualization != Security - Virtualization has emerged as the most disruptive datacenter technology of the last decade. Mr. Ingevaldson from IBM Internet Security Systems will discuss the emergence of virtualization as well as the many ways that it changes traditional security architecture as well as the ways it does not. Virtualization will influence the security business much like it is reshaping IT. Mr. Ingevaldson will review the brief history of security in virtualization as well as comment on the next-generation security technologies for the virtualized datacenter.

SHA-256 | 8d383025969032a36e2bacadfeef635abcd689a53e6eb810a3d394a5f1eb85cb
D1T2_-_Marc_Weber_Tobias_-_How_We_Cracked_Their_Codes_-_A_Case_Study_in__Compromising_the_Most_Popular_High_Security_Lock_in_America.zip
Posted Apr 21, 2008
Authored by Marc Weber Tobias | Site conference.hitb.org

How We Cracked Their Codes - A Case Study in Compromising the Most Popular High Security Lock in America.

SHA-256 | b8b5de86321c9109e1ebf43a06b3ac64aa1305152ab68be0c84a7022f61eb241
D1T1_-_Jim_Geovedi_-_Hijacking_VSAT_Connections.zip
Posted Apr 21, 2008
Authored by Jim Geovedi | Site conference.hitb.org

Presentation discussing the hijacking of VSAT connections.

SHA-256 | 6dfeb2819f6eea9512236553e50c0bf610cc640a2964f073804f8b09f78b57b8
D2T1_-_Adrian_Pastor_-_Cracking_Into_Embeded_Devices_and_Beyond.zip
Posted Apr 21, 2008
Authored by PAgVac | Site conference.hitb.org

Cracking into Embedded Devices and Beyond - The presentation covers cracking into embedded devices by exploiting vulnerabilities present on default software running on the target device.

tags | vulnerability
SHA-256 | b17e69cf657c3562c5c8244483120184a84061a080f2c346f2373b88d8170d3e
D1T2_-_Skyper_-_Cracking_the_GSM_A5-1_Encryption_in_Seconds.zip
Posted Apr 21, 2008
Authored by Skyper | Site conference.hitb.org

Cracking the GSM A5/1 Encryption in Seconds - Presentation explaining the security, technology and protocols of a GSM network. Further discusses building a GSM scanner for 900 USD. The second part of the talk reveals a practical solution to crack the GSM encryption A5/1.

tags | protocol
SHA-256 | fb2ff4fbbd8c3a9085eba1671fef94bd320cb3f478b3c80f491d30ff8ed76c9c
D1T2_-_Alessio_Penasilico_-_VoIP_INsecurities_-_Italians_Do_It_Better.zip
Posted Apr 21, 2008
Authored by Alessio L.R. Pennasilico | Site conference.hitb.org

VoIP (in)Security: Italians Do It Better - This presentation will explain in detail how a small group of annoyed Italian VoIP hackers used the Chaos Computer Club phone network during the 2007 Hacker camp for fun and profit.

SHA-256 | 518efe57180ba0d7c5e64792e43454b24d3d1634ef0768699047b17df11fd79b
D1T1_-_Michael_Thumann_-_Hacking_Second_Life.zip
Posted Apr 21, 2008
Authored by Michael Thumann | Site conference.hitb.org

Hacking Second Life - A presentation that covers the basic architecture of SecondLife and points out the possible attack vectors against SecondLife itself, but will also demonstrate hacks from the inside of SecondLife against real-life systems in the internet.

SHA-256 | fd3518c421efc61d62c97afa9fafe5bb277b1577ffc98e5668bc5b92b66370d2
D1T1_-_Ero_Carrera_-_Malware_Behavior_Tools_Scripting_and_Adavanced_Analysis.zip
Posted Apr 21, 2008
Authored by Ero Carrera | Site conference.hitb.org

Malware: Behavior, Tools, Scripting and Advanced Analysis - Presentation discussing a new tool taht is an extension to Bochs, a popular open-source CPU emulator. This extension will provide with advanced debugging and scripting functionality enabling the easy creation of a wide range of tools. The scripting interface of this tool provides a full Python environment to control the whole CPU, memory, devices, etc. Among the examples that will be presented, time allowing, will be generic unpacking techniques, monitoring of malware behavior or low-level system access to kernel/administrative objects. The tool was created to assist the process of automated malware analysis but its flexibility make it a good candidate to also assist in vulnerability discovery.

tags | kernel, python
SHA-256 | f9882e5282c5f3eaead310c40b32cb0f3c225d921e4c88aafa3ba6fca595e3dd
D1T1_-_Shreeraj_Shah_-_Securing_Next_Generation_Applications_-_Scan_Detect_and_Mitigate.zip
Posted Apr 21, 2008
Authored by Shreeraj Shah | Site conference.hitb.org

Securing Next Generation Applications - Scan, Detect, and Mitigate.

SHA-256 | d19c2013f9c13ff698a8b10c146857e5fd1996461317ffb2e89134213d493121
DAY_2_-_KEYNOTE_-_Jeremiah_Grossman.zip
Posted Apr 21, 2008
Authored by Jeremiah Grossman | Site conference.hitb.org

Hacks Happen - Conservative estimates put the total annual IT security spending in the US at $50 billion and e-crime losses at $100 billion. We are losing two dollars for every dollar spent. Those numbers are said to be worse on a global scale. Newly passed laws, industry regulation, and press coverage have certainly raised the profile of the problem, but where have these actions really gotten us?

SHA-256 | 732c1f50ff097c1e696ca7bc02cfc76b46a8058c253e98d918cd850d46a2557c
D2T2_-_Rodrigo_Rubira_Branco_-_Hacking_The_Cell_Architecture.zip
Posted Apr 21, 2008
Authored by Rodrigo Rubira Branco | Site conference.hitb.org

Hacking The Cell Architecture - This presentation intends to cover security aspects related to a new architecture, widely deployed and used called Cell. The architecture itself will be deeply explained, focusing on the security concerns that appear in this kind of asymmetric multi-core systems. While Cell architecture is used in the new playstation 3 it is also used in big blade machines.

SHA-256 | 6652d0e5155144577fa230a1ebfc66f7778e0db6b263a9c2ec8f132977fb67e3
D2T2_-_Raoul_Chiesa_and_Alessio_Pennasillico_-_Penetration_Testing_SCADA.zip
Posted Apr 21, 2008
Authored by Raoul Chiesa, Alessio Pennasillico | Site conference.hitb.org

Penetration Testing SCADA and National Critical Infrastructure - Real-Life Experiences and Case Studies.

SHA-256 | f21a1ea9e81567a87aac33d06cdf7676173295bfa37f9ad68da8d0795dbbd4d0
D2T2_-_Domingo_Montanaro_-_In-depth_Anti-Forensics_-_Challenges_of_Steganography_and_Discovering_Hidden_Data.zip
Posted Apr 21, 2008
Authored by Domingo Montanaro | Site conference.hitb.org

In-depth Anti-Forensics - Challenges of Steganography and Discovering Hidden Data.

SHA-256 | ce75ad6f552cae5156d9a3755ba145b80dbe81052871c602631d458c9ab13895
D2T2_-_Alexander_Kornbrust_-_Practical_Oracle_Forensics.zip
Posted Apr 21, 2008
Authored by Alexander Kornbrust | Site conference.hitb.org

Practical Oracle Forensics - Oracle forensics is a new discipline without special tools/scripts. Most presentations about Oracle forensics are still very basic. The typical approach in these presentations is to show what tools/(log)files are available to do forensics. In the real world with huge databases (many GB, sometimes TB) it is normally not helpful. This presentation is using a different approach. Based on the different type of attackers (leaving employee, nosy DBA/employee, external hacker etc.) we have different traces in Oracle and we show in different scenarios how to find evidence. We provide a free toolset to do a (basic) forensic analysis without having deep Oracle knowledge.

SHA-256 | 20612b361c886e97ff98ce3ea92f2c60e6d189c077a2b13341e46c3521bd8f78
D2T1_-_Petko_Petkov_-_For_My_Next_Trick_-_Client_Side_Hacking.zip
Posted Apr 21, 2008
Authored by Petko Petkov | Site conference.hitb.org

For My Next Trick: Client-Side Hacking - This paper describes numerous techniques for attacking Clients-side technologies. The content of the paper is based the research that has been conducted over past year by the GNUCITIZEN Ethical Hacker Outfit.

SHA-256 | 5114d549b8788fd32a3a932d6dc7a62491c96edcf00a8827b0992a195405db27
D2T1_-_Dino_Covotsos_-_Hacking_the_Bluetooth_Stack_for_Fun_Fame_and_Mayhem.zip
Posted Apr 21, 2008
Authored by Dino Covotsos | Site conference.hitb.org

Hacking the Bluetooth Stack for Fun, Fame and Mayhem - As the use of bluetooth technology becomes more commonly used, the room for exploitation increases. From cell phones to gaming devices. Dino demonstrates various methods of exploiting this technology in real life situations.

SHA-256 | 371a5f5e0f86c9c0696d681ba324a68ce8da7ea7d9e88421d34c2d5e098fc51f
D2T1_-_Cesar_Cerrudo_-_Token_Kidnapping.zip
Posted Apr 21, 2008
Authored by Cesar Cerrudo | Site conference.hitb.org

Token Kidnapping - This presentation is about a new technique for elevating privileges on Windows mostly from services, this technique exploits design weaknesses in Microsoft Windows XP, 2003, Vista and even Windows 2008. While in Windows Vista and 2008 many new security protections have been added, because of other weaknesses some of the new protection mechanisms are almost useless.

systems | windows
SHA-256 | 40e7a53ef53b12614b71cc8defc384e185161986510e109617ac0fd30faa1aaf
D1T2_-_Jamie_Butler_-_Computer_Forensics_and_Incident_Response.zip
Posted Apr 21, 2008
Authored by Jamie Butler | Site conference.hitb.org

Computer Forensics and Incident Response.

SHA-256 | 173e04022a3bb01dad090856ee26318a48eaf3beb57e160fe02d939119ff15b7
D1T2_-_Meling_Mudin_and_Lee_Chin_Sheng_-_Defensive_Network_Security.pdf
Posted Apr 18, 2008
Authored by Meling Mudin, Lee Chin Shing | Site conference.hitb.org

Defensive Network Security: Practical Methodologies - Emerging computer and network security threats have greatly changed the landscape of the security security scene. These new, advanced and unknown threats and attack methodologies have rendered traditional perimeter security devices such as firewall and IDS/IPS useless. However, the concept of Network Security Monitoring (NSM) has not make these devices obsolete - instead IDS/IPS and firewall device have become one of the essential parts of NSM.

SHA-256 | d6efb6ecc881241878e69a397336c5b9d70ab7e0b3978a23dafa738ad831a18b
hitb08.jpg
Posted Sep 28, 2007

Hack In The Box 08 Graphic.

SHA-256 | 7e275a065b2c96294fad7571a416699e0d7ad8b59532fd600067e8da92370139
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close