10.07.2015 Views

DEF CON 18 Program - Up

DEF CON 18 Program - Up

DEF CON 18 Program - Up

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

RESENTATIONSHacking .NET Applications atRuntime: A Dynamic AttackJon McCoy Software EngineerWhat do you do when you get inside of a .Net program? Thispresentation will demonstrate taking full advantage of the .Networld from the inside. Once inside of a program don’t just putin a key-logger, remold it! I will presentation a how to infiltrate,evaluate, subvert, combine, and edit .Net applications at Runtime.The techniques demonstrated will focus on the modification ofcore logic in protected .Net programs.This will make almost every aspect of a target programsusceptible to evaluation and change; and allow such hacksas the ability to intermix your favorite applications into a newFrankenstein App, compromise program level security, reverseengineer from memory, modify events, edit the GUI, huntmalware, get the code behind a button, and/or subvert programlocks. Demo implementation and tools will be released.The coding techniques presented will be applicable wellbeyond compromising the security of a running program. Thesetechniques will grant programmers a new level of access andcontrol over any .Net code, as well as granting the ability touse and integrate with most any .Net application. Creating adevelopment path to test and build 3rd party patches within .Net.You Spent All That Money AndYou Still Got Owned...Joseph McCray Founder of Learn Security OnlineThis talk will focus on practical methods of identifying andbypassing enterprise class security solutions such as LoadBalancers, both Network and Host-based Intrusion PreventionSystems (IPSs), Managed Anti-Virus, Web Application Firewalls(WAFs), and Network Access Control Solutions (NAC).A ChaosVPN for Playing Capture The Flagmc.fly, ryd, no _ maam, vyrusChaosVPN – the American name is AgoraLink – is a tinc based,fully meshed VPN to connect hackerspaces and other hackerrelated networks for fun, sharing, learning and competition witheach other.Its purpose is to provide a trusted, private and secure networkwith high bandwidth, low latency, without single points of failure.The first intended usage of the network was VoIP, but it hasbecome used for lots of different purposes – whatever works onIPv4 and/or IPv6 works on ChaosVPN. This includes our own rootzone .hack. Most major Hackerspaces in Europe and America arenow connected via the ChaosVPN.To play CTF contests we decided to build a separate incarnationof this network called warzone. This network is to compete, playand learn in an isolated environment without harming anyone.We host CTF hacking contests and challenges on the network.Critical thinking, source code analysis, reverse engineering anda good understanding of networks are the abilities honed in thisenvironment.The talk will show the direction ChaosVPN / AgoraLink took andexplain some decision points. We will show how it is built, what itdoes and how to integrate it in your hacker gathering space.And then we will show how this network can be used to play CTFGames and have some fun.Cyberterrorism and the Security of theNational Drinking Water InfrastructureJohn McNabb President, South Shore PC ServicesThe national drinking water infrastructure is vitally importantto protection of public health and safety and also supportsbusiness, industry, and the national economy. While steps havebeen taken since 9/11 to identify and mitigate vulnerabilities inthe drinking water infrastructure, serious vulnerabilities remain.In this talk, the presenter will discuss and review the challengesof physical and cyber security for the national public drinkingwater infrastructure and provide his observations, based on 13years running a local water department and 5 years in IT, on theexisting security gaps and what should be done about them.Part of this talk will be based on a talk he gave at the AmericanWater Works Association (AWWA) Water Security Congressin April, 2009 in Washington, DC about a strategic weaknessof the national infrastructure. He will also review the state ofcyber insecurity of the drinking water infrastructure, the threatscurrently known to their SCADA systems, and the potentialthreats and countermeasures that should be considered.We Don’t Need No Stinkin’ Badges: HackingElectronic Door Access Controllers /EXPLOITShawn Merdinger Security ResearcherIn the security world, attacker physical access often meansgame over – so what happens if you can’t trust your building’selectronic door system? This presentation and paper exploreattack surfaces and exploitation vectors in a major vendor ofelectronic door access controllers (EDAC).The main focus is on time-constrained rapid analysis and bughuntingmethodologies, while covering research techniquesthat assist in locating and targeting EDAC systems. In addition,a review of practical countermeasures and potential researchactivities in the EDAC space are covered.Attendees can expect an eye-opening experience regardinginsecurities of critical systems controlling physical access tohospitals, schools, fire stations, businesses and other facilities.Securing MMOs: A SecurityProfessional’s View From the Insidemetr0 Senior Software Engineer, Bioware MythicGold farmers. Cheaters. Beleaguered programmers. Allingredients in a recipe for an unstable, fun-sapping game.Closely following the model of “Brief Title: Long, BoringDescription,” Securing MMOs: A Security Professional’s ViewFrom the Inside will give attendees a look at the securityproblems plaguing the MMO industry and how modern engineersare taking the fight to cheaters and hackers in MMOs.Letting the Air Out of Tire PressureMonitoring SystemsMike Metzger Owner, Flexible CreationsSince 2008 every new car sold in the US requires some type ofTire Pressure Monitoring System be installed. The most popularuses simple unencrypted RF communications to relay the tirepressure information back to the car ECU. This talk goes overthe basic history, implementation, and most importantly theunforeseen issues with privacy and subversion of TPM systemsKim Jong-il and Me: How to Build aCyber Army to Defeat the U.S.Charlie Miller Principal Analyst, Independent SecurityEvaluatorsThink you might ever be “asked” by a dictator of an Axis of Evilcountry to take down the USA in a cyberwar? Ever wonder howsomeone who finds vulnerabilities and breaks into computersfor a living would approach cyberwar, i.e. not Richard Clarke?Then this is the talk for you! In this talk, I outline how to constructa cyber army to attack a developed country, based on myexperience as a penetration tester and security researcher.This will highlight anticipated costs, resources needed, roles ofindividuals, and numbers of people needed, as well as tacticsand strategies to use. It will also outline time required to getthe unit operational as well as time frames to achieve particularobjectives. That’s right, the USA is going down!HD Voice – The Overdue RevolutionDoug Mohney Editor-in-Chief, HD Voice NewsAfter kicking around on the back shelf for years, HD voice isfinally gaining traction both in the broadband world and thecellular. And the French are leading the way!The audio standards for a POTS (Plain Old Telephone System) callhave been frozen since about 1937. Since then, modern societyhas had FM radio, Dolby Sound, TV, HDTV, cell phones, satellitebroadcast, the Internet, fiber optics, but no improvement to astock voice phone call.Information will include more precisely defining WTF HD voice is,where it is taking place around the globe, the emerging War ofthe Codecs, mobile vs broadband, enterprise vs consumer, thegoodness of HD voice over POTS, and whatever other questionscome up from the audience.Getting Social with the Smart GridJustin MorehouseTony Flick Principal, FYRM AssociatesLittered with endless threats and vulnerabilities surroundingboth social networking and the Smart Grid, the marriage ofthese two technologies is official, despite protests by thesecurity community. Consumers love it because they can bragto their friends about how green they are. Businesses love itmore because it provides fresh material for their marketingdepartments. Hackers love it the most because it opens up attackvectors, both new and old. During this presentation we dissectreadily available social Smart Devices, examining where theyget things right, and where they fail. We expand on the failures,discussing and demonstrating attacks against consumers(think PleaseRobMe.com), the Smart Devices themselves, andthe social networking sites they communicate with. We wantconsumers, device manufactures, and social networking sitesto understand how to get social with the Smart Grid securely,and prevent social networking privacy from becoming even morecomplex. The tools we release during this presentation will allowconsumers to review their Smart Devices’ social footprint, andprovide device manufacturers with recommendations that can beimplemented immediately. Attendees will leave our presentationarmed with a deep understanding of the strengths andweaknesses of social Smart Devices, how to attack their currentweaknesses and leverage their current strengths, and utilize ourtools to further research how we all can better secure the socialside of the Smart Grid.38 39

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!