«
Expand/Collapse
130 items tagged "asia"
Related tags:
tags [+],
black hat [+],
security authors [+],
paper [+],
attacking [+],
web [+],
understanding [+],
david litchfield [+],
mac os x [+],
kenneth geers [+],
hacking [+],
geers [+],
europe [+],
chaos communication congress [+],
windows [+],
web application [+],
vulnerabilities [+],
network [+],
forensics [+],
card [+],
warfare [+],
talk [+],
taipei [+],
south africa [+],
social hacks [+],
shaun clowes [+],
shah tags [+],
russ rogers tags [+],
russ rogers [+],
riley eller [+],
reverse engineering [+],
p event [+],
open source software [+],
olsrd [+],
olsr [+],
nepal [+],
martin khoo [+],
malware [+],
laws [+],
joe grand [+],
india [+],
hardware hacking [+],
g access [+],
free [+],
foss [+],
exploiting [+],
elektra wagenrad [+],
cyberspace [+],
buffer [+],
black [+],
bangalore [+],
attack [+],
advanced [+],
Software [+],
Hardware [+],
Community [+],
slides [+],
x event [+],
walt tags [+],
virtualization [+],
virtual [+],
van der walt [+],
unpredictable number [+],
turn [+],
tim mullen [+],
threat [+],
terrorism [+],
technology authors [+],
tea [+],
tcp [+],
taiwan [+],
tables [+],
system [+],
symbian [+],
sql injection [+],
sql [+],
social engineering [+],
side [+],
shawn moyer [+],
setiri [+],
seki tags [+],
security vulnerabilities [+],
saumil shah [+],
satan [+],
rfid [+],
read [+],
public transportation services [+],
pl sql [+],
overflow [+],
oracle [+],
optimized [+],
ops [+],
online [+],
office documents [+],
office [+],
obfuscated [+],
ntlm [+],
north america [+],
nathan mcfeters [+],
nathan hamiel [+],
moyer [+],
mobile devices [+],
mac osx [+],
mac os [+],
list [+],
legal [+],
kingdom [+],
keys to the kingdom [+],
keys [+],
johnny long [+],
jeremiah grossman [+],
jennifer granick [+],
java virtual machine [+],
java [+],
japan [+],
jaco van [+],
international [+],
internal networks [+],
internal [+],
ida pro [+],
hypervisor [+],
harald welte [+],
hacking mac [+],
grossman [+],
greg hoglund [+],
graan [+],
google [+],
gerhard eschelbeck [+],
flake [+],
flag games [+],
flag [+],
fanboys [+],
exploitation techniques [+],
engineering [+],
emv cards [+],
emv [+],
dang [+],
dan kaminsky [+],
cyberterrorism [+],
covert channel [+],
cookie [+],
computer [+],
collin mulliner [+],
client [+],
chris eagle [+],
chip and [+],
chip [+],
charlie miller [+],
capture [+],
capital taipei [+],
buffer overflow [+],
bruce dang [+],
black ops [+],
authentication protocol [+],
art [+],
architectures [+],
application [+],
Tools [+],
authors [+],
zane lackey [+],
xssploitation [+],
writing secure code [+],
worms [+],
world [+],
winny [+],
windows nt security [+],
win [+],
wifi [+],
websites [+],
web hacks [+],
web hacking [+],
web assessment [+],
vulns [+],
vulnerability assessment [+],
vulnerability [+],
voip [+],
vista [+],
van beek [+],
usage [+],
update [+],
unix ftp [+],
unix [+],
trying [+],
truths [+],
trees [+],
tracking [+],
track [+],
tool [+],
three truths [+],
threats [+],
thorsten holz [+],
thorsten [+],
thomas c. waszak [+],
thomas c [+],
thinking [+],
thepiratebay [+],
terminal [+],
technique [+],
techie [+],
targeted [+],
takayuki sugiura [+],
syscan [+],
swindlers [+],
survey result [+],
survey [+],
super [+],
subverting [+],
strategy tactics [+],
stephen dugan [+],
south east [+],
sony playstation [+],
sony hack [+],
sony [+],
software development [+],
social responsibility [+],
sns [+],
six degrees [+],
sites [+],
sip [+],
singapore [+],
shiva [+],
shellcode [+],
security windows [+],
security tags [+],
security review [+],
security guide [+],
security architectures [+],
securing [+],
secure [+],
science [+],
scanning [+],
scammers [+],
save [+],
s.k. chong [+],
russia [+],
rootkit [+],
revisited [+],
review [+],
remote [+],
reloaded [+],
raided [+],
prevention mechanism [+],
post mortem [+],
post [+],
playstation [+],
pierre noel tags [+],
pierre noel [+],
phishing [+],
perspectives [+],
perspective [+],
paul bhm [+],
parsing [+],
paranoid [+],
p security [+],
online scammers [+],
one [+],
non common [+],
nimda [+],
new [+],
neutralizing [+],
networks [+],
networked [+],
network forensics [+],
nature [+],
mosdef [+],
mortem [+],
moniz [+],
money [+],
microcosm [+],
measuring [+],
meaning [+],
maynor [+],
marcus ranum [+],
management authors [+],
management [+],
malicious [+],
malaysia government [+],
malaysia [+],
making money on the web [+],
machine [+],
low [+],
logons [+],
lindner [+],
laurent oudot [+],
larry leibrock [+],
language [+],
lackey [+],
kernel windows [+],
kernel [+],
kawaguchi [+],
joint [+],
joanna rutkowska [+],
jeremy rauch [+],
jeremiah [+],
jay beale [+],
japanese landscape [+],
japanese [+],
ipv [+],
ips [+],
intrusion detection [+],
intrusion [+],
intranet websites [+],
intranet [+],
interpreted [+],
intelligence [+],
input [+],
injection [+],
information security community [+],
information gathering [+],
information [+],
increasingly sophisticated [+],
identifying [+],
icmp [+],
http [+],
honeypots [+],
holes [+],
ho chi minh city [+],
hiroshi kawaguchi [+],
hideaki [+],
harry [+],
haroon [+],
hangzhou [+],
hacks [+],
gsm infrastructure [+],
gsm [+],
graph [+],
government [+],
get [+],
georg wicherski [+],
gathering [+],
gallery [+],
fyodor tags [+],
ftp servers [+],
front [+],
foreign [+],
forcing [+],
fixing [+],
fingerprinting [+],
felix [+],
falling [+],
fail [+],
epassports [+],
environment [+],
encoding [+],
emmanuel gadaix [+],
east asian country [+],
dugan [+],
door [+],
dominos [+],
domino event [+],
domino [+],
dominique brezinski [+],
dominique [+],
dmca [+],
disclosure law [+],
dirty [+],
detection [+],
detect [+],
dependencies [+],
degrees [+],
day [+],
david maynor [+],
dave aitel [+],
database security [+],
database [+],
darren bilby [+],
darknet [+],
dan moniz [+],
cyber vandals [+],
cyber threats [+],
cyber crime [+],
cyber [+],
crime authors [+],
conference [+],
computer forensics [+],
common security [+],
common [+],
code authors [+],
code [+],
cisco security [+],
cisco event [+],
chris hurley tags [+],
chris hurley [+],
chi minh city [+],
character encoding [+],
character [+],
change [+],
casing [+],
card access [+],
capture the flag [+],
buffer overflows [+],
brute [+],
bruce schneier [+],
botnet [+],
binary [+],
binaries [+],
based buffer overflow [+],
bait [+],
automated [+],
auditing [+],
attack trees [+],
assessment techniques [+],
assessment [+],
art and science [+],
arkin tags [+],
arian evans [+],
architecture [+],
arai [+],
anti [+],
anonymous [+],
analysis [+],
alexander eisen [+],
alex stamos [+],
ajax [+],
aiko tags [+],
aggressive [+],
Wireless [+],
Issues [+],
ExploitsVulnerabilities [+],
Bugs [+],
32 one way [+],
audio [+],
security [+],
security event [+]
-
-
21:46
»
SecDocs
Authors:
Elektra Wagenrad Tags:
network P2P Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Olsr.org's improved algorithm (compared to the initial INRIA OLSR draft) and how it may influence the development of ubiquitous free wireless networks. The Optimized Link State Routing Deamon - olsrd - from olsr.org is a routing application developed by community networking activists for wireless mesh networks. It is a open-source project that supports Mac OS-X, Window$ 98, 2000, XP, Linux, FreeBSD, OpenBSD and NetBSD. The application is available for Accesspoints that run Linux like the Linksys WRT54G, Asus Wl500g, Asus Wireles Harddrive, 4G Access Cube or Pocket PCs running Familiar Linux. Olsrd is a tremendous success. Community Wifi Networks all over the world are using olsrd now - in South Africa, Europe, Asia, Nepal, to mention a few. Rumours say that the most prominent person that communicates using olsrd at the moment is the Dalai Lama in exile... I will show what is going on in olsrd, where we are heading to with the protocol, what you can actually do with it now and what are the differences to the initial INRIA OLSR draft.
-
3:33
»
SecDocs
Authors:
Elektra Wagenrad Tags:
network P2P Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Olsr.org's improved algorithm (compared to the initial INRIA OLSR draft) and how it may influence the development of ubiquitous free wireless networks. The Optimized Link State Routing Deamon - olsrd - from olsr.org is a routing application developed by community networking activists for wireless mesh networks. It is a open-source project that supports Mac OS-X, Window$ 98, 2000, XP, Linux, FreeBSD, OpenBSD and NetBSD. The application is available for Accesspoints that run Linux like the Linksys WRT54G, Asus Wl500g, Asus Wireles Harddrive, 4G Access Cube or Pocket PCs running Familiar Linux. Olsrd is a tremendous success. Community Wifi Networks all over the world are using olsrd now - in South Africa, Europe, Asia, Nepal, to mention a few. Rumours say that the most prominent person that communicates using olsrd at the moment is the Dalai Lama in exile... I will show what is going on in olsrd, where we are heading to with the protocol, what you can actually do with it now and what are the differences to the initial INRIA OLSR draft.
-
3:33
»
SecDocs
Authors:
Elektra Wagenrad Tags:
network P2P Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Olsr.org's improved algorithm (compared to the initial INRIA OLSR draft) and how it may influence the development of ubiquitous free wireless networks. The Optimized Link State Routing Deamon - olsrd - from olsr.org is a routing application developed by community networking activists for wireless mesh networks. It is a open-source project that supports Mac OS-X, Window$ 98, 2000, XP, Linux, FreeBSD, OpenBSD and NetBSD. The application is available for Accesspoints that run Linux like the Linksys WRT54G, Asus Wl500g, Asus Wireles Harddrive, 4G Access Cube or Pocket PCs running Familiar Linux. Olsrd is a tremendous success. Community Wifi Networks all over the world are using olsrd now - in South Africa, Europe, Asia, Nepal, to mention a few. Rumours say that the most prominent person that communicates using olsrd at the moment is the Dalai Lama in exile... I will show what is going on in olsrd, where we are heading to with the protocol, what you can actually do with it now and what are the differences to the initial INRIA OLSR draft.
-
-
21:03
»
Packet Storm Security Recent Files
EMV, also known as "Chip and PIN", is the leading system for card payments world- wide. It is used throughout Europe and much of Asia, and is starting to be introduced in North America too. Payment cards contain a chip so they can execute an authentication protocol. This protocol requires point-of-sale (POS) terminals or ATMs to generate a nonce, called the unpredictable number, for each transaction to ensure it is fresh. The authors have discovered that some EMV implementers have merely used counters, timestamps or home-grown algorithms to supply this number. This exposes them to a "pre-play" attack which is indistinguishable from card cloning from the standpoint of the logs available to the card-issuing bank, and can be carried out even if it is impossible to clone a card physically (in the sense of extracting the key material and loading it into another card).
-
21:03
»
Packet Storm Security Misc. Files
EMV, also known as "Chip and PIN", is the leading system for card payments world- wide. It is used throughout Europe and much of Asia, and is starting to be introduced in North America too. Payment cards contain a chip so they can execute an authentication protocol. This protocol requires point-of-sale (POS) terminals or ATMs to generate a nonce, called the unpredictable number, for each transaction to ensure it is fresh. The authors have discovered that some EMV implementers have merely used counters, timestamps or home-grown algorithms to supply this number. This exposes them to a "pre-play" attack which is indistinguishable from card cloning from the standpoint of the logs available to the card-issuing bank, and can be carried out even if it is impossible to clone a card physically (in the sense of extracting the key material and loading it into another card).
-
-
11:51
»
SecDocs
Authors:
Atul Chitnis Tags:
technology Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: This talk is about the growth of Free Software in India. It includes an overview of how Free Software has spread not only within the industry but also with in the Government and Education. Includes examples of Indian innovation based on Free Software, including the Simputer. Atul Chitnis has promoted Free and Open Source Software (FOSS) and driven community initiatives in India since the mid 1990s. In this talk, he presents an overview of these activities, from pushing a million Linux CDs into the country via the PCQuest Linux Initiative, engaging the community with industry and government through participation in large scale events, to the founding of Asia's best known and most successful FOSS event series (FOSS.IN, formerly known as "Linux Bangalore"). He also presents samples of his current work, which includes the opening of technologies associated with the Simputer, whose future he now guides as part of his work at Geodesic Information Systems. His talk will include demonstrations of the technologies involved. Finally, he will explain some of the "social hacks" he has resorted to over the years to force the FOSS community, the Indian government and the industry to get talking to each other, and will summarize the direction and future of FOSS not only India but in Asia.
-
11:45
»
SecDocs
Authors:
Atul Chitnis Tags:
technology Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: This talk is about the growth of Free Software in India. It includes an overview of how Free Software has spread not only within the industry but also with in the Government and Education. Includes examples of Indian innovation based on Free Software, including the Simputer. Atul Chitnis has promoted Free and Open Source Software (FOSS) and driven community initiatives in India since the mid 1990s. In this talk, he presents an overview of these activities, from pushing a million Linux CDs into the country via the PCQuest Linux Initiative, engaging the community with industry and government through participation in large scale events, to the founding of Asia's best known and most successful FOSS event series (FOSS.IN, formerly known as "Linux Bangalore"). He also presents samples of his current work, which includes the opening of technologies associated with the Simputer, whose future he now guides as part of his work at Geodesic Information Systems. His talk will include demonstrations of the technologies involved. Finally, he will explain some of the "social hacks" he has resorted to over the years to force the FOSS community, the Indian government and the industry to get talking to each other, and will summarize the direction and future of FOSS not only India but in Asia.
-
11:45
»
SecDocs
Authors:
Atul Chitnis Tags:
technology Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: This talk is about the growth of Free Software in India. It includes an overview of how Free Software has spread not only within the industry but also with in the Government and Education. Includes examples of Indian innovation based on Free Software, including the Simputer. Atul Chitnis has promoted Free and Open Source Software (FOSS) and driven community initiatives in India since the mid 1990s. In this talk, he presents an overview of these activities, from pushing a million Linux CDs into the country via the PCQuest Linux Initiative, engaging the community with industry and government through participation in large scale events, to the founding of Asia's best known and most successful FOSS event series (FOSS.IN, formerly known as "Linux Bangalore"). He also presents samples of his current work, which includes the opening of technologies associated with the Simputer, whose future he now guides as part of his work at Geodesic Information Systems. His talk will include demonstrations of the technologies involved. Finally, he will explain some of the "social hacks" he has resorted to over the years to force the FOSS community, the Indian government and the industry to get talking to each other, and will summarize the direction and future of FOSS not only India but in Asia.
-
-
21:40
»
SecDocs
Authors:
Harald Welte Tags:
RFID bank Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: How to reverse engineer the data format of a real-world RFID based debit card system. One of Asia’s most popular electronic payment systems uses insecure technology. The EasyCard system, established in 2001, is the most popular stored-valued card in Taiwan. With more than 18 million issued cards, it is the predominant means of paying for public transportation services in the capital Taipei. In 2010, use of the EasyCard was extended beyond transportation. Card holders can now pay in all major convenience stores like 7eleven, coffe shops like Starbucks and and major retail companies like SOGO. Despite the large fraud potential, the EasyCard system uses the MIFARE Classic RFID technology, whose proprietary encryption cipher CRYPTO1 relied on obscurity and was first publicly broken several years ago at 24C3 This presentation analyzes the results of combining the practical attacks on the MIFARE Classic CRYPTO1 system in the context of the EasyCard payment system. It describes the process of reverse- engineering the actual content of the card to discover the public transportation transaction log, the account balance and how the daily spending limit work. Furthermore, the talk will present how fundamentally flawed the system is, and how easy it is to add or subtract monetary value to/from the card. Cards manipulated as described in the talk have been accepted by the payment system.
-
21:40
»
SecDocs
Authors:
Harald Welte Tags:
RFID bank Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: How to reverse engineer the data format of a real-world RFID based debit card system. One of Asia’s most popular electronic payment systems uses insecure technology. The EasyCard system, established in 2001, is the most popular stored-valued card in Taiwan. With more than 18 million issued cards, it is the predominant means of paying for public transportation services in the capital Taipei. In 2010, use of the EasyCard was extended beyond transportation. Card holders can now pay in all major convenience stores like 7eleven, coffe shops like Starbucks and and major retail companies like SOGO. Despite the large fraud potential, the EasyCard system uses the MIFARE Classic RFID technology, whose proprietary encryption cipher CRYPTO1 relied on obscurity and was first publicly broken several years ago at 24C3 This presentation analyzes the results of combining the practical attacks on the MIFARE Classic CRYPTO1 system in the context of the EasyCard payment system. It describes the process of reverse- engineering the actual content of the card to discover the public transportation transaction log, the account balance and how the daily spending limit work. Furthermore, the talk will present how fundamentally flawed the system is, and how easy it is to add or subtract monetary value to/from the card. Cards manipulated as described in the talk have been accepted by the payment system.
-
-
21:45
»
SecDocs
-
21:45
»
SecDocs
-
21:45
»
SecDocs
-
-
21:48
»
SecDocs
-
21:48
»
SecDocs
-
21:48
»
SecDocs
-
21:48
»
SecDocs
-
21:48
»
SecDocs
-
21:48
»
SecDocs
-
-
21:58
»
SecDocs
-
21:58
»
SecDocs
-
21:58
»
SecDocs
-
21:58
»
SecDocs
-
21:58
»
SecDocs
-
21:58
»
SecDocs
-
-
21:32
»
SecDocs
-
21:32
»
SecDocs
-
21:32
»
SecDocs
-
12:37
»
SecDocs
-
-
13:32
»
SecDocs
-
-
21:35
»
SecDocs
-
-
21:46
»
SecDocs
-
21:46
»
SecDocs
-
21:46
»
SecDocs
-
21:46
»
SecDocs
-
21:46
»
SecDocs
-
2:04
»
SecDocs
-
2:01
»
SecDocs
-
1:59
»
SecDocs
-
1:57
»
SecDocs
-
1:55
»
SecDocs
-
1:50
»
SecDocs
-
-
21:42
»
SecDocs
-
21:42
»
SecDocs
-
21:42
»
SecDocs
-
21:42
»
SecDocs
-
21:42
»
SecDocs
-
5:43
»
SecDocs
-
5:40
»
SecDocs
-
5:38
»
SecDocs
-
5:34
»
SecDocs
-
5:31
»
SecDocs
-
-
21:51
»
SecDocs
-
21:51
»
SecDocs
-
21:51
»
SecDocs
-
21:51
»
SecDocs
-
21:51
»
SecDocs
-
21:51
»
SecDocs
-
-
21:51
»
SecDocs
-
21:51
»
SecDocs
-
21:51
»
SecDocs
-
21:51
»
SecDocs
-
21:51
»
SecDocs
-
21:51
»
SecDocs
-
2:38
»
SecDocs
-
2:38
»
SecDocs
-
2:28
»
SecDocs
-
2:27
»
SecDocs
-
2:26
»
SecDocs
-
2:25
»
SecDocs
-
2:23
»
SecDocs
-
2:22
»
SecDocs
-
2:20
»
SecDocs
-
-
21:47
»
SecDocs
-
21:47
»
SecDocs
-
21:47
»
SecDocs
-
21:47
»
SecDocs
-
21:47
»
SecDocs
-
-
21:52
»
SecDocs
-
21:52
»
SecDocs
-
21:52
»
SecDocs
-
21:52
»
SecDocs
-
21:52
»
SecDocs
-
-
21:25
»
SecDocs
-
21:25
»
SecDocs
-
21:25
»
SecDocs
-
21:25
»
SecDocs
-
21:25
»
SecDocs
-
21:25
»
SecDocs
-
-
21:43
»
SecDocs
-
-
21:25
»
SecDocs
-
-
21:30
»
SecDocs
-
21:30
»
SecDocs
-
21:30
»
SecDocs
-
21:30
»
SecDocs
-
21:30
»
SecDocs
-
21:30
»
SecDocs
-
-
21:29
»
SecDocs
-
21:29
»
SecDocs
-
21:29
»
SecDocs
-
21:29
»
SecDocs
-
-
11:32
»
SecDocs
-
-
13:03
»
SecDocs
-
-
2:18
»
SecDocs
-
2:18
»
SecDocs
-
2:18
»
SecDocs
-
2:18
»
SecDocs
-
-
3:25
»
SecDocs
-
3:25
»
SecDocs
-
3:25
»
SecDocs
-
3:25
»
SecDocs
-
3:25
»
SecDocs
-
-
1:52
»
SecDocs
-
1:52
»
SecDocs
-
-
11:23
»
SecDocs
-
11:23
»
SecDocs
-
11:18
»
SecDocs
-
11:16
»
SecDocs
-
11:11
»
SecDocs
-
-
13:15
»
SecDocs
-
10:54
»
SecDocs
-
-
13:16
»
SecDocs
-
13:14
»
SecDocs
-
13:11
»
SecDocs
-
11:47
»
SecDocs
-
11:23
»
SecDocs
-
-
12:00
»
Packet Storm Security Recent Files
SyScan 10 Call For Papers - The Symposium on Security for Asia Network aims to be a very different security conference from the rest of the security conferences that the information security community in Asia has come to be so familiar and frustrated with. SyScan is a non-product, non-vendor biased security conference. It is the aspiration of SyScan to congregate in Asia the best security experts in their various fields, to share their research, discovery and experience with all security enthusiasts in Asia. This year SyScan will be held in Singapore, Hangzhou, Taipei, and Ho Chi Minh City.