«
Expand/Collapse
39 items tagged "boston"
Related tags:
hacks [+],
code [+],
boston dynamics [+],
security [+],
robots [+],
privacy [+],
windows [+],
web [+],
vulnerability [+],
usenix workshop [+],
security mechanisms [+],
rootkit [+],
robot [+],
presentation [+],
papers [+],
paper submissions [+],
location [+],
leet [+],
information [+],
google [+],
cloud [+],
call [+],
attack [+],
application [+],
windows operations [+],
wendy poland [+],
wendy [+],
webos [+],
web developer community [+],
web boom [+],
warrior [+],
wallace and gromit [+],
wallace [+],
video [+],
value [+],
uninvited [+],
understanding [+],
tyler [+],
transportation [+],
transit card [+],
transit [+],
tor [+],
top [+],
todd [+],
timothy brueggemann [+],
throngs [+],
threats [+],
thing [+],
testers [+],
team [+],
target user [+],
target [+],
taking center stage [+],
system languages [+],
steven christey [+],
steve christey [+],
spyware [+],
sophos [+],
soldering irons [+],
solar charger [+],
solar [+],
slides [+],
skyhook wireless [+],
sim [+],
session [+],
security vulnerabilities [+],
security responsibility [+],
security posture [+],
security incident response [+],
security groups [+],
security event [+],
seattle [+],
runtime environments [+],
rugged [+],
rootkits [+],
ron gula [+],
robert clark tags [+],
riley hassell [+],
rfid tag [+],
rfid [+],
remediation measures [+],
registry keys [+],
recognized [+],
realistic view [+],
read [+],
randolph barr [+],
quadruped [+],
provider [+],
product [+],
process [+],
privacy event [+],
practical [+],
post mortem [+],
police websites [+],
police [+],
poetry authors [+],
pentesters [+],
penetration testers [+],
penetration [+],
pci [+],
payload [+],
pacesetter [+],
operations system [+],
occupy wall [+],
object [+],
nss [+],
ninja warrior [+],
ninja [+],
nick depetrillo [+],
new paradigm [+],
new [+],
mr. phatak [+],
modern infrastructure [+],
mitigation technologies [+],
misc [+],
microsoft [+],
memory resident [+],
memory corruption [+],
memory analysis [+],
memory accesses [+],
memory [+],
mass. [+],
managing risk [+],
manager. this [+],
manager. during [+],
management [+],
machine [+],
linux [+],
legged animal [+],
legal commentaries [+],
ladd harris [+],
l. aaron kaplan [+],
keunote [+],
kernel internals [+],
kernel [+],
josh corman [+],
jonathan klein [+],
jon oberheide [+],
jacob appelbaum [+],
ip geolocation [+],
intrusion prevention [+],
interesting solutions [+],
incident response team [+],
incident response [+],
incident [+],
humanoid robot [+],
hspii [+],
hot spots [+],
hits [+],
hari kari [+],
h.d. moore tags [+],
gsm location [+],
gsm [+],
green [+],
gps [+],
generic methods [+],
generic mechanism [+],
gain comfort [+],
functional reference [+],
fortune 500 company [+],
forensic tools [+],
firewall logs [+],
file [+],
exploitation activities [+],
exploitation [+],
engineering [+],
dystopian visions [+],
dss [+],
drinking [+],
done [+],
don bailey [+],
disclosure policies [+],
disclosure [+],
dino dai zovi [+],
digital infrastructure [+],
detect [+],
demographic variables [+],
death [+],
david lenoe [+],
dave [+],
data retention [+],
darpa contract [+],
dan kaminsky [+],
dan crowley [+],
d moore [+],
cyber crime [+],
cyber [+],
crime [+],
contraptions [+],
computing [+],
computer network security [+],
computer network operations [+],
computer [+],
compliance system [+],
communications infrastructure [+],
coldfusion server [+],
coldfusion [+],
classic [+],
circumvention [+],
chris wysopal [+],
chris clark townsend [+],
chief security architect [+],
cheetah [+],
charger [+],
chaos communication congress [+],
cell [+],
carole fennelly [+],
carmen san diego [+],
card [+],
buffer overflows [+],
buffer overflow [+],
browser [+],
broken [+],
breakfast machine [+],
branden williams [+],
boston transit [+],
boston police [+],
boston business journal [+],
bob martin [+],
blackberry [+],
bill blunden [+],
bigdog [+],
becky stern [+],
authors [+],
aurora [+],
attempt [+],
asylum [+],
aslr [+],
artisans [+],
art [+],
army experiment [+],
army [+],
application compatibility [+],
apple [+],
anton chuvakin [+],
anonymous [+],
anonymity privacy [+],
anonymity [+],
alex stamos [+],
adobe [+],
administrative interface [+],
adam meyers [+],
access control mechanisms [+],
access [+],
Software [+]
-
-
11:01
»
Hack a Day
Fans of the game show Ninja Warrior will immediately recognize the similarity of this test apparatus as the Spider Climb. Of course that’s not a human contestant, but a humanoid robot developed by Boston Dynamics. And it’s not actually clinging to the vertical walls as its only support. There are two narrow ledges to either side on [...]
-
-
13:01
»
Hack a Day
It’s a blur, but you really don’t want to seen this thing coming for you anyway. It’s the latest look at what the folks at Boston Dynamics have been working on under a DARPA contract. They call it the Cheetah robot as it’s the fastest four-legged bot ever developed. The clip after the break shows [...]
-
-
9:03
»
Hack a Day
Check it out, this is a Boston transit pass — or at least the parts of it that matters. [Becky Stern] got rid of the rest in a bid to embed the RFID tag inside her cellphone. The transit pass, called a CharlieCard, started out as a normal credit card shaped tag which you might [...]
-
-
11:10
»
Carnal0wnage
I'll be giving my ColdFusion for Pentesters talk at
SOURCE Boston next week.
Here is the info from the abstract:
"ColdFusion is one of those technologies where organizations are either ColdFusion shops or they won't touch it on a bet. Similarly, I find that pentesters have either been exposed to it and have a few tricks to attack it or not. Aside from common web application issues, ColdFusion can also be attacked on the network level and many times used to obtain remote access on the host. This talk will cover what is ColdFusion, common ColdFusion issues, finding useful ColdFusion URLs, identifying specific ColdFusion version and components, and verifying if common vulnerabilities are present in the ColdFusion server you are targeting. If access to the ColdFusion administrative interface can be obtained, you can perform post exploitation activities that will typically yield you remote access to the operating system supporting the ColdFusion install."
Like the other talks, i'll do the what it is, why you care (?), and some ways to go after it. Hopefully useful/interesting.
Hope to see people there.
-CG
-
-
10:01
»
Hack a Day
As soon as the team at Revolt Labs heard Occupy Wall Street was coming to Boston, they decided to pick up their soldering irons in support of the throngs of protestors. They came up with a Solar charging USB box to keep those cell phones and digital cameras charged. The case came direct from an [...]
-
-
14:02
»
Hack a Day
Those following the evolution of quadrupedal assist robots will recognize the specimen seen above as a relative of BigDog. This is AlphaDog, one of the latest prototypes in Boston Dynamics’ Legged Squadron Support Systems program. It’s designed to carry 400 pounds of payload, which explains the disc weights seen on either side of the torso. Like its diminutive sibling, [...]
-
-
8:00
»
Hack a Day
While Boston Dynamics’ Big Dog is pretty impressive, check out this video of the US Army’s first attempt at a quadruped vehicle. Created in the early 1960s with the help of GE, this Army experiment was the first successful attempt of replicating a four-legged animal with a mechanical machine. This “Walking Truck” was driven by [...]
-
-
14:04
»
Packet Storm Security Recent Files
The 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET) Call For Papers has been announced. Paper submissions are due Tuesday, January 25, 2011, 11:59 p.m. PST. This workshop will take place March 29, 2011 in Boston, MA.
-
14:04
»
Packet Storm Security Misc. Files
The 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET) Call For Papers has been announced. Paper submissions are due Tuesday, January 25, 2011, 11:59 p.m. PST. This workshop will take place March 29, 2011 in Boston, MA.
-
-
6:16
»
Hack a Day
You’ll probably lose your appetite after watching part one and part two of Artisans Asylum as they Take on the Machine. Based around the Wallace and Gromit “automated” set of contraptions, the team from Boston set out to make their own breakfast machine. Of course, with only three weeks to work it didn’t exactly turn [...]
-
-
21:03
»
SecDocs
Authors:
Tyler Shields Tags:
BlackBerry phone Event:
Source Conference Boston 2010 Abstract: Spyware has become a primary tool used in the capture of personal and private data. Surreptitiously installed on the computing system of a target victim, spyware can capture, log, monitor, and exfiltrate any data that the spyware owner desires. Your phone holds all of the same personal information as your computer, only in a smaller form factor. While a number of "vendors" sell Blackberry spyware, until now only a limited number of public code examples exist. Real time capture of SMS messages, Emails, and phone call logs are a fraction of the features to be presented. Full source code to the spyware will be released. Definition of the potential risk and threat involved in mobile related spyware is a requirement to implementation of security mechanisms. Finally, functional reference code has been presented and released that can be used in a positive manner. Until then only shady web sites selling compiled versions of the code for $100 - $400 annually existed. This is a future looking presentation that will help others learn about the security of their personal data in the time of mobile devices.
-
21:03
»
SecDocs
Authors:
Randolph Barr Tags:
cloud computing Event:
Source Conference Boston 2010 Abstract: Cloud solutions are entering mainstream with vendors of all sizes flocking to build and dliver services in the cloud due to the economic and technical advantages of this model gained at all levels. This new paradigm, however, requires a new thinking in security, auditing and compliance. Cloud Providers are required to protect their customer data due to regulatory and customer requirements. Implementing those controls required by customers can lead towards a competitive advantage, which both providers and users of the cloud benefit from. Every company has their own practice in evaluating the security posture of a cloud provider. In each case, there are opportunities for a cloud provider to share information that will eventually reduce the scope or eliminate the requirement for an onsite review. The goal is to work with the provider to be more transparent about their security practice and develop a relationship that would allow the SaaS provider to act as an extension to the customer's security team.
-
21:03
»
SecDocs
Authors:
Dan Kaminsky Tags:
web application web Event:
Source Conference Boston 2010 Abstract: The web is remarkably difficult to secure. Browsers are ornery, powerful creations, and we security people demand all sorts of things of developers to make them behave. By in large, the developers ignore us. Our asks, they say, are too expensive. Rather than just guilting them, could we make better asks -- of both web developers, and browser manufacturers? Possibly. In this talk, I explore a couple of interesting techniques for easily mitigating entire classes of Cross Site Scripting and Cross Site Request Forgery attacks. They aren't perfect, but they work, and more importantly they represent a new class of ask for browser manufacturers that might even be implementable past the genuinely more powerful forces of application compatibility, performance, and developer compliance. I will also discuss Treelocking, a generic mechanism for mitigating injections into protocols as diverse as SQL, LDAP, XML, and JSON.
-
0:54
»
SecDocs
Authors:
Vikram Phatak Tags:
antivirus vulnerability IDS Event:
Source Conference Boston 2010 Abstract: What you don’t know can hurt you. NSS Labs will share research findings from our analysis of the attack and potential variants, along with a breakdown of security vendor approaches to protecting against these types of threats. Includes discussion of what security vendors are not covering that could prevent the next big attack. Vikram Phatak is CTO and leads the research team at NSS Labs. Mr. Phatak has over 15 years of experience in computer, network, and information security. Prior to joining NSS Labs, Mr. Phatak was CTO of Trustwave, founded and was CTO for an intrusion prevention product company, was chief security architect for a Fortune 500 company, and started one of the first Internet service providers in 1994.
-
-
4:54
»
SecDocs
Authors:
Robert Clark Tags:
law Event:
Source Conference Boston 2010 Abstract: This presentation reviews the important legal opinions and law review articles of the past year that affect privacy as it relates to the internet and computer network operations. We will review the cases and legal commentaries on those issues that most affect your conduct and business operations. This presentation is strongly audience driven and it quickly becomes an open forum for questions and debate. This year the past key precedents have involved: work place monitoring and searches; compliance with State data breach laws and jurisdiction; employer's right to monitor their computer network systems and employees' rights; acceptable use policies; banners; user agreements; personally identifiable information and IP addresses; what is personally identifiable information; privacy and social networks; privacy rights in information turned over to a third party; theft of proprietary information and the CFAA; and, web site policies and notice.
-
4:52
»
SecDocs
Authors:
Erez Metula Tags:
rootkit Event:
Source Conference Boston 2010 Abstract: This presentation introduces an underestimated threat of application level rootkit attacks on managed code environments, enabling an attacker to change the language runtime implementation, and to hide malicious code inside its core. We'll be covering generic methods of malware development (rootkits,backdoors,logic manipulation, etc.) for application VM such as Java, .NET, Dalvik, and other managed code platforms by changing their internal behavior. The presentation will include attack scenarios and demos of information logging, reverse shells, backdoors, encryption keys fixation, and other nasty things. This presentation will introduce the new version of "ReFrameworker" (previously known as .NET-Sploit) - a generic language modification tool, that can be used to implement the application level rootkit concept. More information on Managed Code Rootkits (MCR) can be found here: http://www.AppSec.co.il
-
4:48
»
SecDocs
-
4:43
»
SecDocs
Authors:
Josh Corman Tags:
software development Event:
Source Conference Boston 2010 Abstract: Software has become modern infrastructure. Though we have made progress with tools and frameworks in the security community, too few outside of security recognize the security context of this digital infrastructure and the awesome responsibility that comes with developing it. Rugged is a meme - a contagious value set aimed to reach the hearts and minds of the masses who create software, purchase software, and depend upon software. We've been working hard fighting the heads of the Hydra. It's time to fight smarter and better focus on the heart. Digital infrastructure needs software that is not only agile, but also Rugged. Rugged software is capable of withstanding hostile actions and hostile environments while delivering business value. Rugged Software Development provides a philosophical foundation for regularly and consistently creating resilient, survivable software. Rugged guides software developers to create better software without the draconian notion of security police breathing down their necks. Rugged is a value system, not a compliance system. In a technology-dependent world, software needs to be Rugged. Read the Rugged Manifesto at www.ruggedsoftware.org for more information. Rugged is just beginning.
-
-
21:03
»
SecDocs
Authors:
Wendy Poland David Lenoe Tags:
vulnerability Event:
Source Conference Boston 2010 Abstract: Ubiquity can come at a price: Experience has shown that the more popular and widely deployed an application is with end-users, the more likely that application will become a target for attackers and good security researchers alike. Available in 34 languages, on all major platforms, and just about every desktop/laptop, it’s no surprise that Adobe Reader has made the lists of top applications targeted in 2010. Join this session, and hear David Lenoe and Wendy Poland, members of the Adobe Product Security Incident Response Team (PSIRT), talk about the challenges of having the bullseye on your back and the hard lessons learned in the process. In looking at a recent zero-day vulnerability, Dave and Wendy will offer insight into Adobe’s product security incident response, the process of acting on vulnerability reports, and the analysis that goes into developing a schedule for a fix. Live and learn—you could be taking center stage before you know it!
-
21:03
»
SecDocs
Authors:
Anton Chuvakin Branden Williams Tags:
PCI DSS Event:
Source Conference Boston 2010 Abstract: We will go through some interesting and teaching examples of PCI DSS controls implemented right and wrong.
-
21:03
»
SecDocs
Authors:
Jon Oberheide Tags:
vulnerability kernel exploiting Event:
Source Conference Boston 2010 Abstract: As userspace applications and services become increasingly hardened against traditional memory corruption exploits, operating system kernels have become a source for abundant exploitation opportunities. In particular, the Linux kernel has recently suffered a bout of severe and high-profile vulnerabilities and drawn ire from the security community for it's mishandling of bugs with known security impact, resulting in a Pwnie award for "Lamest Vendor Response". Given the importance the Linux operating system plays in many enterprise environments, it is necessary to understand the strengths and weaknesses of its kernel's security. In this presentation, we'll explore these strengths and weaknesses by diving deep into the exploitation of vulnerabilities in the Linux kernel. Using real-world vulnerabilities and exploits, we'll detail the traditional classes of kernel vulnerabilities such as control flow hijacking (via stack smashing and SLAB/SLUB/SLOB allocator corruption), invalid userland memory accesses (including NULL pointer dereferences), and information leakage. In addition to traditional bug classes, we'll cover the semantic vulnerabilities inherent in complex operating systems that require deep knowledge of kernel internals to identify and exploit subtle conditions (e.g. desynchronization in the VM subsystem), some of which have previously thought to be unexploitable. We'll also explore the attack surface of the Linux kernel and enumerate the most common vulnerability entry points using historical data. Lastly, we'll release several tools assisting vulndev/auditing and discuss the effectiveness of deployed countermeasures and best current practices for securing the Linux kernel.
-
1:29
»
SecDocs
Authors:
Alex Stamos Tags:
cloud computing Event:
Source Conference Boston 2010 Abstract: Cloud computing has become an irresistible force in the IT industry, due to the unbeatable efficiencies of warehouse-scale computing infrastructures and the desire of businesses to reduce their CapEx on IT hardware. The most pressing concerns still holding back companies from moving into a public or semi-private cloud environment are security and compliance, and corporate security groups are under pressure to provide solutions that allow their enterprises to benefit from cloud computing technologies while appropriately managing risk. In this talk, we will review several different cloud computing models and discuss the breakdown of security responsibility in each. We will then deconstruct the currently accepted models of enterprise IT and identify which security controls truly matter for most organizations and which are leftovers from an earlier era of computing. The speaker will then propose several architectures that are implementable in current public cloud providers that provide equivalent or better assurance than traditional IT stacks, and discuss which risks can and should be accepted as part of the new computing paradigm. The talk will be aimed at the system architecture, risk management and CIO levels of organizations, and will be best absorbed by attendees with enterprise architecture experience.
-
1:02
»
SecDocs
Authors:
Moxie Marlinspike Tags:
data mining privacy Google Event:
Source Conference Boston 2010 Abstract: A lot has changed since discussions around digital privacy began. The security community won the war for strong cryptography, anonymous darknets which presumably make the eradication of information impossible have been successfully deployed, and much of the communications infrastructure has been decentralized. These strategies were carefully conceived while planning for the most dystopian visions of the future imaginable, and yet somehow they've fallen short of delivering us from the most pernicious privacy threats today. Rather than a centralized state-backed database of all our movements, modern threats to privacy have become something much more subtle, and perhaps all the more sinister. This talk will explore these evolving trends and discuss some interesting solutions in the works.
-
0:16
»
SecDocs
Authors:
Timothy Brueggemann Tags:
security data retention Event:
Source Conference Boston 2010 Abstract: Protection of Highly Sensitive Personally Identifiable Information (HSPII) data is essential to every organization and requires a well-developed set of rules and processes to be enforced by the Information Technology (IT) organization. These rules and processes must be incorporated into a formal HSPII protection program that is understood by all IT workers in the organization. The purpose of this study was to examine the IT employee understanding of HSPII programs. The assumption is made that the security of the vast amount of HSPII data stored on organizational systems is directly related to the understanding level of the HSPII programs implemented . There were significant correlations between each of the six demographic variables examined in this study as they related to understanding. The results of this study provide a realistic view of the IT professional's understanding of their responsibility and ability in protecting HSPII data.
-
-
4:59
»
SecDocs
Authors:
Adam Meyers Tags:
reverse engineering Event:
Source Conference Boston 2010 Abstract: This session will introduce the concepts of exploit reverse engineering in support of incident response and/or post mortem analysis. Attendees will learn the tools and techniques required to take malicious exploit code and understand what it is targeting and how to identify and prevent future success against the enterprise. This will include a live demonstration of the techniques to re-enforce how to reverse exploit code.
-
4:57
»
SecDocs
Authors:
Bill Blunden Tags:
rootkit Event:
Source Conference Boston 2010 Abstract: While there are a multitude of battle-tested forensic tools that focus on disk storage, the domain of memory analysis is still emerging. In fact, even the engineers who work at companies that sell memory-related tools have been known to admit that the percentage of investigators who perform an in-depth examination of memory is relatively small. In light of this, staying memory resident is a viable strategy for rootkit deployment. The problem then becomes a matter of remaining inconspicuous and finding novel ways to survive a system restart. In this presentation I’ll look at rootkit technology that tackles both of these issues on the Windows platform.
-
4:54
»
SecDocs
Tags:
vulnerability Event:
Source Conference Boston 2010 Abstract: Vulnerability management - how tough can it be? Vulnerabilities are identified, categorized, and then (hopefully) fixed through patches or upgrades. Simple enough, right? Actually, the process is far from simple, as anyone who has worked in the area of vulnerability management can tell you. Identifying vulnerabilities through a slew of vendor alerts, vulnerability databases, and third-party references is only the first step. From there, solutions must be identified, fixes obtained and tested, patch and upgrade deployments scheduled, and then monitor the whole mess... until the next patch cycle comes around so you can start the process all over again. This panel will discuss various aspects of the vulnerability management cycle: the assignment of common names for easy identification, using available information to gather appropriate remediation measures, pros and cons of patch testing, and how vulnerability management can be improved as an overall process. Join panelists Chris Wysopal of Veracode, Steven Christey and Bob Martin of MITRE Corporation, Jonathan Klein of Broadridge Financial Solutions, Kelly Todd of Tenable Network Security and moderator Carole Fennelly of Tenable Network Security as they look at vulnerability management: what works, what doesn't work, and what can be done to help improve processes, procedures, and remediation techniques
-
4:49
»
SecDocs
Authors:
Chris Clark Townsend Ladd Harris Tags:
web application law Event:
Source Conference Boston 2010 Abstract: WebOS developers work with a large spectrum of web and system languages, including JavaScript, Java, and C++. WebOS is the first mobile platform that primarily uses web languages; however, we believe that they will become more common as platform vendors court the massive web developer community. But, web developers do not understand how the subtleties of how the mobile security model differs from that of the web. For example, WebOS does not enforce the Same Origin Policy (SOP) and some valuable user data is shared. Consequently, minor web application vulnerabilities have a much larger impact on WebOS phones. Almost all WebOS applications run as JavaScript within a WebKit process. However, the same privileges do not apply to all applications. Attackers can use attacks, such as Cross-Site Scripting or buffer overflows, to compromise low-privileged applications and then exploit WebOS unique vulnerabilities classes, such as Card Parameter Injection, to compromise system services and elevate privileges. This presentation will show how to find and exploit these vulnerabilities, a topic which has never been discussed in a public forum. Combined, the presenters published the first WebOS security information and responsibly disclosed over ten WebOS vulnerabilities. Discovering these vulnerabilities required developing innovative security testing techniques. For example, we created a WebOS specific fuzzing agent that uses JavaScript to monitor and detect application failures. We plan on releasing these tools at SOURCE Boston.
-
-
9:48
»
SecDocs
Authors:
Dino Dai Zovi Tags:
buffer overflow exploiting Event:
Source Conference Boston 2010 Abstract: This session will demonstrate the practical applications of return-oriented techniques for exploit payloads against systems with modern exploit mitigation technologies such as Microsoft's DEP and ASLR as well as the iPhone's non-executable memory and code signing. Most importantly, this session will demonstrate that for defenders it is more important to prevent malicious computations than injection of malicious code. For attackers it is becoming more important to control ESP than EIP.
-
8:45
»
SecDocs
Authors:
Steve Christey Tags:
vulnerability Event:
Source Conference Boston 2010 Abstract: In middle of the 1990's, the disclosure of vulnerabilities frequently occurred on a need-to-know basis. Details were rarely available. Vendors took ages to patch. There was no Full-Disclosure mailing list, no blogs, very few public vulnerability databases, no responsible disclosure policies, and scant media attention. The handful of people who cared about security vulnerabilities at all were mostly concerned with a small number of products and vendors. Then commercial vulnerability scanning tools and IDSes hit the market just about when the Web boom happened, and suddenly everybody started writing and distributing software.
-
8:33
»
SecDocs
Authors:
Riley Hassell Tags:
Windows Event:
Source Conference Boston 2010 Abstract: At the core of the Microsoft Windows operations system is the Object Manager. This subsystem is one of the most used and also least documented subsystems within Microsoft Windows. We use it for every action we perform. The management of all files, registry keys, shared memory, LPC ports, and many other object types are handled by the Object Manager. During this presentation we will discuss this subsystem in depth and how it affects the security of Windows applications. A new tool will be released, ObjectTrace, that can be used to enumerate the Windows objects that are created insecurely by targeted applications. After completing the introduction other advanced topics will be covered including new privilege escalation techniques and hardening strategies. While the methodologies are focused to Microsoft Windows they can be applied to any operating systems.
-
-
3:55
»
SecDocs
-
3:45
»
SecDocs
Authors:
Nick DePetrillo Don Bailey Tags:
GSM phone locating Event:
Source Conference Boston 2010 Abstract: Using new resources in concert with new and old telephony tricks, the speakers have been able to successfully track users of GSM mobile phones without direct access to SS7. Though, initially, the granularity of the location information was not fine enough, the speakers have been able to develop effective techniques to supplement the location data. Augmenting this attack is the ability to learn a target user's mobile phone number without the user's knowledge, enhancing the passive nature of the attack. The speakers will elaborate on new real world attack vectors that make these threats both credible and practical. GSM location data in the US is private. However, unscrupulous providers have exposed this data to an international audience, allowing anyone access to this information for a price. The researchers will elaborate on the technical details of how and why the above attacks work, what solutions are possible, and how users can protect themselves.
-
3:41
»
SecDocs
Authors:
Ron Gula Tags:
network IDS Event:
Source Conference Boston 2010 Abstract: n this talk we will examine the problem of detecting authorized penetration testers from a variety of technical and political aspects. One on hand, we need to monitor and protect from many threats, but politically, we also don't want to have the pen test team make your security monitoring, your SIM or your NIDS look like a joke. Attendees will quickly realize that the tips and insights for making better use of firewall logs, netflow, systems logs and so on can and should be applied to monitoring for real bad guys as well.
-
-
21:03
»
SecDocs
Authors:
Dan Crowley Tags:
Windows exploiting Event:
Source Conference Boston 2010 Abstract: In Windows systems, path and filename normalization routines have some interesting quirks. One file can be referred to with many different filepaths; some are well known, and some are not. The lesser known ways to refer to files are not often considered when designing security mechanisms. By referring to files in these strange ways one can, in many circumstances, cause unexpected behaviour in systems which do not account for alternate prefixes, aliases and mangled versions of filenames. In this presentation, I will show some of these quirks with a live demonstration on real products and how techniques based on these quirks can be used to bypass filters and access control mechanisms, evade IDS detection, alter the way that files are handled and processed, and make brute force attacks to enumerate files easier. This presentation will also feature the release of the a new tool.
-
-
21:13
»
SecDocs
Authors:
L. Aaron Kaplan Tags:
GPS locating Event:
Chaos Communication Congress 26th (26C3) 2009 Abstract: For a long time we warned of the perils of full scale, permanent tracking of persons by the state or corporations. Cell phones, data retention laws and other surveillance techniques close the freedoms of the net. But none can be as pervasive as the permanent location updates sent to Apple and Google via your Smartphone and laptop. With a precision of 10 m to 20 m, BSSID based location tracking has become the ultimative and global tracking of persons. This talk will describe weaknesses and trends in current location tracking methods. The internet learned to locate you in 2009! Skyhook Wireless is a small company focusing on providing high quality location based services to the world. To quote from their webpage: "Skyhook Wireless' XPS is the world's first true hybrid positioning system. Combining the unique benefits of GPS, Cell Tower triangulation and Wi-Fi Positioning, mobile consumers no longer have to wait minutes for a response or cope with inaccurate location." Customers include Apple (iPhone, Snow Leopard uses Skyhook Wireless) and Google. While most people don't realize it, the BSSIDs that their Smartphone "hears" gets transmitted to a single company in Boston, Mass. The cell phone tower identifier gets transmitted and if anything fails, they will revert to simple IP Geolocation DBs. The talk will focus on a few techniques for assigning GPS positions to you and tries to estimate trends and implications for society, law and law enforcement issues.