MG_6785.jpg
In the final slot before the last coffee break of the day, Michael Thumann of ERNW presented an extremely interesting paper on How to Rate the Security of Closed Source Software ... In the final slot...
View ArticleMG_6752.jpg
In addition to being written in Python, this new version now features a new scan engine (still in progress) and improved cross correlation between L7 and the network layer. In addition to being...
View ArticleMG_6755.jpg
In the X-Probe NG presentation, Fyodor Yarochkin was stood up again back again to talk about the latest iteration of their remote ICMP fingerprinting tool (Ofir Arkin was originally supposed to...
View ArticleMG_6747.jpg
"The Mega - everything you need to get started with Arduino hackery plus it's compatible with most shields designed for the Arduino Duemilanove or Diecimila. Simply connect it to a computer with a USB...
View ArticleMG_6741.jpg
In the final lab session of the day, our very own Barry 'fish' van Kampen gave a hands on introduction to the wonderful world of Arduinos and hardware hacking In the final lab session of the day, our...
View ArticleMG_6739.jpg
"DMA attacks have been well documented since 2004 however they're always effective and efficient and make for a perfect targeted attack" "DMA attacks have been well documented since 2004 however...
View ArticleMG_6729.jpg
Damien Aumaitre and Christophe Devine of Sogeti ESEC put together a really cool presentation in which they pwned a fully patched Windows 7 x64 laptop merely by sticking in a PCMCIA card! Damien...
View ArticleMG_6734.jpg
WIth lunch out of the way it was time to move on to some Windows 7 kernel subversion attacks WIth lunch out of the way it was time to move on to some Windows 7 kernel subversion attacks
View ArticleMG_6722.jpg
Folks from Sogeti witnessing 'the hacker' in its natural habitat... Folks from Sogeti witnessing 'the hacker' in its natural habitat...
View ArticleMG_6718.jpg
*nomz* Are you going to *nomz* watch the *nomz* traveling hacksmith talk? *nomz* Are you going to *nomz* watch the *nomz* traveling hacksmith talk?
View ArticleMG_6714.jpg
Muomuo trying to work with tech while Fish and the Moan are discussing a gw takeover Muomuo trying to work with tech while Fish and the Moan are discussing a gw takeover
View ArticleMG_6706.jpg
"Oh noeessss I deleted the master print file for the police handcuffs!!!" "Oh noeessss I deleted the master print file for the police handcuffs!!!"
View ArticleMG_6705.jpg
Barry 'fish' van Kampen with Muomuo at the Random Data booth Barry 'fish' van Kampen with Muomuo at the Random Data booth
View ArticleMG_6689.jpg
"Instead of looking for characters xxxxxxxxx that makes xxxxxxxxx sha1 begin with 20 zero bits, we are looking for 16 strings {s₁,s₂ s₁₆} that prepended to...
View ArticleMG_6686.jpg
In Track 1, Dumitri Codreanu from Bit Defender outlined shortcomings in Microsoft's Post Mark Validation protocol and how to abuse the hash generation mechanism using GPUs! In Track 1, Dumitri...
View ArticleMG_6670.jpg
"The process remains the same - File a bug at http://bugzilla.mozilla.org, attach your PoC code, contact security@mozilla.org, participate in the solution and GET PAID!" "The process remains the same...
View ArticleMG_6682.jpg
Most notably were the increase in pay outs for bugs submitted from USD500 to USD3000! Naisssss Most notably were the increase in pay outs for bugs submitted from USD500 to USD3000! Naisssss
View ArticleMG_6677.jpg
Immediately following Mariano Nunez's SAPRouter presentation, Chris Hofmann, Director of Engineering at Mozilla presented an inside look at Firefox 4 as well as changes to Mozilla's Bug Bounty...
View Article
More Pages to Explore .....