****************************************
***BEGIN THOTCON TRANSMISSION***********
What: THOTCON 0x1
When: Friday, April 23, 2010
Where: TOP SECRET
*** ABOUT ******************************
THOTCON (pronounced \ˈthȯt\ and taken fr
om THree - One - Two) is a new small ven
ue hacking conference based in Chicago I
L, USA. This is a non-profit, non-commer
cial event looking to provide the best c
onference possible on a very limited bud
get.
*** SPEAKERS****************************
We are pleased to announce that the foll
owing people will be speaking at THOTCON
0x1:
David "VideoMan" Bryan
TITLE: Hacking with GNU Radio
This presentation will focus on the requ
irements for GnuRadio, cost, code, and r
adio technology basics. I will also pre
sent some of attacks that have been crea
ted using the GnuRadio, as well as my ow
n research from a successful hack of a p
roprietary Multiple Address System (MAS)
SCADA network, and a quick demo of the
GnuRadio in action.
Videoman has 10 years of experience doin
g computer security. He has worked for l
arge enterprise financial institutions t
o secure their networks. Currently a com
puter security consultant, he enjoys wor
king for NetSPI's clients to help them r
educe their risks. In his spare time he
co-manages the local DefCon Group (DC612
) and serves on the OWASP MSP board, add
itionally he helps to run the network at
DefCon. He also likes to brew beer, and
bike the many miles of pathways in Minn
esota.
Michael Coates
TITLE: How Everyone Screws Up SSL
SSL has taken many hits over the past ye
ar. From the MD5 rogue certificate creat
ion to SSL Strip, it seems that SSL shou
ld be dead and gone. However, SSL is sti
ll one of the fundamental security patte
rns used to protect data in transit. Unf
ortunately, SSL is widely misunderstood.
It's time to take a breath and make sur
e everyone knows what we are really doin
g when we implement SSL. This will be an
advanced talk that will focus on unders
tanding the entire lifecycle of SSL. How
does it work, what are the weaknesses a
nd what's going on with the recent SSL a
ttacks? We will address issues such as:
How does SSL really work? Is redirecting
from HTTP to HTTPS safe? Does the landi
ng page need to be SSL? How bad are thos
e browser warnings? What tools are avail
able and how do I test my server's SSL c
onfiguration? Should I be concerned abou
t the MD5 rogue certificate or SSL strip
? These questions and more will be answe
red. This presentation will not be a bas
ic intro to SSL talk. This will be 45 mi
nutes of drinking from the SSL security
fire hose. It is intended for security a
udiences already familiar with the basic
s of SSL and encryption.
Michael Coates is the lead Web Security
Engineer for Mozilla with the responsibi
lity of protecting all of Mozilla's web
applications. Prior to Mozilla, Michael
spent many years in consulting and perf
ormed penetration assessments, security
code reviews, and security training sess
ions for leading corporations worldwide.
Michael is a contributor to the OWASP T
op 10, creator of the OWASP TLS Cheat Sh
eet and the OWASP AppSensor project and
holds a Masters Degree in Computer Secur
ity from DePaul University.
Luiz "effffn" Eduardo
Title: 30K Foot Look at WiFi
Inflight WiFi is really nothing new, but
, it's a growing thing in the US in the
past couple of years. This talk will be
about the latest findings in this area.
Luiz "effffn" Eduardo is your everyday
security professional, with a strong net
work and WiFi background. He's a regular
speaker at security cons like DefCon, h
iTB Malaysia, Toorcon, Shmoocon, H2HC, L
ayerone and others. It's somewhat known
for having implemented WiFi at some of y
our favorite security cons and is one of
the organizers of a Brazilian security
conference YSTS (you sh0t the sherfiff).
Frank^2
TITLE: Trolling Reverse-Engineers w/Math
Did you ever sit around in your trigonom
etry class in high school wondering why
you were learning anything about sinewav
es or why they were even useful enough t
o warrant learning to begin with? Math i
s actually /pretty goddamn cool/. It may
be irritating to solve for Y in all tho
se formulas consisting of variable-salad
, but solving for Y can be helpful in th
e world of binary obfuscation. This talk
will attempt to teach a few techniques
that will allow for the application of a
rbitrary mathematical formulas (such as
sinewaves) to create unique, polymorphic
sequences of assembly code. The weaknes
s, strengths, pitfalls of assembly intri
cacies and potential implementations of
such obfuscation techniques will also be
covered.
frank^2 is a bottom-feeding script-kiddi
e who has made numerous attempts at perf
orming DDoS attacks with WinNuke. Freque
ntly, he can be seen working Santa Monic
a Boulevard, informing everyone he walks
by of the services he'll provide and at
tempting hard-sells by informing people
of the cheeseburgers he's got. He uses t
his coke-addled income to purchase Rbot
herds, gathering infected nodes like an
over-hyped hip-hop artist gathers bling.
(The inability to do anything useful wi
th said bling also applies.)
Rob Havelt
TITLE: War Driving for Warehouses
Focusing on mostly industrial areas with
warehouse facilities that have been aro
und at least 10 years can be quite enlig
htening when you lift the veil and wardr
ive for legacy 802.11 FHSS. This talk wi
ll show you a functioning War Drive Rig
for this wireless technology in action,
and provide some Wardrive maps of comple
tely open networks in the Milwaukee/Chic
ago North Burbs to show how relevant thi
s technology still is.
Rob Havelt is the Practice Manager for P
enetration Testing at Trustwave's Spider
Labs, the advanced security team respons
ible for Penetration Testing, Applicatio
n Security, and Incident Response for Tr
ustwave's clients. Formerly a bourbon-fu
eled absurdist, raconteur, and man about
town, currently a sardonic workaholic o
ccasionally seeking meaning in the finer
things in life. When Rob isn't working w
hich is rare, he's usually trying to mak
e the perfect cup of coffee, or obsessin
g over things like surrealist Czech vamp
ire movies from the seventies.
Ryan Jones
TITLE: Top 5 Ways in a Data Center
This speech would go over the top 5 most
common ways to breach the physical secu
rity of a data center. This information
has been gathered by the speaker over th
e course of his career as a physical pen
etration tester/red teamer. Topics cover
ed will include social engineering, lock
picking, and common construction flaws.
Example of how these vulnerabilities we
re and can be used to attack a data cent
er physically as well as solutions to th
ese issues will also be covered.
Ryan Jone has worked in the information
security field for over 14 years. His ma
in focus has been on network, applicatio
n, and physical security assessments and
he has worked in these capacities with
over 1000+ clients for a variety of busi
ness sectors with the primary the emphas
is being on the government, banking, and
medical industries. His work included t
esting web applications, network penetra
tion testing, physical penetration testi
ng, physical security assessments and pl
anning, social engineering testing as we
ll as designing information security rem
ediation programs for these clients. He
has spoken at at various events and conf
erences, including the Defcon Skybox tal
ks. He was a cast member and technical p
roducer of the 2007 TV show "Tiger Team"
and is also currently the co-host of th
e security podcast "Exotic Liability." H
e is currently a Senior Security Consult
ant on the Application Security Team of
Trustwave's Spiderlabs.
Rafal Los
TITLE: Dr. Evil's Guide to Web 2.0
You have no choice but to deal with the
�Web 2.0 phenomenon� � but most people h
ave no idea how dangerous these technolo
gies are. Web 2.0 is old technologies h
eld together with duct tape and implicit
trust, and exploiting them often doesn�
t involve a whole lot of technical knowl
edge � In this talk you�ll see and learn
the concepts behind testing, manipulati
ng, and penetrating the new �Web 2.0� te
chnologies. There will be demos, code s
nips, and analysis � Come learn why the
new wave in web application technologies
, based on end-user interaction and incr
eased functionality is even easier to �h
ack� than you think.
Rafal is 16+ year veteran of the IT worl
d, working as a penetration tester, rese
archer then consultant, architect and In
formation Security Officer at companies
ranging from SMBs to a stretch with a Fo
rtune 5.
Nelson Murilo
TITLE: Beholder WIDS Tool
Although it's not something new, network
administrators are still facing old pro
blems. One of these problems is to be ab
le to detect rogue and/or fake access po
ints in their networks and surroundings.
The solutions available are mostly comme
rcial and/ or proprietary, but still no
open-source tool. Now there is: Beholder
. The talk will include a brief introduc
tion on the general state of the commerc
ial WIDS and will be mostly focused on t
he Beholder project. Beholder is an C la
nguage opensource tool available (for no
w) for linux platforms, it can be used f
or whatever 802.11 technology the nic ca
rd supports and it isn't driver dependen
t, run in all available linux wifi drive
r.
Nelson Murilo has been a Network Securit
y Analyst since 1992. He is the author o
f two network security books in Portugue
se and a regular contributor of Brazilia
n Computer Emergency Response Team publi
shed papers (security guides and technic
al papers). Nelson is the author and co-
author of open source security tools lik
e chkrootkit and Btsearch. Regular speak
er in Brazil and international conferenc
es and is one of the organizers of a Bra
zilian security conference YSTS (you sh0
t the sheriff).
Kevin A. Nassery
TITLE: Where did those damn packets go?
Passive network monitoring has been a fo
undational to network security architect
ures for over a decade. IDS, DLP, link
capacity planning, and network troublesh
ooting usually relies on having full vis
ibility into in-flight network data. Fo
r years we sat back and enjoyed the fact
that our Pentium computers could easily
outrun our measly WAN speeds and access
ing the traffic was a simple matter of c
onfiguring a SPAN port on a switch. Toda
y we face the challenge an uphill battle
when 10GigE+ interconnects are common p
lace, virtualization platforms are keepi
ng data off our switch ports, and more a
nd more of our data is headed out our eg
ress links to the cloud. This talk will
discuss today�s challenges, provide an
overview of new product classes that can
help us stand up to those challenges, a
nd what we need to do to keep our heads
above water moving forward.
Kevin A. Nassery is a hands-on technical
architect, who has been an active Unix
systems, network, and security engineer
and consultant for more than a decade. A
fter serving for more than four years as
principal infrastructure architect for
a major online presence, he recently ret
urned to his passion of security consult
ing. At present, he is a RHCE, CISSP, an
d holds an MS from Depaul University in
Computer, Information, and Network secur
ity. He is currently a senior security c
onsultant with Consciere LLC.
Cris Neckar and Greg Ose
TITLE: Forensic Fail
Forensic analysis is one of the least de
veloped areas of computer security. Inve
stigations are often handled by individu
als withlittle more than a software cert
ifications and very few investigators ha
ve detailed knowledge of the inner worki
ngs of the software and systems they ana
lyze. A checklist of search terms and a
copy of EnCase is often sufficient for c
ases involving less knowledgeable defend
ants, but what happens when a skilled at
tacker plans for the eventuality of fore
nsic analysis? This talk will discuss th
e process and failings of forensic analy
sis as it is commonly performed today. W
e will present the details of techniques
which can be used to undermine modern f
orensic analysis. These techniques will
be outlined through detailed samples imp
lemented in a Linux rootkit along with i
mprovements that could be made to the fo
rensic process.
Cris Neckar is currently a jobless bum b
ut will be starting on Google's security
team in May. Until recently he was a Se
nior Application Security Consultant at
Neohapsis Inc. where he specialized in a
pplication assessment, vulnerability res
earch, and exploit development. In this
capacity Cris led penetration tests and
whitebox assessments on high profile sof
tware, web applications and embedded dev
ices as well as forensic malware analysi
s. Cris also spends his time performing
and publishing research into new attack
techniques. As an adjunct professor for
DePaul University's College of Digital M
edia in Chicago, Cris developed and teac
hes one of the first graduate level cour
ses on the technical details of applicat
ion assessment and exploit development.
As an Application Security Consultant at
Neohapsis Inc., Greg specializes in app
lication security assessment, internal a
nd external penetration testing, as well
as performing research on topics rangin
g from kernel-level exploitation to web
application vulnerabilities. Prior to jo
ining Neohapsis, Greg developed a lightw
eight security framework for mobile devi
ces and implemented a secure boot and re
-imaging infrastructure to enforce data
integrity.
Tim Sally
TITLE: Virus Writing Techniques
The state of software security in early
1990 was abysmal; vendors relied on secu
rity through obscurity and were slow to
patch or improve the security of their p
roducts. This changed with full disclosu
re, which forced software vendors to ado
pt effective security policies and pract
ices. The antivirus industry of today lo
oks much like the software industry of 1
990. The effectiveness of existing solut
ions is stagnant or decreasing and vendo
rs mislead their customers about the cap
abilities of their products. This talk e
xplores the idea of bringing full disclo
sure to the antivirus industry in an att
empt to jumpstart innovation and improve
the effectiveness of antivirus. We will
examine modern virus writing techniques
and explore the implementation of a new
metamorphic engine. We will show that t
he metamorphic engine is capable of evad
ing modern antivirus and we will make a
few recommendations on how detection rat
es could be improved.
Tim Sally is a computer science undergra
duate at the University of Illinois, Urb
ana-Champaign. He has worked at a Depar
tment of Energy funded research center a
nd at a large defense contractor. His s
tudies are fully funded by the National
Science Foundation.
Jayson E. Street
TITLE: Stratagem 1 - 瞒天过海
There are new threats arising everyday.
The problem is there has been a vulnerab
ility in the system that has not been pa
tched since the first computer was creat
ed Humans! As the network perimeter hard
ens and the controls on the desktop tigh
tens. Hackers are going back to the basi
cs and getting through the firewall by g
oing through the front door. They are by
passing the IPS and IDS simply by bypass
ing the receptionist. We look at this to
pic with a different viewpoint. We look
at the history as well as the culture an
d keep it offbeat with showing how 1st c
entury strategies can still be used to b
reak into 21st century networks.
Jayson E. Street is an author of the boo
k "Dissecting the hack: The F0rb1dd3n Ne
twork" from Syngress. He is well versed
in the ten domains of Information System
s security defined by the International
Information Systems Security Certificati
on Consortium ([ISC]2). He specializes i
n intrusion detection response, penetrat
ion testing, and auditing. He also has a
working knowledge of the implementation
and administration of major firewalls,
vulnerability scanners, and intrusion de
tection systems. Jayson has created and
conducted security awareness training fo
r a major Internet bank and his consulta
tion with the FBI and Secret Service on
attempted network breaches resulted in t
he capture and successful prosecution of
the criminals involved. He has also spo
ken in America, Belgium, China and at se
veral other colleges and conferences on
a variety of Information Security subjec
ts and is on the SANS GIAC Advisory Boar
das well as a mentor for SANS. On a hum
orous note he was chosen as one of Time'
s persons of the year for 2006.
***END THOTCON TRANSMISSION*************
****************************************
THOTCON INFOBLOX v.1 ESR2
60 RAM AVAIL
Ready.
© 2010 THOTCON NFP