eye Title Creator

Community Video 783 783 Recon 2011 Internet Filtering by Jacob Appelbaum by Recon movies eye 783 favorite 1 comment 0

Internet filtering Many countries in the world perform extensive network surveillance, filtering in the form of website blocking or protocol specific censorship; recently many networked authoritarian events in the Middle East/North Africa and across most of the world have come to light. During some specific political uprisings came increased invasive filtering events. I've run a series of tests in many of these countries, during these events with the specific purpose of identifying specific...

Topic: Recon, Jacob Appelbaum, Internet Censorship, Tor, Recon 2011,



Community Video 571 571 Recon 2011 RFID Hacking by Milosch Meriac movies eye 571 favorite 0 comment 0

RFID Hacking In the last years RFID did become a ubiquitous part of our life. We are confronted daily with RFID applications in access control systems, as micro-payment, in electronic IDs and public transportation. Despite of the huge impact, still very little is known on many systems out there - questions on security and privacy features remain unanswered by most system vendors. This talks explains how black box RFID systems can be analyzed and reverse engineered to understand the protocols...

Topic: Recon, Milosch Meriac, RFID, RFID Hacking, Hacking, OpenPCD



Community Video 564 564 Recon 2011 - Virtdbg by Damien Aumaitre by Recon movies eye 564 favorite 0 comment 0

(Bug: if the video is black use the QuickTime video instead) This presentation is about a remote kernel debugger leveraging the hardware virtualization facilities provided by modern processors. The hypervisor is loaded "on the fly" with DMA requests and allow to debug the target without rebooting. The client part leverages the metasm framework. This presentation is about a remote kernel debugger leveraging the hardware virtualization facilities provided by modern processors. This...

Topics: Recon, VirtDbg, Reverse Engineering



Checkpoint-Restart: Proprietary Hardware and the "Spiderweb API" This summary describes a package to transparently checkpoint and restart applications which run over Infiniband. Infiniband is rapidly growing as a high-speed interconnect, even appearing on departmental clusters. The current work grew out of the needs of high performance computing. As of November, 2010, 43% of the TOP500 supercomputers run Infiniband. However, the ability to checkpoint immediately provides access to a...

Topic: Recon 2011, Recon, Reverse Engineering, Infiniband



(Bug: if the video is black use the QuickTime video instead) Reverse engineers have to analyze more and more code these days, be it is investigation of malware, software security assessment, or RE for interoperability. While plain C code is quite familiar by now, C++ offers new challenges with inheritance, virtual functions, exception handling and so on. I will describe the common problems encountered in C++ reversing and how to deal with them. We'll also see how to get nice readable code using...

Topic: Reverse Engineering, IDA, Recon, Decompilation



(Bug: if the video is black use the QuickTime video instead) Automated JTAG/serial scanning, building your own FLASH programmer, re-documenting IC's. Using arduino based scanning tools the techniques shown for hacking embedded devices should be accessible to anyone with basic programming skills. This talk will explain the workflow and toolkit to make analysis of nearly any device more accessible. Every layer of design in a device, from logic to software, requires a means for debugging. These...



(Bug: if the video is black use the QuickTime video instead) Firmware and embedded software have already targets of choice in the past. In the same spirit, this talk will discuss about how an attacker can take advantages of a laptop's keyboard controller. The keyboard controller (KBC) or embedded controller (EC) is most often an unknown component of our laptop. It is an independent computation unit, alongside the main processor. Firmwares and embedded software have already targets of choice in...



This talk will be an introduction to doing "hardware stuff" stuff, for people accustomed to plying their trade against software. I will discuss how to build tools (and use existing tools) to sniff/spy on a variety of hardware communications channels from UART Serial (the kind in your computer) to the very ubiquitous SPI/I2C serial busses used in virtual everything (from EEPROM in your portable DVD player to the HDMI/VGA cables between your computer and monitor). I will demonstrate how...

Topics: Recon, Hardware, Reverse Engineering

