eye Title Creator

Community Video 783 783 Recon 2011 Internet Filtering by Jacob Appelbaum by Recon movies eye 783 favorite 1 comment 0

Internet filtering Many countries in the world perform extensive network surveillance, filtering in the form of website blocking or protocol specific censorship; recently many networked authoritarian events in the Middle East/North Africa and across most of the world have come to light. During some specific political uprisings came increased invasive filtering events. I've run a series of tests in many of these countries, during these events with the specific purpose of identifying specific...

Topic: Recon, Jacob Appelbaum, Internet Censorship, Tor, Recon 2011,



Community Video 571 571 Recon 2011 RFID Hacking by Milosch Meriac movies eye 571 favorite 0 comment 0

RFID Hacking In the last years RFID did become a ubiquitous part of our life. We are confronted daily with RFID applications in access control systems, as micro-payment, in electronic IDs and public transportation. Despite of the huge impact, still very little is known on many systems out there - questions on security and privacy features remain unanswered by most system vendors. This talks explains how black box RFID systems can be analyzed and reverse engineered to understand the protocols...

Topic: Recon, Milosch Meriac, RFID, RFID Hacking, Hacking, OpenPCD



Community Video 564 564 Recon 2011 - Virtdbg by Damien Aumaitre by Recon movies eye 564 favorite 0 comment 0

(Bug: if the video is black use the QuickTime video instead) This presentation is about a remote kernel debugger leveraging the hardware virtualization facilities provided by modern processors. The hypervisor is loaded "on the fly" with DMA requests and allow to debug the target without rebooting. The client part leverages the metasm framework. This presentation is about a remote kernel debugger leveraging the hardware virtualization facilities provided by modern processors. This...

Topics: Recon, VirtDbg, Reverse Engineering



(Bug: if the video is black use the QuickTime video instead) Automated JTAG/serial scanning, building your own FLASH programmer, re-documenting IC's. Using arduino based scanning tools the techniques shown for hacking embedded devices should be accessible to anyone with basic programming skills. This talk will explain the workflow and toolkit to make analysis of nearly any device more accessible. Every layer of design in a device, from logic to software, requires a means for debugging. These...



This talk will be an introduction to doing "hardware stuff" stuff, for people accustomed to plying their trade against software. I will discuss how to build tools (and use existing tools) to sniff/spy on a variety of hardware communications channels from UART Serial (the kind in your computer) to the very ubiquitous SPI/I2C serial busses used in virtual everything (from EEPROM in your portable DVD player to the HDMI/VGA cables between your computer and monitor). I will demonstrate how...

Topics: Recon, Hardware, Reverse Engineering



(Bug: if the video is black use the QuickTime video instead) Firmware and embedded software have already targets of choice in the past. In the same spirit, this talk will discuss about how an attacker can take advantages of a laptop's keyboard controller. The keyboard controller (KBC) or embedded controller (EC) is most often an unknown component of our laptop. It is an independent computation unit, alongside the main processor. Firmwares and embedded software have already targets of choice in...



(Bug: if the video is black use the QuickTime video instead) Reverse engineers have to analyze more and more code these days, be it is investigation of malware, software security assessment, or RE for interoperability. While plain C code is quite familiar by now, C++ offers new challenges with inheritance, virtual functions, exception handling and so on. I will describe the common problems encountered in C++ reversing and how to deal with them. We'll also see how to get nice readable code using...

Topic: Reverse Engineering, IDA, Recon, Decompilation



The Dalvik Virtual Machine supports using Eclipse and JDB to enable developers to debug their Android applications; when used with decompiled sources, these tools become balky and clumsy, making reverse engineering Dalvik applications harder than it has to be. Scott Dunlop will unveil AndBug, a scriptable open source debugger targeting Dalvik applications intended to be used by reverse engineers to script breakpoints that can trace process flow and change state.

Topics: Recon, android, dalvik

