26C3: cat /proc/sys/net/ipv4/fuckups
“Built around a fictional average company network, we will tell the story of an attack making use of subtle bugs across the layers all of which are as of yet undisclosed. This will include a bug in an...
View Article26C3: Lightning Talks – Day 2
After yesterdays late night with TCP, I decided to kick-off day 2 with a look at the lightning talks. Yesterday’s lightening talk from p4ula on sleep hacking was really interesting (if a little brief),...
View Article26C3: Defending the poor
Not sure how I managed to miss this on the first look at the schedule, but I almost missed this one. FX usually talks about IOS, but this time he’s turning his focus on Flash applications, and how to...
View Article26C3: Legic Prime – Obscurity in Depth
LEGIC Prime is the older (1992) of the two high security RFID solutions offered by the Legic company (the other being Advant – released in 2004). The Legic Prime is primarily used for high security...
View Article26C3: SCCP Hacking – Attacking SS7 & SIGTRAN applications
One step further and mapping the phone system SS7 is no longer the walled garden where people cannot inject traffic. SS7 was designed for reliability, with multiple systems designed to take the load...
View Article26C3: DECT (part II)
Last years talk on DECT (in)security was one of the highlights of my conference. It also prompted me to grab one of the com-on-air cards and start playing with DECT a little more. Hopefully this talk...
View Article26C3: Playing with the GSM RF interface
Doing tricks with a mobile phone This talk will show what can be done by taking control of the GSM RF part of a mobile phone, for example performing a DoS attack to the GSM network or using the phone...
View Article26C3: Optimised to fail – Card readers for online banking
Card readers for online banking The Chip Authentication Programme (CAP) has been introduced by banks in Europe to deal with the soaring losses due to online banking fraud. A handheld reader is used...
View Article26C3: secuBT – Hacking the hackers with User-Space Virtualization
secuBT – Hacking the hackers with User-Space Virtualization In the age of coordinated malware distribution and zero-day exploits security becomes ever more important. This paper presents secuBT, a safe...
View Article26C3: Cryptographically Secure ? (lightning talk)
Cryptographically Secure ? Cracking FIPS-Certified USB Flash Drives Lightning talk – PoC – Matthias Deeg Demo is performed using a SanDisk Cruzer Enterprise (FIPS Edition), however is possible on other...
View Article
More Pages to Explore .....