Quantcast
Channel: Cатсн²² (in)sесuяitу / ChrisJohnRiley » 26C3
Browsing all 10 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

26C3: cat /proc/sys/net/ipv4/fuckups

“Built around a fictional average company network, we will tell the story of an attack making use of subtle bugs across the layers all of which are as of yet undisclosed. This will include a bug in an...

View Article



Image may be NSFW.
Clik here to view.

26C3: Lightning Talks – Day 2

After yesterdays late night with TCP, I decided to kick-off day 2 with a look at the lightning talks. Yesterday’s lightening talk from p4ula on sleep hacking was really interesting (if a little brief),...

View Article

Image may be NSFW.
Clik here to view.

26C3: Defending the poor

Not sure how I managed to miss this on the first look at the schedule, but I almost missed this one. FX usually talks about IOS, but this time he’s turning his focus on Flash applications, and how to...

View Article

Image may be NSFW.
Clik here to view.

26C3: Legic Prime – Obscurity in Depth

LEGIC Prime is the older (1992) of the two high security RFID solutions offered by the Legic company (the other being Advant – released in 2004). The Legic Prime is primarily used for high security...

View Article

Image may be NSFW.
Clik here to view.

26C3: SCCP Hacking – Attacking SS7 & SIGTRAN applications

One step further and mapping the phone system SS7 is no longer the walled garden where people cannot inject traffic. SS7 was designed for reliability, with multiple systems  designed to take the load...

View Article


Image may be NSFW.
Clik here to view.

26C3: DECT (part II)

Last years talk on DECT (in)security was one of the highlights of my conference. It also prompted me to grab one of the com-on-air cards and start playing with DECT a little more. Hopefully this talk...

View Article

Image may be NSFW.
Clik here to view.

26C3: Playing with the GSM RF interface

Doing tricks with a mobile phone This talk will show what can be done by taking control of the GSM RF part of a mobile phone, for example performing a DoS attack to the GSM network or using the phone...

View Article

Image may be NSFW.
Clik here to view.

26C3: Optimised to fail – Card readers for online banking

Card readers for online banking The Chip Authentication Programme (CAP) has been introduced by banks in Europe to deal with the soaring losses due to online banking fraud. A handheld reader is used...

View Article


Image may be NSFW.
Clik here to view.

26C3: secuBT – Hacking the hackers with User-Space Virtualization

secuBT – Hacking the hackers with User-Space Virtualization In the age of coordinated malware distribution and zero-day exploits security becomes ever more important. This paper presents secuBT, a safe...

View Article


Image may be NSFW.
Clik here to view.

26C3: Cryptographically Secure ? (lightning talk)

Cryptographically Secure ? Cracking FIPS-Certified USB Flash Drives Lightning talk – PoC – Matthias Deeg Demo is performed using a SanDisk Cruzer Enterprise (FIPS Edition), however is possible on other...

View Article
Browsing all 10 articles
Browse latest View live




Latest Images