Keynote
Coming soon ...
Coming soon ...
This is a talk on perspectives. I step outside of mine to see hacking around the world though different views. We will explore how companies who publish reports help skew the global perspective. We will look at how people from different parts of the world see hacking/ information security from their own perspective. We will hear a few tales of what I saw through my perspective of a stranger in a foreign land. We will then explore a small slice of history of a few hackers to gain a better perspective of where we have been, where we are now and where we are heading. This talk was not only created to entertain and enlighten the conference attendees to take a step back and look at what they themselves are a part of. It was made for them to share with friends, family and coworkers. So people on the outside could get a better understanding of what a hacker truly is and why being one is such a great thing to be!
This talk will show a very common weakness in RSA signatures. We will be able to computationally extract public RSA keys from communications and embedded systems in case the public key is voluntarily not published. This weakens RSA signatures where keys of small sizes and/or quality are used and allows direct factoring attacks. 2 studies will be conducted on PGP/GPG e-mails and on the Vigik access control system which protects access to nearly 1 million buildings in France.
Sous-titre: Hacker les modem fibre for fun & profit
Beaucoup de modem cable/fibre de dernière génération sont basés sur des chipsets Broadcom, offrant ainsi la possibilité d'exécuter plusieurs applications (Middleware), de gérer le multitache et différents fichiers embarqués dans le périphérique comme des pages HTML ou d'autres ressources.
Ce talk présente des outils et méthodes simples pour accéder aux éléments internes de ces modems, récupérer de l'information de composants spécifiques et présente aussi plusieurs fonctionnalités du chipset Broadcom BCM3383.
Des outils dédiés permettant de manipuler les différents firmwares et fichiers seront rendus publiques à la suite de cette présentation.
Global surveillance emerged as a phenomenon since the late 1940s and Internet and mobile technology are being developed with such pace that it is impossible to guarantee electronic privacy and nobody should expect it. How strong are the actual Instant Messaging Platforms? Do they take care of our security and privacy? We'll look inside the security of several clients (like BBM, Snapchat, Viber or Line) and will put our focus on WhatsApp.
WhatsApp might not be as widely known as Twitter, but the company announced that it has passed 400 million active monthly users. WhatsApp has been plagued by several security issues in the past, so we decided to start the research. We’ve discovered several vulnerabilities more that we'll disclosure (with proof of concept code), including encryption flaws, remote DOS (making the client crash by sending a custom message) or how to spoof messages manipulating sender address information.
Le "cloud" remplace lentement des parties du web que l'on a l'habitude de côtoyer, nous allons voir dans cette présentation comment comprendre et adapter nos outils et attaques au monde du "cloud".
Ce talk aborde la domotique et sa problématique de la sécurité: sécurité des biens et des personnes, de la vie privée ainsi que la sécurité numérique. Ces trois types de sécurité sont étroitement liées, les attaquants actuels ne se limitant plus aux techniques traditionnelles mais utilisant de plus en plus les nouvelles technlogies pour arriver à leur fin: réseaux sociaux, outils électroniques et informatiques.
Plusieurs solutions open-source et propriétaires seront présentées, et pour certaines d'entre-elles des vulnérabilités seront dévoilées, démontrant le manque de maturité des solutions actuelles, et la méconnaissance des développeurs des bonnes pratiques de développement et des attaques existantes. De plus, ce talk va mettre en doute un des arguments commercial récurrent de ces solutions: la protection des biens et des personnes.
Plusieurs démonstrations en live seront effectuées, sur certaines solutions domotique, démontrant la facilité d'exploitation et l'impact possible sur des cas réels.
We've been messing with all kind of public devices in the last years, in airports, malls, cinemas, museums or even just on the street.
In this talk, we will expose again the experiences Borja talked previously at RootedCon (Spain) and Zack will tell about his experience as well and add as much new owned devices as possible.
Interactive kiosks, ticket-selling machines, ATMs... In this talk we will see what kind of computers are being offered to everyone who wants to.
All kinds of devices exposed to the hands of anyone in public and easily accessible. How secured are them? And what is more important ... In which networks are those devices connected to? In this talk we will talk about all this terminals which access has been obtained by escaping the legit applications, their locations, and methods used to access the underlying systems will be discussed.
The main point of the talk is to expose how it is possible to acquire control of the underlying system of this computers.
Pour avoir du succès, les jeux d'arcades des années 80-90 étaient condamnés à taper dans l’œil.
Pour ça, ils tournaient souvent sur hardware dédié.
Avec ces jeux exceptionnels est apparu un piratage d'un niveau technique exceptionnel. En réponse, les fabricants créaient des protections elles aussi exceptionnelles, dont certaines sont toujours invaincues de nos jours.
Ceci est une visite d'ensemble du monde des jeux d'arcades, de leurs protections, et ce qu'il a fallu faire pour que certains d'entre eux ne soient plus voués à l'oubli.
Memory error exploits have been around for quite some time now, but despite all the efforts to prevent these attacks, they are still one of the most commonly exploited vulnerabilities to get arbitrary code execution - sometimes even with system privileges - on a target machine. Most of the protections currently deployed are probabilistic, meaning that they can make the exploitation of memory errors harder and more time consuming, but they cannot prevent them deterministically. It turned out that ASLR can be bypassed with techniques such as heap spraying, and that stack canaries can be left untouched by simply overwriting pointers other than the return address. Furthermore, these security mechanisms rely on keeping the seed secret, which cannot always be assured.
We propose a technique that provides deterministic protection against all memory corruption attacks that perform full pointer overwrites to redirect the execution flow. The key ideas are address space partitioning, process replication and I/O synchronization. Deterministic protection can be achieved by making sure that any virtual memory address is only valid in one of the processes. Any memory corruption attack that attempts to redirect the execution flow by a pointer overwrite, cannot be successful in both processes. Since both processes are fed with the same input, it will result in a segmentation fault in one of the processes. By monitoring the processes at system call ganularity, it can be assured that malicious code cannot do any damage to the system.
A PoC was developed in the course of the research, which is published under the terms of the LGPL.
Cette présentation vous montrera comment copier une clé même sans expérience, sur des modèles de clés à dents, clés à trous, et même certains modèles de haute sécurité à pompes. Pour quelques euros seulement.
Les machines du commerce dédiées à la fabrication de clés sont disponibles à des prix généralement au delà de 10 000 euro, et ne peuvent tailler qu'une certaine catégorie de clé. Les serruriers eux-mêmes sont rares à en posséder, l'investissement atteignant les 60 000 euros si on veut pouvoir fabriquer la majorité des clés en circulation.
L'utilisation d'une fraiseuse CNC peut facilement résoudre ce problème, pour moins de 5 000 euros, voire même moins de 1 000 euros si on la fabrique soi-même. Et ces machines se répandent de plus en plus, notamment dans les hacker-space et fablab.
Et l'impression 3D dans tout ça ?
Venez et vous saurez ;-)
Reprenez le contrôle de votre sécurité physique !
Have Fun !
MrJack
A key challenge in today's malware analysis is the use of evasions, a set of techniques that malicious artifacts use to determine if they are running inside analysis environments and to evade their detection.
In this talk, we will review evasion techniques found in-the-wild in binary and web-based malware (i.e., malicious web pages). We will also present two systems that we have introduced to detect and bypass common evasion techniques used in these contexts.
The talk will leverage our experience with doing malware analysis in a commercial settings at Lastline, as well as years of experience in running two academic malware analysis systems: Anubis (http://anubis.iseclab.org) and Wepawet (http://wepawet.cs.ucsb.edu).
Comment hacker un pèse personne en utilisant sa propre électronique
1. Exemple basé sur la balance téraillon TX6000
2. Codage arduino pour la lecture du poids
3. Méthode d'envoi de la mesure à distance ; réseau Sigfox avec la board Akeru, pourquoi et comment ?
4. Résultats : historique de mesure sur une ruche réelle