How much does it take to hack a mobile network?
Is electronic government secure
in the era of WikiLeaks and Anonymous?

Is SCADA hacking a Hollywood fiction
or the nowadays reality?
Internet banking: is there any chance to win
over the fraudsters?

Cyber-crimes, cyber-espionage, cyber-war: where do we draw a borderline?

Pages

Tuesday, May 22, 2012

Hands-On Lab of PHDays 2012: from Wi-Fi Networks Protection to SAP and Web 2.0 Security

Is it possible to hack a computer via a mouse, keypad or printer? How secure is Android? What an ethical hacker should know? Is it difficult to catch a cybercriminal? Is HTML 5 secure? You may keep wondering, but it’s much wiser to partake in Hands-on Lab at Positive Hack Days 2012 and get answers to all these questions.

Web 2.0 Security. Advanced techniques

Protection techniques against XML and HPP/HPC attacks, as well as Click Jacking and Session Puzzling will be considered at the master class.

Speaker: Andrés Riancho is an information security researcher who currently leads three closely related efforts: the development of NeXpose's Web application security scanner, the community-driven and Open Source w3af project and management of a team of skilled Web application penetration testers who work at Bonsai.

Andres is an expert in web application security, Python, IPS device evasion, networking, information security research in general, software development, Agile, Scrum, Product Owner, research of SAP systems.

Additional Devices

To participate in this competition please take along a laptop with VMware Player installed, at least 2 GB RAM, and 20 GB of hard drive free space.

DIY SAP security

This workshop will enable the attendees to learn how to perform security assessment of SAP R/3 and NetWeaver systems (including application servers and infrastructure) by means of available tools. The following topics will be considered:




  • search and identification of SAP services;
  • clients brute force;
  • peculiarities of working with SAP GUI Scripting;
  • brute-forcing via SAP GUI and SAP RFC;
  • obtaining access to critical tables;
  • using hash for brute-forcing;
  • using system transactions to access operating systems;
  • receiving data from another client;
  • data interception over a network and plaintext password recovery;
  • administrators’ possible malversations and ways to prevent them.

Speaker: Alexey Yudin is the Head of Business Applications and Database Security Department of Positive Technologies. He graduated from the Moscow State Forest University (specializing in Applied Mathematics) in 2003. From 2002 to 2005 he held the position of an engineer (Head of the Sector) in the Research Institute of Precision Instruments. He was an analyst at Informzaschita in 2005—2006.

Alexey Yudin’s main area of activity is database and business applications security; he partakes in large-scale auditing and penetration testing, as well as in engineering and implementing security systems.

Breaking havoc using a Human Interface Device

This Hands-on Lab will focus on a highly dangerous and yet widely neglected computer security issue — vulnerability of Human Interface Devices (HIDs). Using a programmable HID Teensy, the reporter will demonstrate how easy it is to hack a system by exploiting the inherent reliance of modern operating systems on HIDs. The case for using Teensy as a keyboard will also be covered.

A toolkit, Kautilya, which has been developed by the reporter, will be demonstrated highlighting that programming is not even required for using the device. Kautilya contains easily usable and highly customizable payloads which aim to make the work of a penetration tester easy.
The report will be full of live demos.

Speaker: Nikhil Mittal is a hacker, information security researcher and enthusiast from India. His area of interest includes attack research, defense strategies and post exploitation research. He has over 3 years’ experience in Penetration Testing for many Government Organizations of India and other global corporate giants in his current job position.

Nikhil Mittal specializes in assessing security risks at secure environments which requires novel attack vectors and "out of the box" approach. He is the developer of Kautilya, a toolkit which makes it easy to use Teensy in penetration tests.

Additional Devices

A laptop with VMware Player installed, at least 2 GB RAM, and 20 GB of hard drive free space, as well as Teensy++ 2.0 (devices provided by the organizers are limited).

Security without antivirus software

The participants of this four-hour master class will get basic knowledge of detecting Trojans in OS, learn most recent Trojan development techniques for Windows (SpyEye, Carberp, Duqu), consider Trojans for Android and get acquainted with actual exploits (PDF, Java).

Speaker: Boris Ryutin graduated from Rocket and Aerospace Equipment Department of the Baltic State Technical University "Voenmeh" named after D.F. Ustinov (specialized in Flight Dynamics and Aircraft Movement Control) in 2009. He worked as an engineer in the federal Machine-Building Design Bureau. Currently he is a malware analyst at Esage Lab.

Web application attacks. The basics

The mechanisms of attack on web applications, techniques and tools (specialized scanners, security, utilities, using the results of their work during manual analysis) used by violators will be submitted in a systematic form. Practical examples will clearly demonstrate major weaknesses of web applications that make it possible to conduct attacks, illustrated by the shortcomings of the means of protection in use and methods to bypass them.

Simple and well-known vulnerabilities will be considered, as well as more complex and interesting cases. In addition to attacks on web applications possible options for the use of vulnerable web applications in the attacks on other systems will be reviewed.

Speaker: Vladimir Lepikhin has been working since 1999 at Informzaschita. Coordinates Network Security. Participated in the development of many copyright courses of the Training Center Informzaschita. He specializes in the detection of network attacks and security analysis. For a long time he was engaged in reading and adaptation of the authorized courses of company Internet Security Systems   in the recent past the industry leader in the detection of attacks and security analysis. Now he continues to train for the same product line, but “under the wing” of IBM. He actively participates in the development of authorized training on the products of the company Positive Technologies. He regularly participates in conferences and forums on information security.

Additional Devices

A laptop with VMware Player installed, at least 2 GB RAM, and 20 GB of hard drive free space.

CEH. Ethical hacking and penetration testing

Visitors of the master class will get to know typical vulnerabilities of network protocols, operating systems and applications. During the master class the speaker will describe the sequence of different types of attacks on computer systems and networks, and make recommendations to strengthen the security of computer systems and networks. Students will be immersed in a practical environment, where they will see how to really hack the system to subsequently be able to anticipate the possible actions of a hacker and successfully resist them.

Speaker: Sergey Klevoghin is a unique specialist in computer network security. He was the first in Russia who obtained the status of a certified ethical hacker (Certified Ethical Hacker, CEH). Certified by Microsoft engineer in the field of security, professional in SCP security and instructor in information encryption products of the company Crypto.

Sergei Klevogin worked as a programmer at the Ministry of Defence of the Russian Federation, as a specialist in information security at the Central Bank of Russia, and as the head of information technology administration in a commercial bank. He taught at the Moscow Institute of Economics and Statistics, cooperates with the Specialist training center. The experience of Sergei Klevogin is valuable in reflecting both the professional development of products and IT principles, as well as an understanding of the integration of business processes with information technology.

Additional Devices

A laptop with VMware Player installed, at least 2 GB RAM, and 20 GB of hard drive free space.
Securing Android applications

Securing Android applications

The talk will brief the audience about the techniques of discovering and mitigating the vulnerabilities in any Android Mobile Application. Techniques of vulnerabilities discovering will include reverse engineering, memory analysis and HTTP traffic / response analysis. In addition to this, the presentation will also talk about Android rooting, SQLite database Analysis, ADB and mobile server related threats. The audience will also learn about the proposed OWASP Top 10 for mobile applications.

Speaker: Manish Chasta is a Principal Consultant (Information Security) with 6 years of experience, who focuses primarily on Mobile Application security and Web Application security. He handled pre-sales activities for various clients, managed and executed multiple Application Security and Security Assessment projects in various domains including Banking, Insurance, Trading, eCommerce, Finance, CRM and Healthcare; delivered training in the field of Application Security and Ethical Hacking.

Computer incident investigation

This workshop is devoted to the investigation of incidents of unauthorized access to Internet resources. The reporter will introduce the audience to the psychological portrait of the modern hacker and talk about types of attackers. He will consider the process of working on the incident, from the detection of traces of malicious activity and response to signals about the burglary to finding the attacker, in cooperation with law enforcement. In addition, the audience can expect fascinating stories about real security incidents.

Speaker: Sergey Lozhkhin is a specialist with the Echelon Training Center.

Additional Devices

A laptop with VMware Player installed, at least 2 GB RAM, and 20 GB of hard drive free space.
Wireless network security. How your network was hacked and how it could be avoided

Wireless network security. How your network was hacked and how it could be avoided

These days, manufacturers of enterprise-class Wi-Fi provide their clients with a wide range of protection functions against attacks and intrusions. To effectively use this tool, it is not enough for an administrator to read the documentation. We need to know the enemy's face, and the means of protection is in the ways to detect or prevent well-defined attacks in the arsenal of any trained attacker. The purpose of this report is to give students an opportunity to look at the protection of WLAN from the viewpoint of the hacker as well as that of the system administrator.

In the course of the report the most relevant methods of obtaining unauthorized access to WiFi-network will be considered, and the mechanisms proposed by the integrated solution of Cisco Unified Wireless Network to protect against the described attacks are described and demonstrated. This will allow students to consciously determine which set of security features they need.

Speaker: Dmitry Ryzhavsky lives in Moscow, Russia and is a Cisco Associate Systems Engineer. He has studied the Cisco Systems Networking Academy Program at the Moscow Cisco Systems Training Center. Certificates: Cisco Certified Design Professional (CCDP), Cisco Certified Design Associate (CCDA), Cisco Certified Network Associate (CCNA), and Cisco Certified Internetwork Expert (CCIE) in Security, Routing and Switching.

Additional Devices

A laptop compatible with BackTrack or Slitaz, at least 2 GB of main memory. A wireless card should be compatible with aircrack-ng.

Internet competitive intelligence

By using practical examples, participants of the workshop will acquire the skills of using analytical technologies in solving real problems of competitive intelligence, including methods for rapidly detecting confidential information leaks, fast-detection of open partitions on servers, methods of penetration on the FTP server without hacking protection; password leak-detection methods; methods of access to confidential documents via bypassing DLP; means of penetrating into sections behind 403 error messages. Techniques are demonstrated on examples of portals in certainly well-protected companies (such as the leaders of the IT and IS markets, large state organizations, intelligence, etc.).

Speaker: Andrey Masalovich has a Ph.D. in Physics and Mathematics, is a member of the Board of directors of DialogueScience, and head of the Competitive Intelligence sector of the Academy of Information Systems. He has supervised a number of successful projects in the analytical equipment of banks, financial-industrial groups, major network of trade retailers and government organizations. In the past he was a FAPSI Colonel, Commander of the Order "Star of the Glory of the Fatherland", winner of the scholarship of Sciences "Outstanding Scientist of Russia" (1993).

Author of numerous publications on the problems of search and analysis of data. Conducted seminars in several universities in Russia (Academy of National Economy, Moscow State University, MAI) and in the USA (Harvard, Stanford University, Georgia Institute of Technology, Texas A&M University). An expert for RFBR, INTAS, ITC UN, APEC.

Win32/Georbot. Understanding a malware and automating its analysis

The Win32/Georbot malware family has been in development for at least 18 months. With hundreds of different variants seen in the wild, it is surprising this threat has not attracted more attention from the security industry. It appears this malware is only installed on targeted computers, most likely delivered by a web based exploit. The malware is suspected to be used by individuals to steal sensitive information from infected computers. This workshop will show functionalities of such programs.

Speaker: Pierre-Marc Bureau is a researcher and information security specialist. Presented his reports at numerous conferences. The master class is in detail discussed in our special blog post (in Russian).

Practicalities of Mobile Security

Speaker: Sergey Nevstruev is the Head of Mobile Solutions at Kaspersky Lab.







P. S. If you’ve missed registration to the forum you still have an opportunity to partake in interactive online broadcasting or join any platform of PHDays Everywhere.

No comments:

Post a Comment