How much does it take to hack a mobile network?
Is electronic government secure
in the era of WikiLeaks and Anonymous?

Is SCADA hacking a Hollywood fiction
or the nowadays reality?
Internet banking: is there any chance to win
over the fraudsters?

Cyber-crimes, cyber-espionage, cyber-war: where do we draw a borderline?


Tuesday, May 22, 2012

Hands-On Lab of PHDays 2012: from Wi-Fi Networks Protection to SAP and Web 2.0 Security

Is it possible to hack a computer via a mouse, keypad or printer? How secure is Android? What an ethical hacker should know? Is it difficult to catch a cybercriminal? Is HTML 5 secure? You may keep wondering, but it’s much wiser to partake in Hands-on Lab at Positive Hack Days 2012 and get answers to all these questions.

Web 2.0 Security. Advanced techniques

Protection techniques against XML and HPP/HPC attacks, as well as Click Jacking and Session Puzzling will be considered at the master class.

Speaker: Andrés Riancho is an information security researcher who currently leads three closely related efforts: the development of NeXpose's Web application security scanner, the community-driven and Open Source w3af project and management of a team of skilled Web application penetration testers who work at Bonsai.

Andres is an expert in web application security, Python, IPS device evasion, networking, information security research in general, software development, Agile, Scrum, Product Owner, research of SAP systems.

Additional Devices

To participate in this competition please take along a laptop with VMware Player installed, at least 2 GB RAM, and 20 GB of hard drive free space.

DIY SAP security

This workshop will enable the attendees to learn how to perform security assessment of SAP R/3 and NetWeaver systems (including application servers and infrastructure) by means of available tools. The following topics will be considered:

  • search and identification of SAP services;
  • clients brute force;
  • peculiarities of working with SAP GUI Scripting;
  • brute-forcing via SAP GUI and SAP RFC;
  • obtaining access to critical tables;
  • using hash for brute-forcing;
  • using system transactions to access operating systems;
  • receiving data from another client;
  • data interception over a network and plaintext password recovery;
  • administrators’ possible malversations and ways to prevent them.

Speaker: Alexey Yudin is the Head of Business Applications and Database Security Department of Positive Technologies. He graduated from the Moscow State Forest University (specializing in Applied Mathematics) in 2003. From 2002 to 2005 he held the position of an engineer (Head of the Sector) in the Research Institute of Precision Instruments. He was an analyst at Informzaschita in 2005—2006.

Alexey Yudin’s main area of activity is database and business applications security; he partakes in large-scale auditing and penetration testing, as well as in engineering and implementing security systems.

Breaking havoc using a Human Interface Device

This Hands-on Lab will focus on a highly dangerous and yet widely neglected computer security issue — vulnerability of Human Interface Devices (HIDs). Using a programmable HID Teensy, the reporter will demonstrate how easy it is to hack a system by exploiting the inherent reliance of modern operating systems on HIDs. The case for using Teensy as a keyboard will also be covered.

A toolkit, Kautilya, which has been developed by the reporter, will be demonstrated highlighting that programming is not even required for using the device. Kautilya contains easily usable and highly customizable payloads which aim to make the work of a penetration tester easy.
The report will be full of live demos.

Speaker: Nikhil Mittal is a hacker, information security researcher and enthusiast from India. His area of interest includes attack research, defense strategies and post exploitation research. He has over 3 years’ experience in Penetration Testing for many Government Organizations of India and other global corporate giants in his current job position.

Nikhil Mittal specializes in assessing security risks at secure environments which requires novel attack vectors and "out of the box" approach. He is the developer of Kautilya, a toolkit which makes it easy to use Teensy in penetration tests.

Additional Devices

A laptop with VMware Player installed, at least 2 GB RAM, and 20 GB of hard drive free space, as well as Teensy++ 2.0 (devices provided by the organizers are limited).

Security without antivirus software

The participants of this four-hour master class will get basic knowledge of detecting Trojans in OS, learn most recent Trojan development techniques for Windows (SpyEye, Carberp, Duqu), consider Trojans for Android and get acquainted with actual exploits (PDF, Java).

Speaker: Boris Ryutin graduated from Rocket and Aerospace Equipment Department of the Baltic State Technical University "Voenmeh" named after D.F. Ustinov (specialized in Flight Dynamics and Aircraft Movement Control) in 2009. He worked as an engineer in the federal Machine-Building Design Bureau. Currently he is a malware analyst at Esage Lab.

Web application attacks. The basics

The mechanisms of attack on web applications, techniques and tools (specialized scanners, security, utilities, using the results of their work during manual analysis) used by violators will be submitted in a systematic form. Practical examples will clearly demonstrate major weaknesses of web applications that make it possible to conduct attacks, illustrated by the shortcomings of the means of protection in use and methods to bypass them.

Simple and well-known vulnerabilities will be considered, as well as more complex and interesting cases. In addition to attacks on web applications possible options for the use of vulnerable web applications in the attacks on other systems will be reviewed.

Speaker: Vladimir Lepikhin has been working since 1999 at Informzaschita. Coordinates Network Security. Participated in the development of many copyright courses of the Training Center Informzaschita. He specializes in the detection of network attacks and security analysis. For a long time he was engaged in reading and adaptation of the authorized courses of company Internet Security Systems   in the recent past the industry leader in the detection of attacks and security analysis. Now he continues to train for the same product line, but “under the wing” of IBM. He actively participates in the development of authorized training on the products of the company Positive Technologies. He regularly participates in conferences and forums on information security.

Additional Devices

A laptop with VMware Player installed, at least 2 GB RAM, and 20 GB of hard drive free space.

CEH. Ethical hacking and penetration testing

Visitors of the master class will get to know typical vulnerabilities of network protocols, operating systems and applications. During the master class the speaker will describe the sequence of different types of attacks on computer systems and networks, and make recommendations to strengthen the security of computer systems and networks. Students will be immersed in a practical environment, where they will see how to really hack the system to subsequently be able to anticipate the possible actions of a hacker and successfully resist them.

Speaker: Sergey Klevoghin is a unique specialist in computer network security. He was the first in Russia who obtained the status of a certified ethical hacker (Certified Ethical Hacker, CEH). Certified by Microsoft engineer in the field of security, professional in SCP security and instructor in information encryption products of the company Crypto.

Sergei Klevogin worked as a programmer at the Ministry of Defence of the Russian Federation, as a specialist in information security at the Central Bank of Russia, and as the head of information technology administration in a commercial bank. He taught at the Moscow Institute of Economics and Statistics, cooperates with the Specialist training center. The experience of Sergei Klevogin is valuable in reflecting both the professional development of products and IT principles, as well as an understanding of the integration of business processes with information technology.

Additional Devices

A laptop with VMware Player installed, at least 2 GB RAM, and 20 GB of hard drive free space.
Securing Android applications

Securing Android applications

The talk will brief the audience about the techniques of discovering and mitigating the vulnerabilities in any Android Mobile Application. Techniques of vulnerabilities discovering will include reverse engineering, memory analysis and HTTP traffic / response analysis. In addition to this, the presentation will also talk about Android rooting, SQLite database Analysis, ADB and mobile server related threats. The audience will also learn about the proposed OWASP Top 10 for mobile applications.

Speaker: Manish Chasta is a Principal Consultant (Information Security) with 6 years of experience, who focuses primarily on Mobile Application security and Web Application security. He handled pre-sales activities for various clients, managed and executed multiple Application Security and Security Assessment projects in various domains including Banking, Insurance, Trading, eCommerce, Finance, CRM and Healthcare; delivered training in the field of Application Security and Ethical Hacking.

Computer incident investigation

This workshop is devoted to the investigation of incidents of unauthorized access to Internet resources. The reporter will introduce the audience to the psychological portrait of the modern hacker and talk about types of attackers. He will consider the process of working on the incident, from the detection of traces of malicious activity and response to signals about the burglary to finding the attacker, in cooperation with law enforcement. In addition, the audience can expect fascinating stories about real security incidents.

Speaker: Sergey Lozhkhin is a specialist with the Echelon Training Center.

Additional Devices

A laptop with VMware Player installed, at least 2 GB RAM, and 20 GB of hard drive free space.
Wireless network security. How your network was hacked and how it could be avoided

Wireless network security. How your network was hacked and how it could be avoided

These days, manufacturers of enterprise-class Wi-Fi provide their clients with a wide range of protection functions against attacks and intrusions. To effectively use this tool, it is not enough for an administrator to read the documentation. We need to know the enemy's face, and the means of protection is in the ways to detect or prevent well-defined attacks in the arsenal of any trained attacker. The purpose of this report is to give students an opportunity to look at the protection of WLAN from the viewpoint of the hacker as well as that of the system administrator.

In the course of the report the most relevant methods of obtaining unauthorized access to WiFi-network will be considered, and the mechanisms proposed by the integrated solution of Cisco Unified Wireless Network to protect against the described attacks are described and demonstrated. This will allow students to consciously determine which set of security features they need.

Speaker: Dmitry Ryzhavsky lives in Moscow, Russia and is a Cisco Associate Systems Engineer. He has studied the Cisco Systems Networking Academy Program at the Moscow Cisco Systems Training Center. Certificates: Cisco Certified Design Professional (CCDP), Cisco Certified Design Associate (CCDA), Cisco Certified Network Associate (CCNA), and Cisco Certified Internetwork Expert (CCIE) in Security, Routing and Switching.

Additional Devices

A laptop compatible with BackTrack or Slitaz, at least 2 GB of main memory. A wireless card should be compatible with aircrack-ng.

Internet competitive intelligence

By using practical examples, participants of the workshop will acquire the skills of using analytical technologies in solving real problems of competitive intelligence, including methods for rapidly detecting confidential information leaks, fast-detection of open partitions on servers, methods of penetration on the FTP server without hacking protection; password leak-detection methods; methods of access to confidential documents via bypassing DLP; means of penetrating into sections behind 403 error messages. Techniques are demonstrated on examples of portals in certainly well-protected companies (such as the leaders of the IT and IS markets, large state organizations, intelligence, etc.).

Speaker: Andrey Masalovich has a Ph.D. in Physics and Mathematics, is a member of the Board of directors of DialogueScience, and head of the Competitive Intelligence sector of the Academy of Information Systems. He has supervised a number of successful projects in the analytical equipment of banks, financial-industrial groups, major network of trade retailers and government organizations. In the past he was a FAPSI Colonel, Commander of the Order "Star of the Glory of the Fatherland", winner of the scholarship of Sciences "Outstanding Scientist of Russia" (1993).

Author of numerous publications on the problems of search and analysis of data. Conducted seminars in several universities in Russia (Academy of National Economy, Moscow State University, MAI) and in the USA (Harvard, Stanford University, Georgia Institute of Technology, Texas A&M University). An expert for RFBR, INTAS, ITC UN, APEC.

Win32/Georbot. Understanding a malware and automating its analysis

The Win32/Georbot malware family has been in development for at least 18 months. With hundreds of different variants seen in the wild, it is surprising this threat has not attracted more attention from the security industry. It appears this malware is only installed on targeted computers, most likely delivered by a web based exploit. The malware is suspected to be used by individuals to steal sensitive information from infected computers. This workshop will show functionalities of such programs.

Speaker: Pierre-Marc Bureau is a researcher and information security specialist. Presented his reports at numerous conferences. The master class is in detail discussed in our special blog post (in Russian).

Practicalities of Mobile Security

Speaker: Sergey Nevstruev is the Head of Mobile Solutions at Kaspersky Lab.

P. S. If you’ve missed registration to the forum you still have an opportunity to partake in interactive online broadcasting or join any platform of PHDays Everywhere.


  1. I know how to get help with assignment. This website was really useful for me and my college friends

  2. printer is a common problem that usually occurs while printing on a regular basis. Due to having low internet connection on your operating system, such an issue can be arisen .

  3. when you get an issue with you website. dont' be worry about it just contact see our site which provide the solution related to the website or any issue contact by email.

  4. service host Superfetch is a Windows service that is intended to make your applications launch faster and improve your system respond speed. It does so by pre-loading programs you frequently use into RAM so that they don't have to be called from the hard drive every time you run them.

  5. Great article. Glad you posted it. Thanks.

  6. Really informative article! Thank you very much for sharing such an amazing article!
    canon printer error 5b00

  7. Service Host SuperFetch is one of the built-in programs comes with the Windows 10. It is very effective in utilizing the memory unit and the CPU cycle. As a result, it boosts the device’s performance. However, some of the difficulties, such as the pre-loading app, the memory blockage issues, etc become common while you try to launch a new file in your system.

  8. Great article.Epson Printer Error code “0xf1” in Epson printers is a critical error that you might face while using the Epson printer. This error code is usually displays because of the corrupted registry entry in your PC. If your Epson printer has shown this ‘0xf1” Epson Printer Error Code’ then the print head will not be able to go or read from left or the right side while it is initiating the printing process

  9. Excellent all the quotes! I’ve read whole the blog. and Email Marketing is best way to promoting your online Business. so think It really contains very useful and user-friendly information which I was quite understandable. Really appreciate you sharing this blog article.

  10. Such an interesting read. Thanks for sharing this information with us, Very helpful guide for Everyone.

    Wooden pallet manufacturer Dubai

  11. Get the best Auditing services by Acuvat Consultancy in Dubai

  12. All the quotes are very helpful on hacking.

  13. We provide the best Lead Services Generation in Dubai at highly affordable costs. Our experts are proficient in marketing services. Our lead generation services help you get the leads that you want.

  14. Hey thanks for this post, I was searching topic for a very long time. By the way if anyone is searching for best presentation design services in Australia, Visit my profile.

  15. We are the best suppliers of Marine Shipping Equipment and accessories like ropes & hawsers, marine paints, power tools, etc. All the products are skillfully manufactured by leading manufacturers of the industry.

  16. Nice Blog

  17. Hello!
    MS Surface Pro Repair is a series of touch screen based on personal computers and running on Microsoft operating system especially designed or developed . It is interactive between user and MS Surface Pro services. If anyone searching for Best MS Surface . Visit my profile

  18. If you get any difficulty whilist utilizing Brother Printer, Call Brother printer Toll Free Number and get a relaible solution with no type of delay.
    Brother printer support number | Brother printer support

  19. Hello!
    Recruitment Services In Iraq employment agency is a company which matches employers to employees. If anyone searching for Best employee for our company. Visit here

  20. Thanks for sharing with us about Hands-On Lab of PHDays 2012, bdw if you need PPC Services in Australia, visit my profile.

  21. I am very impressed with this article. Useful info easy to understand.
    Lesco bill online
    Check Lesco bill

  22. Brother printers are one of the highest selling printers across the world. Brother printers are known for its quality, reliable performance and speed. For any technical assistance you can call on our brother printer toll-free number. Our team of experts will be available 24/7 for assistance.

  23. I am glad that I saw this post. It is informative blog for us and we need this type of blog thanks for share this blog, Keep posting such instructional blogs and I am looking forward for your future posts.
    Cyber Security Projects for Final Year

    JavaScript Training in Chennai

    Project Centers in Chennai

    JavaScript Training in Chennai

  24. Quicken is a personal online financial management tool used by many companies all over the world. Quicken eases the work and it saves lot of time and effort. Sometimes people find it difficult to use Quicken tool, call our quicken toll-free number anytime for quick assistance from our team of experts.

  25. Hey, I have read your blog. This is really great. I like your work. I am also a blogger. Please read my blog and let me know your feedback on the same. Brother Printer UK

  26. Is your Alexa often gives you offline issue? This issue may irritate you! But now you don’t have to worry about that. Alexa Helpline is a group of expert technicians that can solve your Alexa’s offline issue. alexa customer service

  27. Call the Roku technical expert at Toll Free Number USA/Canada: +1 888-480-0288, UK: +44-800-041-8324, if you’re unable to fix Roku Error Code 003 issue anymore. We are one of the leading Roku technical support service provider and we offer our services round the clock. So whenever you need any help with Roku device, just call us on our toll-free number.

  28. If any of your home appliances or electric devices has been damaged then don’t worry or go anywhere. Geek for Tech is the best company that can help you with the best repair services. Our expert technicians are always ready to help you. You can call Geek Squad Support US/ Canada: +1-888-480-0288 & UK: +44-800-041-8324. We assure you with the best service on affordable price. Geek Support

  29. With time, printers has become an indispensable gadget to every person. Lexmark printers is one of the best brands used by millions of users across the world. Sometimes, user encounter technical issues. In order to troubleshoot these glitches, get support from the team of technicians by dialing the lexmark printer toll-free number and avail 24/7 service for fixing any Lexmark printer related issue with no time.

  30. Sony is one of the well-known brands all over the world. Sony printers are highly sought after by people for their work and personal printing needs. Sony deals in compact printers, photo printers, thermal printers, laser printers, medical printers, etc. If your printer is delivering bad quality photo prints or any other issue, then you can reach our sony printer customer support team.

  31. Dial our dell printer support number to fix all Dell printer related issues. We have solution for all your printer related issue. Get 24/7 effective solutions from our professional team of experts.