How much does it take to hack a mobile network?
Is electronic government secure
in the era of WikiLeaks and Anonymous?

Is SCADA hacking a Hollywood fiction
or the nowadays reality?
Internet banking: is there any chance to win
over the fraudsters?

Cyber-crimes, cyber-espionage, cyber-war: where do we draw a borderline?

Pages

Thursday, May 24, 2012

Maximum of practice, minimum of formality: PHDays 2012 program is published

Positive Hack Days 2012, an international forum, is coming soon in the Digital October center in Moscow. We’ve been preparing this event for the whole year, have gathered the most topical and interesting information security issues taking into account community’s preferences so that anyone from a programmer to a CIO can be involved in the forum.

Today we’re introducing the final program of PHDays 2012. There are two big units combining theory and practices, they are conferences and competitions.

A conference includes:

  • Business seminars — discussions in which the world leading experts participate and where the most urgent information security issues are considered;
  • Technical panels oriented to specialized audience and conducted by competent practicing experts;
  • Master classes: you may practice in solution of different IS tasks under the guidance of the well-known Russian and foreign specialists in real time mode (please find the whole article in our blog);
  • Reports on different IS issues (and some other topics) provided by such leading professionals as Bruce Schneier, Datuk Mohd Noor Amin, Travis Goodspeed, Alexander (Solar Designer) Peslyak, Mercy Shelley (Alexey Andreev), Mikhail Yemelyannikov.

Competitive program:

  • CTF is an international information protection contest conducted according to the Capture the Flag rules;
  • Young School is a competition among research works of students, postgraduate students and young scientists;
  • Hack2own is a competition allowing participants to demonstrate their skills in security analysis and hacking mobile devices (e. g. Apple iOS, Android), popular Internet browsers, and operating systems (skills in exploiting kernel vulnerabilities in current OS versions); all details can be found in our blog post;
  • Online HackQuest is a contest closely related to CTF: participants will have an opportunity to work with actual vulnerabilities and try their hands at solving various information security tasks, as well as to influence the results of PHDays CTF 2012.
  • Too Drunk to Hack NG: participants will have to hack into a web application which is protected by a Web Application Firewall; every 5 minutes the competitors whose actions caused a more frequent WAF reaction will have to drink 50 g of tequila.

Please find the full list of competitions, held on the forum platform and online, on the forum’s website.

Lots of surprises are in store for the forum’s guests. As part of the section Ways to protect money, participants will be offered to crack a remote banking system of a fictional bank in real-time mode and withdraw money from it. The second task of the competition will be more complicated – participants will be offered to crack the same remote banking system, but only when its protection system is fixed by the participants of the international information security competition PHDays CTF 2012 held as part of the forum. Specialists from Germany, the Netherlands, Russia, the USA, Tunisia, France and Japan comprise the teams of PHDays CTF 2012. This will allow finding out what country is better prepared for the protection of their banks.

P. S. The forum’s program in PDF is available on the PHDays 2012 official website, where you can also register to watch video broadcasting.

1 comment: