If You Can Write a Webserver, You Can Write a Thumb Drive
Practical examples of this technique include a tool for catching firmware updates by impersonating the DFU protocol and a prototype of a hard disk that actively defends itself against forensics tools and imaging.
Faster Secure Software Development with Continuous Deployment
Nick Galbreath, the Vice President of Engineering at IPONWEB, will speak on how to get started with continuous deployment and the tools and process needed to make it a security success.
Attack Prelude: OSINT Practice and Automation
Vladimir Styran, the lead consultant at BMS Consulting, head of information security testing section.
Abusing Browser User Interfaces for Fun and Profit
Rosario Valotta, an IT security professional with over 12 years’ experience, will show how notification bars in major browsers (Chrome 24, IE9, IE10) can be abused with little (or even no) social engineering, leading to users security compromise and even to conducting trivial code execution on the victim's machine.
Who's Looking at You, Kid?
Honeypot that Can Bite: Reverse Penetration
Alexey Sintsov, a Senior Security Engineer at Nokia, will demonstrate a real experiment, real samples of attacks, and results from the realization of this idea. The speaker will also discuss some more interesting things such as whether one can exploit vulnerabilities of third-party services or only client-side vulnerabilities.
Five Nightmares for a Telecom
The speaker is Dmitry Kurbatov, an information security specialist at Positive Technologies.
Lie to Me: Bypassing Modern Web Application Firewalls
The talk includes examples of bypassing protection mechanisms. The author points out the necessity of discovering a universal method of masquerading for vectors of various attacks via WAFs for different algorithms.
Java Everyday. System Analysis of Java 0-day Exploits
The speaker is Boris Ryutin and the co-author is Alisa Shevchenko.
SCADA Strangelove: How to Build Your Own Stuxnet
Based on the research regarding the security of Siemens SIMATIC (TIA Portal/ WinCC /S7 PLC) series, the talk will cover the vulnerabilities which can be used to hack into ICS. The reporters will also demonstrate the ways of the worm propagation and its malicious impact on the system, ranging from the network level (S7/Profinet) to the web control interfaces, to the WinCC project files. Information on new vulnerabilities in Siemens SIMATIC series will be presented, as well as tools which can be used to analyze security and to find new vulnerabilities in ICSs.
Lockpicking & Physical Security
Those who attend this session will leave with a full awareness of how to best protect buildings and grounds from unauthorized access. Discussion as well as direct example will be used to demonstrate the grave failings of low-grade hardware ... much of which can be opened by audience members with no prior training. Deviant Ollam, Babak Javadi, Keith Howell will speak on what features to look for in locks and safes will be covered, and how to invest in systems that are easiest to manage in large environments.
Evading Deep Inspection for Fun and Shell
Olli-Pekka Niemi, a well-known specialist in information security, will go into technical details of the Evader and evasions and disclose evasions that still work with most of today’s security boxes.
Find Them, Bind Them – Industrial Control Systems (ICS) on the Internet
Protecting Organizations from Security Breaches by Persistent Threats, with Examples from RSA
As part of the report, the speaker would like to share his experience and expertise in the prevention, detection and minimize the effects of high profile APT-attacks on corporate and government infrastructure. Based on some use cases (Lockheed Martin and others) he will talk about Cyber Kill Chain concept, discuss typical patterns of attack and methods of reducing the risks associated with industrial espionage and cyber attacks. Also the speaker shares some cases and techniques based on his own experience on running internal EMC CIRC (Critical Incident Response Center).
The complete list of the reports that will be presented at Positive Hack Days is available on the forum's official website. Besides standard reports, there are Fast Track reports in the PHDays III program, including more than 20 short talks that will cover a number of fascinating topics, from straightening a car out, to the methods of DLP bypassing.
P. S. We have aggregated Twitter accounts into a separate list for you to subscribe to them easily:)
P. P. S. Registration for the forum is still in progress!