Yakety Hack: Tech Talks and Hacker Challenges

Yakety Hack: Tech Talks and Hacker Challenges
Yakety Hack: Tech Talks and Hacker Challenges
Public group

594 Broadway

594 Broadway · New York, NY

How to find us

When you arrive, take the right set of elevators to the 12th floor and we are the 1st office on the left side of the hallway!

Location image of event venue


Join us for Yakety Hack: Tech Talks and Hacker Challenges! Learn, improve, and challenge your hacker skills with workshops, CTFs, and tech talks while meeting and networking with other security professionals! All levels of experience are welcome.

Date: Thursday October 24th, 2019
Time: 5:30 PM to 8:00 PM
Where: F-Secure’s Soho Office @ 594 Broadway, Suite 1212

5:30 – 6:00 PM: Networking (and pizza delivery!)
6:00 – 7:00 PM: Presentation(s) and Q&A
7:00 – 8:00 PM: Intermediate/Advanced Workshop/CTF

Fowsniff Capture the Flag!

Hack your way from boot to root in this capture the flag scenario! Fowsniff is suitable for your first capture the flag, but will require more than just an off-the-net exploit or Metasploit module to run. Are you up to it?

While guidance through the workshop will be available, you will need to bring your own computer to participate. A Kali installation, as well as basic knowledge of how to use it, is highly recommended.

Talk abstract(s):
Security and Randomness, by Rob Russell
Random number generation is an important concept within information security. The security of many systems relies on the ability to produce numbers that are unguessable by an adversary. Despite being necessary for use cases such as generation of cryptographic keys, passwords, session tokens, and more, generating sequences of numbers that are sufficiently random to provide adequate security is actually a very difficult thing for computers to do. This talk will cover why this is the case, how it is done, and how it can go (and has gone) terribly wrong.

Practical Software Specialization against Vulnerability Exploitation, by Professor Michalis Polychronakis

This talk will present our work on generating self-specializing software that:
1. Reduces its attack surface by removing unneeded code and logic according to mission-specific or end-point-specific configurations and dependencies, and
2. Shields itself against exploitation by retrofitting specialized protection mechanisms, such as code randomization and data isolation.

Endpoint-specific specialization is facilitated by a novel binary code transformation framework that relies on compiler-rewriter cooperation. This enables fast and robust fine-grained code transformation on endpoints, while achieving transparent deployment by maintaining compatibility with existing software distribution models.

Do you have a talk you'd like to present? Share your abstract via message and we'll get back to you!

Don’t forget your computer if you’d like to participate in the workshops and CTF!

RSVP to secure your spot!