Car Hacking, Router exploitation, Linux Security & CTF Pwnables
Details
We are pleased to announce our second DEFCON Toronto Meet-up group for hackers, cyber security professionals, and enthusiasts. On July 25th join us for some exciting cyber security talks, interactive exhibits, networking and free pizza/beer!
Talks & Presenters
Car hacking (live demo) - Nick Aleks
Summary:
Our new everyday cars are quickly becoming computers on wheels. Nick Aleks is going to crack open our eyes to the underground world of automotive hacking. Learn about how a vehicle can be wirelessly unlocked and even have its engine turned on, and learn how to can better protect your car.
Home Router Security Pwning- Sander Smith
Summary:
Poorly secured home routers have quickly gone from a topic that no one even thought about to a platform that can easily be used to launch high-profile attacks. The fate of SOHO routers has become a popular topic on many fronts.
We’ll discuss the current state of home networking security and what must be done to fix the problems. Our research provides us with loads of data on how real people are using real devices and the types of things that are going wrong.
This leads us into an approach for addressing the problem that’s different from how others may see it. Sander is the president of Sericon Technology, Inc.
Linux Security - Dolev Farhi
Summary:
How fast is a misconfigured/overlooked Linux server hacked in the wild? the answer is...fast. this demonstration will show exactly how fast. best practices of server hardening, auditing, Linux security pro tips from past experiences and honey pot bloopers. Dolev Farhi manages the largest Linux security community forum in Israel, a co-organizer of DC416 and a Network & Security Engineer in F5 Networks.
Pwning Pwnables: Attacking binary challenges in CTFs - Harold Rodriguez
Summary:
Capture the Flag (CTF) events are competitions where hackers compete for points and prizes. CTFs typically challenge participants in various categories, such as web applications, forensics, cryptography, and my personal favourite; binary exploitation, or pwnables. Binary exploitation can be rewarding, but how do you get from a blackbox to the flag? In this presentation, I'll talk about my approach to tackling these pwnables using tools and techniques to analyze the binary, find the vulnerability, and develop a working exploit. At the end, I'll do a hands-on-demo to apply the concepts presented to pwn a pwnable. Harold Rodriguez is a System Administrator in the University of Toronto
Want to present your project/idea/experience at the next DC416 meet-up? shoot us an email: info at dc416.com
Want to learn more about DEFCON Toronto?
Visit our Facebook Page! (https://www.facebook.com/groups/DC647/)
Join the conversation on Twitter! Share and follow along with@defcon_toronto (https://twitter.com/defcon_toronto)
Interested in sponsoring a DEFCON Toronto event?
Click Here! (http://dc416.com/)
We would like to thank TunnelBear (http://www.tunnelbear.com) for hosting this event at their venue!
http://photos1.meetupstatic.com/photos/event/9/3/c/600_451682364.jpeg
We would also like to thank Jobspring (http://www.jobspringpartners.com/) for helping us organize the event and providing the beer/pizza
http://photos2.meetupstatic.com/photos/event/3/b/6/e/600_450855214.jpeg
