Hack In The Box Security Conference 2007 Malaysia
Desde hace varios meses se encuentran disponibles los vídeos de la conferencia realizada en Malasia por la gente de Hack In the Box (HITB).
Esta noticia no la había publicado con anterioridad debido a que aún no los había visto (2 DVD) en su totalidad, por eso me atrevo a decir que ninguna de las charlas tiene desperdicio.
El formato de los vídeos es .mov (puede visualizarse con Quicktime Player o VLC Player).
El contenido temático de las conferencias es el siguiente:
1.) Keynote Address 1: Honeypot Project: Latest Research
Lance Spitzner, Founder, Honeynet Project
2.) Keynote Address 2: Online Crime and Crime Online
Mikko Hypponen, Chief Research Officer, F-Secure Corp.
3.) State of Security
Andrew Cushman (Senior Director, Microsoft Security Response and Community, Microsoft Corp)
4.) Injecting RDS-TMC Traffic Information Signals - How to Freak Out Your Sat Nav System
Andrea Barisani (Chief Security Engineer, Inverse Path Ltd) and Daniele Bianco (Hardware Hacker, Inverse Path Ltd)
5.) Hacking SCADA – How to 0wn Critical National Infrastructure
Raoul Chiesa (Board of Directors member @Mediaservice.net, ISECOM Group and TSTF) and Alessio L.R. Pennasilico aka Mayhem (Security Evangelist, Alba S.T. s.r.l.
6.) Exploiting the Intranet With a Webpage - Is JavaScript the New Shellcode?
Martin Johns (University of Hamburg, Faculty of Informatics)
7.) Meta Anti Forensics: The HASH Hacking Harness
The Grugq (Independent Network Security Specialist)
8.) Security: Past, Present and Future
Deviant Olam, Eric Michaud & Q (Members of TOOL USA) and Marc Weber Tobias (Investigative Attorney and Security Specialist)
9.) WabiSabiLabi - The Exploit Marketplace
Roberto Preatoni (Director of Strategy, WabiSabiLabi & Founder, Zone-H Defacement Mirror)
10.) Advanced Web Application and Database Threat Analysis with MatriXay
Frank Yuan Fan (Founder and Chief Technology Officer, DBAPPSecurity)
11.) 360° Anomaly Based Intrusion Detection
Dr. Stefano Zanero (Politecnico di Milano T.U.
12.) Insider Threat Visualization
Raffael Marty (Manager, Strategic Application Solutions @ ArcSight Inc.)
1) Keynote Address 3: The Rise and Fall of Information Security in the Western World
Mark ‘Phiber Optik’ Abene, Former Member of LOD/MOD
2) Keynote Address 4: The Evolution of Hacking
Emmanuel Goldstein, Founder, 2600 Magazine
3) Tools and Strategies for Securing a Large Development Project
Window Snyder (Chief Security Something or Other, Mozilla Corporation)
4) Hacking the Bluetooth Stack for Fun, Fame and Profit
Dino Covotsos (Managing Director, Telespace Systems)
5) Protocol Fuzzing
Luiz Eduardo (Senior Systems & Security Engineer, Mu Security)
6) Hacking Biometric Systems
Starbug (Independent Security Researcher)
7) Hacking Hardened and Secured Oracle Servers
Alexander Kornbrust (Founder, Red Database Security GmbH)
Enterprise Hacking: Who Needs Exploit Codes?
Fetri Miftach (Principal Consultant, PT Bellua Asia Pacific) and Jim Geovedi (Security Consultant, PT Bellua Asia Pacific)
9) An End-to-End Analysis of Securing Networked CCTV Systems
Sarb Sembhi (Chief Technology Officer, Securityw0rk5)
10) Slipping Past The Firewall
Billy K. Rios (Senior Researcher, VeriSign) and Nathan McFeters (Senior Security Advisor, Ernst & Young Advanced Security Center)
11) Attack Surface of Modern Applications
Felix ‘fx’ Lindner (Founder, Recurity Labs GmbH)
12) Googling for Malware and Bugs
Dr. Jose Nazario (Senior Security Engineer, Arbor Networks)
13) The Computer Forensics Challenge and Anti-Forensics Techniques
Domingo Montanaro (Information Security Specialist and Computer Forensics Expert) and
Rodrigo Rubira Branco (IBM, Brazil)
14) Hacking Ajax and Web Services – Next Generation Web Attacks on the Rise
Shreeraj Shah (Director, BlueInfy)
Algunas capturas de pantalla: