Sunday, August 5, 2007

Defcon 15 - shud of been there fuxx

Defcon 15

Posted by samc on August 2nd, 2007

DEFCON 15 will be held August 4th through 6th, 2007. WiFi Planet has a good review on some of the activities:


Dozens of DEFCON speakers are scheduled to officially present new hacker tools and exploits. Many of those sessions focus on wireless vulnerabilities and the damage they can do. For example:

  • The Church of Wi-Fi, which will host the DEFCON 15 Wireless Village, promises to show bigger, better, badder rainbow tables that further speed WPA cracking. David Hulton will demonstrate BTCrack, a Bluetooth PIN cracker that can guess up to 8-digit Bluetooth PINs in real-time by analyzing pairing captures.
  • Midnight Research Labs will hand out liveCDs containing Wicrawl, a tool that probes discovered APs to separate the wheat from the chaf so that pen-testers can focus on the most “accessible, interesting, or relevant” targets.
  • In a pair of sessions, WarDrivingWorld plans to delve into EV-DO card hacking and also demonstrate “simple techniques” for extending Wi-Fi range “beyond the standard 15-30 meters to 3-5 kilometers or more using home brew components.”
  • Ricky Hill of Tenacity Solutions will demonstrate “Wireless GeoCaching,” the art of more precisely locating 802.11 APs using war-driving hardware and software.
  • Researchers from AirTight Networks will demonstrate the fallibility of WEP Cloaking and a challenging version of AP spoofing (AKA Evil Twin or Honeypot APs) which they have dubbed the “Multipot.”

Prior to the WiFi hijacking demonstration, notes the BBC, many sites were thought to be safe because they encrypted the data swapped back and forth when people login. However, Robert Graham of Errata Security, carried out his attack on the unencrypted cookies, tiny text files, many sites use to identify people that regularly return.

BlackHat has a new section that highlights breaking security research submitted by leading corporate professionals, government experts, and members of the underground hacking community. If you’re using a secure connection to login via https, then you aren’t at risk, says Wired. If you’d like to force secure connections to GMail and your browser supports Greasemonkey, check out Mark Pilgrim’s handy script.

Will there be another Wi-Fi Shootout? Stay tuned.

Predatory undercover reporter Michelle Madigan (Associate Producer of NBC Dateline) was publicly outed at DefCon and ran for cover.

source : dailywireless.org

No comments:


Total Pageviews