Vulnerability Development mailing list archives

G-Con Announcement


From: "Enrique A. Sanchez Montellano" <esanchez () avp com mx>
Date: Fri, 22 Nov 2002 10:03:10 -0600

Hackers vs Security Consultants

What is G-Con?

In the changing environment of Internet security, you must have complete
control over your
security and your network, especially in the face of massively escalating
vulnerability report
rates and actual network intrusions.
You need to know your enemy, their motives, their techniques and their
abilities, that is why Kelsi
Siler has generated the first congress of high level intrusions in Mexico …
G-Con.
Everything from "Capture The Flag" games to live demonstrations of advanced
penetration
techniques will be included in this congress of security professionals. This
has never before
been done in Mexico - a gathering of both the hacker and Infosec mindsets
for you to learn from.

Objectives:
            Generate a complete view for security within the mexican market
due to recent integration of
networks on global level.
Breaking the myths anf generalization about security and hackers, to know
who knows security and who doesn’t.

Date and Place:
              December 2nd and 3th 2002 at ITESM Campus Estado de Mexico.
Entrance: 3,000 Pesos. (300 dlls)


Speakers:

Speaker: Anakata
Conferences: Complex explotation scenarios, including memcpy() techniques,
also various shellcodes.
About the Speaker: http://www.anakata.hack.se
Latest Conferences: | None |
Description:

Speaker: Dave Aitel
Conference: Advanced Windows Overflows
About the Speaker: http://www.immunitysec.com
Dave Aitel is a founder and security consultant at Immunity, Inc,
based in NYC. His public contributions to the security community include
SPIKE, the application assessment suite, and vulnerabilities in major
systems such as Windows NT's RPC stack, and Microsoft Exchange and
Microsoft SQL Server 2000.

Latest Conferences:

BLACKHAT USA 2002
An Introduction to SPIKE, the Fuzzer Creation Kit
Dave Aitel, Immunity, Inc
[ Their Presentation ] [ Application Security ]
SPIKE (spike.sourceforge.net) is a tool created in order to better
analyze new or complex network protocols. Publicly, SPIKE is best
known for locating 2 of the recent IIS vulnerabilies; privately, it has
located many more.
Although SPIKE is a fuzzer, and there are many fuzzers, SPIKE
has some unique theoretical underpinnings. These, and the SPIKE API itself,
will be presented, along with some interesting demos.

Description:
Like Unix, Microsoft Windows exploitation techniques are advancing at a
dizzing pace. From portable shellcode, passing difficult filters, or
just finding vulnerabilities buried under layers of DCOM, the security
community is starting to get a grip on how to best penetrate Win32
machines. This talk will focus on some of the recent developments, with
demonstrations and low-level examinations of the techniques used by
advanced Win32 exploitation.
No previous knowledge of Windows is necessary to understand this talk,
although you should be familiar with basic overflow and x86
architecture.


Speaker: Gerardo Richarte
Conferences:Advanced PTrace explotation
                     Automated Pen-testing.
About the Speaker:
Gerardo Richarte - Director, CORE SECURITY TECHNOLOGIES
Gerardo Richarte is a Co-Founder and Director of Core. Before founding
Core-SDI in 1996,
he was a team member of the Special Projects Group at Dirección General
Impositiva (AFIP / DGI),
the Argentine tax agency. He was also an independent consultant for several
Argentinian companies
and government agencies, as well as group member of the Frenetik Research
R&D Group, a
non-profit organization in Argentina.
Mr. Richarte studied computer science and mathematics at the University of
Buenos Aires (UBA), Argentina.
Latest Conferences:
Paper: Bypassing the StackShield and StackGuard protection
Paper: Advances in format string exploitation
Conference: Cansecwest / vancouver / canada
Descriptions: Live demostration of Core Impact, Demostration and Live
Explotation of Ptrace.


Speaker: Mattias Bääth
Conference: Advanced PKI implementation on the comercial and militar level.
About the Speaker: | none |
Latest Conferences: | none |
Description: | none |


Speaker: Mark Hardy
Conference: Advanced Crypto techniques for total control and security.
About the Speaker: http://www.g-con.org/expo/hardy.pdf
Latest Conferences: http://www.g-con.org/expo/hardy.pdf
Description: http://www.g-con.org/expo/hardy.pdf


Speaker: Luis Guillermo Castañeda Estañol
Conference: Advanced PE esteganographic infection [Proof Concept
Parasites/Infection]
About the Speaker:
Latest Conferences:
Paper: Advenced Polimorphic & Steganographic PE/ELF Memory Infection
Paper: The Disinfection Technique
Paper: Inyecting Code in the PE Infraestructure
Paper: Fraccionary Windows Kernel Hacking
Conference: Steganographic analisis "the rupture of the *crypt*" &
Steganographic Memory
                    Usurpation. ITESM CEM/DEGREE
Conference: A day into the virii programmers Life. ITESM CEM/Degree.
Conference: The Steganalisis Exposed.
Description: Memory Usurpation bypassing Permises Arbitrary under Windows
2000/NT/XP,
Steganographicall Box Making, Parasitary Infection, Deploy of the
steganographic Machine
by security common Failures under windows kernel.


Speaker: Enrique Sanchez
Conferences:   Advanced polimorfic virus with steganographic parser on UNIX
                        Beating the forensics analizis (Stego tool)
                        Taking over a corporative network in less than 50
lines of C code
About the Speaker: Kaspersky Lab Chief Technicall Officer.
Latest Conferences:
Conference: The Steganalisis Exposed.
Conference: DEF CON Nine Speakers "Didse: Distributed Intrusion Detection
System Evation"

Description: | none |


Speaker: GOBBLES
Conference: Wolves among us, CISSP and their weakness
About the Speaker: Security Research and Development non-profit Group.
Latest Conferences:
Defcon X Wolves among us
Summercon 2002
Description: | none |
Speaker: Tiago assumpcao
Conference: Steganography in kernel and process within linux (A real
demostration)
                    NOD32 Research Advanced Speech
About the Speaker: | none |
Latest Conferences: | none |
Description: | none |

Speaker: Eduardo Ruiz Duarte
Conference: WarDriving in Mexico City
About the Speaker: Kaspersky Lab Main Development Staff
Latest Conferences: Linux Steganographical File Systems
Description: | none |


Current thread: