Full Disclosure mailing list archives

New Speakers at PHDays IV: How to Hack Gmail and WordPress and Spy through TV


From: Alexander Lashkov <ALashkov () ptsecurity com>
Date: Fri, 28 Mar 2014 09:10:58 +0000

Hacking emails of authoritative users is usually accompanied by debates about the identity of such email correspondence 
that became available on the Internet. Until now, we thought that a correct DKIM signature indicates at the author of 
the correspondence containing this signature. But can we trust this authentication mechanism? Vulnerabilities in 
Google, Yandex and Mail.Ru will be discussed at the international information security forum Positive Hack Days IV, 
which will be held on May 21 and 22 in Moscow.

Secure protocols are used insecurely

The number of Google, Yandex and Mail.Ru users approaches one billion; hundreds of experts from all over the world are 
involved in security analysis of these services. However, no one is secured against vulnerabilities. Vladimir Dubrovin 
(3APA3A), the founder of Securityvulns.com and developer of the 3proxy server, one of the most outstanding 
representatives of the Russian old school, will speak on the misuse of both well-known (SSL/TLS and Onion Routing) and 
recent protocols insuring privacy, integrity and data encryption. Vladimir will also present new attack vectors aimed 
at accessing data that are processed by various services, including email.

A smart spy in your house

At the beginning TV were just supposed to be TV. They were used to make people's life happier. Nowadays, TV are 
fully-featured PC, having a proper OS, camera, microphone, web browser, and applications. They still make people happy. 
Especially the malicious ones.

Donato Ferrante and Luigi Auriemma , the founders of ReVuln, known for discovering vulnerabilities in SCADA and 
multiplayer games, will speak on the current status of Smart TV, exploring their attack surface, detailing possible 
areas of interest, and demonstrating some issues the speakers found while assessing the security of Smart TV from 
different vendors.

ARM exploitation

Participants of Aseem Jakhar's workshop will take their laptops and plunge into security issues of ARM. Aseem Jakhar is 
a researcher at Payatu Technologies and one of the founders of Nullcon. He will consider low-level programming starting 
right from the ARM assembly, shellcoding, buffer overflows, reverse engineering to сode injection.

The workshop has a lot of hands-on to get the participants comfortable with ARM assembly and understand the issues 
involved in exploitation of ARM-based Linux systems. To make the workshop more interesting, it uses Android as the 
platform for learning ARM exploitation and hence it covers Android OS specific developing and security concepts.

How to bug a conversation held on the other side of the planet

Lately, phone communications records can be found in the Internet and even be heard on TV. It is obvious that such 
records were obtained without the knowledge of the subscribers. Many of us received weird text messages and, after 
that, long bills for mobile services.

Sergey Puzankov, an expert at Positive Technologies specializing in mobile networks safety, will consider the 
possibilities of an intruder who has access to SS7. The author will speak about algorithms of attacks aimed at: 
disclosure of subscriber’s sensitive data and his or her location, changing dialing numbers of enabled services, call 
redirection, unauthorized intrusion into communication channel. Attacks are performed using recorded signaling 
messages. The research also consider proactive protection against such attacks and methods of investigating incidents 
related to vulnerabilities in a signaling network.

Moloch the investigator

Thousands of years ago, people made human sacrifice to Moloch, an ancient god. The report about Moloch as a highly 
scalable and open source full packet capture system does not contain such bloodthirsty elements (intruders might think 
otherwise). The system can capture from the wire live for use as a network forensics tool to investigate compromises. 
It also serves as a great way for searching and interacting with large PCAP repositories for research (malware traffic, 
exploit/scanning traffic) Its web API also makes it extremely easy to integrate with existing SEIM’s or other alerting 
tools/consoles to help speed up analysis.

Andy Wick and Eoin Miller are members of AOL’s Computer Emergency Response Team. The hands/on lab will be focused on 
how AOL uses Moloch combined with IDS systems (Suricata/Snort) feeding alerting into consoles/SEIM’s (Sguil/ArcSight) 
to help defend their employees, users and the Internet at large. The experts will also run Moloch to capture the 
traffic that is occurring during PHDays CTF and analyze all the incidents.

Industrial cybersecurity and critical infrastructure protection in Europe

The events that have taken place during the last years (from 9/11 attacks to WikiLeaks and the Stuxnet malware) have 
made the governments to include in their agendas the development of national cybersecurity strategies to protect their 
critical infrastructures.

Ignacio Paredes, Studies and Research Manager at the Industrial Cybersecurity Center in Spain, says that hundreds of 
thousands of industrial infrastructures across Europe are at stake. The report will consider the relation between 
industrial and corporate environments and its impact in key organizations for the survival of a country as well as 
current trends in the convergence between industrial and corporate systems, threats and countermeasures.

WordPress security

With approximately 19% of the web running on WordPress, it comes as no surprise that the security of this content 
management system has an enormous impact on a large number of users. Despite being open source, and reviewed by 
security researchers, WordPress is—just as any other software—prone to errors and vulnerabilities.

Tom Van Goethem, a PhD student at KU Leuven (Belgium), will tell PHDays IV participants how the unexpected behavior of 
MySQL led to the discovery of a PHP Object Injection vulnerability in the WordPress core. The author will also 
demonstrate how this vulnerability can be exploited.

If you want to present your report (http://www.phdays.com/program/call_for_papers/) at the international information 
security forum, you must hurry up, because you can submit your application till March 31. Anyways, there are other ways 
to join PHDays IV (see here http://www.phdays.com/how_to_join/).

_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Current thread: