The focus might be on means which you can use to subvert the security of this program. Including api calls which you can use in manipulating the device or in promoting malware. There will be also protection of important SQL saved procedures which can be used in the same manner, for example there was an undocumented retained process that can blank the computer Administrator code.
Resources: push a laptop computer with many version of screens (even on a VM is okay). A c++ compiler as well as a copy of graphic C#
Chuck Easttom Chuck has been in the IT business for over 25 years, they have written 21 e-books, such as many on computer security, forensics, and cryptography. Chuck has also authored many studies posts about cyber protection such as a few on spyware development method. Mr Easttom try a frequent audio speaker at most seeking arrangement protection activities such as presenting a workshop at DefCon 2016 but also: SecureWorld Dallas, SecureWorld Houston,ISC2 safety Congress, HakonAsia, protect Jordan, and many more. ‘” 2_Saturday,,,Workshops,”Octavius 5″,”‘Subverting Privacy Exploitation Using HTTP'”,’Eijah’,”‘
Eijah Creator, Demonsaw
The planet is starting to become an extremely harmful destination. Governments and businesses invest billions of bucks yearly to produce newer and cutting-edge development created for one function: the exploitation your exclusive marketing and sales communications. How did we let this take place? And what are we going to would about it? Become we ready to stay idly by and live-in a situation of fear while our very own liberty of message try calmly revoked? Or perhaps is indeed there anything we can do in order to test the condition quo and use our very own abilities to protect our very own privacy plus the privacy of others?
The Hypertext move Protocol (HTTP) is actually an application-layer process that’s the foundation of the current online. Initially produced by Tim Berners-Lee in 1989, HTTP remains the best process used these days. Among key speciality of HTTP is that it really is flexible enough to send just about any facts. HTTP can everywhere – it’s in use on desktops, cellular devices, as well as IoT. As a result of common characteristics of HTTP, firewalls and proxies include configured by default to allow this kind of visitors through. Could HTTP be used to communicate tightly while entirely skipping community control policies?
This workshop challenges the assumption that HTTP cannot promises confidentiality of information. It will probably expose you to the HTTP protocol and indicate the way it enables you to send information firmly. We are going to produce command-line solutions in C/C++ on Linux that’ll incorporate HTTP to securely send emails throughout the Web, while bypassing firewall and proxy procedures. We’ll use several ciphers, hashes, and other cryptographic behavior being part of open-source libraries. Whether you’re an expert programmer, end up just a little rusty would like a refresher training course, and on occasion even should you decide’d never ever created a protected software in C/C++ before; this workshop is actually for your.
Please be aware that was a medium-level, technical working area and needs that attendees have actually prior experience in a minumum of one program coding language, preferably C or C++. Deliver the notebook, a USB flash drive, and your best C/C++ 11 compiler (>= gcc/g++ 4.9.2 or msvc 2015).
Prerequisites: Previous expertise in a minumum of one programming language is required. Earlier knowledge about C/C++ and cryptography is effective, not expected.
Eijah Eijah could be the creator of Demonsaw, a secure and unknown records sharing plan. Going back 5 years he had been in addition an elder designer at Rockstar Games in which the guy handled big Theft Auto V. Eijah has over fifteen years of computer software development plus it Security experiences. His profession possess covered an easy selection Internet and mid-range technology, key security, and system structure. Eijah is a faculty associate at several schools, has spoken about security and developing at DEF CON and Hack Miami meetings, and holds a master’s degree in computers technology. Eijah are an energetic person in the hacking community and is also an avid proponent of Web versatility. ‘” 2_monday,,,Workshops,”Octavius 6″,”‘Industrial regulation program safety 101 and 201′”,”‘Matthew E. Luallen, Nadav Erez ‘”,”‘