Sunday, February 06, 2005

Shmoocon Day Two

Here are a few impressions of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 talks I saw during cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 second day of Shmoocon in Washington, DC.

The day started with a rant by Riley "Caezar" Eller on cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 state of security. Caezar wrote Bypassing MSB Data Filters for Buffer Overflow Exploits on Intel Platforms and works for CoCo Corp. (CoCo appears to stand for Connection Optimizing Cryptographic Operator.)

He pleaded for someone to invent a new Internet and asked why ocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r speakers at security conventions do not make similar requests. Such pleas are similar to those who call for replacement of gasoline-powered automobiles with hydrogen-powered vehicles. It's easy to create an end-user product like a hydrogen-powered car, assuming cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 extra costs could be reduced. However, who will finance and build cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 infrastructure that makes such a vehicle worth buying and driving? Therefore, we see more success with incremental products like cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Toyota Prius, which leverage existing fuel infrastructure while offering a more fuel-efficient power system.
I next attended Roger Dingledine's talk on Tor, an anonymous communication system that implements onion routing. I saw Aaron Higbee of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 SecureMe blog cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365re. Roger's presentation was excellent. He was one of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 few speakers who managed to speak clearly, at an understandable speed, in complete and thoughtful sentences, without wasting words. He said Tor has about 15,000 users currently with 100-200 routing servers. Tor is not just for hiding a client's Internet identity; servers can be hidden as well. For example, Bloggers Without Borders is operating a "hidden" Web server. Tor is not peer-to-peer in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 sense that all clients are also servers. Racá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r, you can be a Tor user without carring ocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r people's traffic.

Next I attended a presentation by Lance James and Lucky225 of Secure Science Corporation. They demonstrated that telephone security was, is, and will continue to be broken. This talk was an eye-opener for me, since I don't spend any time on cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 voice side of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 house. The pair showed how features of systems like Free World Dialup can be used to make free calls beyond cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 intended uses. They explained how Caller ID is completely worthless and trivially spoofed. Check VOIP-Info for an introduction to this world. They also mentioned K7.net, IPkall.com, Callwave.com, Ureach.com, Packet8.net, and cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Kphone tool.

I had lunch with Andy Williams from Reuters (who wrote Hackers, Virus Writers Target Mobile Phones based on a Shmoocon briefing) and Marty Roesch, Snort creator and Sourcefire founder. (I saw Ron Gula of Dragon IDS and Tenable Security at cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 con, but couldn't find him for lunch.) Marty made an interesting comment on "intrusion prevention systems" (aka "layer 7 firewalls"). He said it is a commonly accepted security practice to implement access control via a "default deny, allow some" policy. Intrusion preventions systems completely break this best practice. They try to "deny some" and cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365n cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365y "allow all." The tragedy of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 situation is compounded when organizations follow Gartner's advice to remove cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365ir intrusion detection systems and proxies (anocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r "dead" security tool). Now we have exploit traffic that passed through cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 IPS with no way to audit or contain it. This argument is similar to my discussion Considering Convergence? where I recommend against collapsing access control and detection into one appliance.

I cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365n saw Michael "Abadd0n" (zero or letter O, not sure) Lynn introduce radio frequency security issues. Mike wrote AirJack which he presented at Black Hat USA 2002. He is obviously a really smart guy, but he spent way too much time on RF cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365ory and background issues. Even though he spoke extremely fast, he never really got to discuss anything very interesting. He was excited about cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Universal Software Radio Peripheral and related GNU Radio projects.

A similar electro-magnetic cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365me followed, with a presentation on infrared hacking by Major Malfunction. I wish Mike's RF briefing had followed Major Mal's lead in terms of presentation style. Major Mal demonstrated how he completely owned cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 television systems in several hotels by figuring out cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 IR commands used by cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 TV remote. He also discussed brute-forcing and replaying codes to open garage doors, vending machines, auto alarms, and ocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r devices. It seems IR is totally broken too.

The second-to-last talk for cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 day discussed a wireless IDS project by Laurent Butti and Franck Veysset from France Telecom. Their unnamed product is not yet open source and cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365y do not have any public Web presence yet. (I saw cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 name "semper" in cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 title of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 demo, so perhaps that is cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 name of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365ir wireless IDS?) The Snort-Wireless project appears stalled, so it would be nice to see an alternative. They reminded me of an open source switch management project called Netdisco. An audience member piped up about cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 3rd Generation Partnership Project (3GPP) and its support for embedding GPS coordinates in device messages.
I ended cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 day listening to David Hulton (aka H1kari) explain Field Programmable Gate Arrays. K1kari organizes Toorcon and wrote bsd-airtools. He builds embedded systems for Pico Computing and showed how to deploy FPGAs to create fast password-cracking systems. The boards he used are built by Xilinx. More information is available at OpenCores.org.

No comments: