Today at the meshU conference I gave a talk about secure programming, with a focus on the web. There were 2 token slides for the C and C++ devs out there, which ended up working perfectly because there were only two people in the room who wrote C/C++ 🙂
I gave a talk a few weeks ago at SpoofIT, the IT Security club at UOIT. I referred to a number of links and resources during the talk but haven’t had a chance until now to post a list of them. I’ve also written up a little summary of the talk for those who missed it. I owe a huge debt of inspiration to James Arlen’s talk at The Last Hope, which you can download at the hackermedia archive or on bittorrent at the HOPE tracker. It’s the one titled “From Black Hat to Black Suit”. He’s been doing this a lot longer than I have, so go watch his talk too 🙂 Continue reading “Career talk at SpoofIT”→
Paul and I turned in pretty early on Day 2 and managed to make the first talk on Day 3, though not without the assistance of Club Mate and Starbucks. Day 3 was where things started to get really hairy in terms of being able to get into rooms to see the talks I wanted to see; I ended up missing the RFID talk I really wanted to see in favor of getting to the room for the Storm talk half an hour early. But that’s what conference recordings are for, isn’t it!
Continuing on from my post from a couple of days ago, here are my notes from Day 2 of the 25th Chaos Communications Congress in Berlin. I’ve been slow with getting these posted – Day 2 was December 28th. Better late than never, right?
Finally, if you’re particularly interested in anything I’ve written about, you should check out the official recordings here. Most of the talks have been posted both as direct downloads and torrents. I can’t even begin to say how amazing this is given that the conference is barely over. From what I hear as well the live streams coming from the conference while it was running were also totally solid.
And now for the actual comments about this day’s talks!
attack has been fully weaponized to USB keys (or functional iPods) and PXE boot
Jake has found a somewhat unrelated bug in Mac OSX’s Login.app which results in logged-in users’ passwords being stored in RAM; Apple is aware of the issue and not fixing it. Same for FileVault keys [o_0]
Linux dm_crypt is vulnerable
loop_aes devs thought they weren’t vulnerable because of some key-shifting stuff they do, turns out it just means that they store twice the keydata 🙂
Co-author of USENIX paper Nadia wrote an awesome keyfinding tool which can grab keys from RAM even with something like 75% corruption
Bitlocker default / simple mode is totally pwned
Even with TPM in use Bitlocker is still vulnerable if precise timings are used