Introduced in 2008, the HITB Labs form the third track in our triple-track line up. Catering for only 60 attendees, these sessions are intensive, hands-on presentations that require audience interaction so please bring your own laptops if you intend to attend. Seats are given out on a first come first serve basis so be sure to be at the room at least 10 minutes before the session commences.
1st July 2010
10:30 – 12:30 – LAB 1 – METASM LAB
Alexander Gazet (Sogeti ESEC Research & Development) & Yoann Guillot (Sogeti ESEC Research & Development)
13:30 – 15:30 – LAB 2 – ADVANCED LOCK PICKING & PHYSICAL SECURITY BYPASS
2nd July 2010
10:30 – 12:30 – LAB 3 – MALWARE ANALYSIS WORKSHOP (TOOLS & METHODOLOGIES)
Wes Brown (Principal Consultant, IOActive)
13:30 – 15:30 – LAB 4 – ARDUINO LAB
Barry van Kampen (ITQ / HITB Crew .NL)
LAB 1 – METASM LAB
Malware code gets more and more sophisticated, requiring always more powerful tools to handle. Metasm is a framework to manipulate binary code, and it is well adapted to work on this kind of programs. The framework is full-ruby, which means you can script, automate or replace any part of it. This course will introduce you to the basics of the framework, and will also introduce some advanced features, so that you are well armed to face binary protected code.
LAB 2 – TOOOL .NL ADVANCED LOCK PICKING & PHYSICAL SECURITY BYPASS
Toool is the The Open Organisation Of Lockpickers, a growing group of enthusiasts interested in locks, keys and ways of opening locks without keys. On this site you will find information about us getting together to practice our skills, about the conventions and championships we organize and lots and lots of information about our hobby
LAB 3 – MALWARE ANALYSIS WORKSHOP (TOOLS & METHODOLOGIES
Wes Brown, a Principal Security Consultant with IOActive, has spoken in the past about automating malware. Now that a framework has been established to analyze malware, a workshop will be conducted on methodologies and techniques used to conduct this process manually but aided by automated tools. A LiveCD will be provided to workshop attendees containing a full malware analysis environment. This environment is a further evolution of the prototype that was shared in the past, and is user-extendable should you desire to add your own tools and modifications to it.
Among the techniques reviewed will be memory inspection, debugging, hooking, as well as PE file examination. Techniques that malware use to avoid being inspected will be discussed along with ways to work around them. The malware workshop environment will also be walked through and each tool demonstrated so that the workshop attendee would leave with a good grasp of how and when to use them.
LAB 4 – ARDUINO LAB
Arduino is an open-source electronics prototyping platform based on flexible, easy-to-use hardware and software. It’s intended for artists, designers, hobbyists, and anyone interested in creating interactive objects or environments. This workshop will give you an impression what Arduino is, what the hardware platform and extensions does, how you can work with the hardware and interface. Finally we will show you step by step how we made one (may-be more) of our projects like Blinky (our LED board), the Garduino (for Garden automation) or our Hackerspace automation system. Afterwards you are able to do some hands-on in the Hackerspaces village.