Main   Speakers   CtF   Venue Map   Press/Media   Itinerary   FAQ   Contact   Forum
Speakers

  • The Last Stage of Delirium Group
  • Sheeraj Shah
  • Nitesh Dhanjani
  • Job De Haas
  • Meling Mudin
  • Pokleyzz, Shaharil
  • Dinesh Nair
  • Wong Chun Meng
  • HD Moore
  • Red Dragon (RD)
  • Simos Xenitellis
  • Yerra Ravi Kiran Raju
  • Anurana Saluja
  • Pandir Harris

  • Last Stage of Delirium
    http://lsd-pl.net

    Presentation Title: Microsoft Windows RPC security vulnerabilities
    Presentation Details: The presentation will discuss security vulnerabilities of Microsoft Windows operating systems in the context of RPC communication component. In the beginning a brief introduction to Microsoft RPC with special emphasis on its security will be provided. Further on, the talk will cover reverse engineering techniques that have been successfully applied during the process of a security audit of Windows RPC services along with a description of tools that have been developed for this purpose. Finally, detailed information with regard to exploitation techniques for both stack and heap-based RPC security vulnerabilities will be provided on the basis of examples of recently discovered vulnerabilities.

    Presentation Title: Security Myths
    Presentation Details: The presentation will discuss various security myths that are still common in the security community. The talk will be strongly based upon history and experiences of the LSD Research Group and most well known projects and events the group participated in. Using the specific case studies, impact of several dangerous security myths related to specific technologies or a general approach to security problems will be presented. Finally, the holistic view of the group on security of complex information systems will be presented.

    This presentation is aimed at general audience without the requirement of any experience and skills in the field of computer and network security. Its assumed duration is between 45 and 60 minutes, including time for questions and possible discussion.

    About LSD:

    The general concept of the Last Stage of Delirium Research Group grew in late 1996. From its very beginning it has been an independent (and non-commercial) informal organization, established by a group of four computer fascinates seeking for expert knowledge in the field of computer and network security. At the beginning we were mainly focused on gaining experience in various operating systems' domains (AIX, *BSD, HP-UX, IRIX, Linux, SCO, Solaris, Unicos and Win32). There are four official members of LSD Research Group. These are Michal Chmielewski, Sergiusz Fonrobert, Adam Gowdiak and Tomasz Ostwald (all founders of the group). Currently all work as security engineers in the same research center. Their interests and currently maintained projects can be divided into several categories:

    • Development of technologies for gaining access to systems.
    • Techniques for complex and complete penetration tests.
    • Methodologies of security management of large, distributed and heterogeneous environments.
    • Research experiment with new security solutions, such as distributed host based intrusion detection and prevention systems.
    • Security vulnerabilities research.
    They are also the authors of the following research papers:
    • UNIX Assembly Codes Development for Vulnerabilities Illustration Purposes
    • Kernel Level Vulnerabilities, Behind the Scenes of 5th Argus Hacking Challenge
    • Java and Java Virtual Machine Vulnerabilities and their Exploitation Techniques
    Media coverage on LSD:

    Top

    Shreeraj Shah - Director, Net-Square Solutions
    http://www.net-square.com

    Presentation Title: Defending Web Applications: Strategies, methods and practices
    Presentation Details: Web applications can not be defended by firewall or any other security products. Web application defense strategies require secure coding at application level, knowing your application and protecting them by human intelligence. Knowing your application can lead to profiling your web assets in logical way. Profiling web assets provides better picture of various possible attacks set. Knowing entire attack set greatly helps in designing and implementing defense strategies. Various new design strategies are evolving in area of secure web coding, implementing HTTP/HTTPS security server extensions and following secure practices.

    About Shreeraj Shah:

    Shreeraj is founding member of Net-Square, the company has a strong security research and software development capability. Net-Square has been instrumental in developing and exporting web security components to well known companies in Security arena like Foundstone and NTObjectives. He leads research and development arm of Net Square. He has over 5 years of experience with system security architecture, system administration, network architecture, web application development, security consulting and has performed network penetration testing and application evaluation exercises for many significant companies in the IT arena. In the past Shreeraj worked with Chase Bank and IBM in area of web security.

    Shreeraj graduated from Marist College with a Masters in Computer Science, and has a strong research background in computer networking, application development, and object-oriented programming. He received his graduate degree in Computer Engineering from Gujarat University, and an MBA from Nirma Institute of Management, India. Shreeraj has also authored a book titled "Web Hacking: Attacks and Defense" published by Addison Wesley.

    Top

    Nitesh Dhanjani, Senior Consultant, Ernst & Young
    http://www.dhanjani.com

    Presentation Title: Hacking with Linux Kernel Modules
    Presentation Details: LKMs allow users to write code in the kernel space. Therefore, it becomes extremely easy to use LKMs to perform System Call Interception in order to perform tricks such as: Hide files and processes, trojanize executables, write shell backdoors, and much more. These are the tricks used by authors of most malicious backdoors. Hopefully, this knowledge will allow individuals that have been infected by such backdoors to understand how they work, and how to detect them. Also, two specific examples on how to use LKMs to perform Intrusion Detection will be presented: 1) Howto intercept sys_execve to detect Trojan binaries 2) Howto write your own sandbox environment. In addition, changes within the 2.5+ Kernels will also be discussed. At the end of this presentation, any audience member with minimal programming skills will be able to write his or her own LKMs using the techniques described.  

    About Nitesh:

    Nitesh Dhanjani is a senior consultant at Ernst & Young's Advanced Security Center. He has performed network, application, web-application, wireless, source-code, host security reviews and security architecture design services for clients in the Fortune 500.

    Nitesh is the author of "HackNotes: Unix and Linux Security" (Osborne McGraw-Hill). He is also a contributing author for the best-selling security book "Hacking Exposed 4" and "HackNotes: Network Security".

    Prior to joining Ernst & Young, Nitesh worked as consultant for Foundstone Inc. where he performed attack and penetration reviews for many significant companies in the IT arena. While at Foundstone, Nitesh both contributed to and taught parts of Foundstone s "Utimate Hacking: Expert" and "Ultimate Hacking" security courses.

    Nitesh has been involved in various educational and open-source projects and continues to be active in the area of system and Linux kernel development. He has published technical articles for various publications such as the Linux Journal.

    Nitesh gratuated from Purdue University with both a Bachelors and Masters degree in Computer Science. While at Purdue, he was involed in numerous research projects with the CERIAS (Center for Education and Research Information Assurance and Security) team. During his research at Purdue, Nitesh was responsible for creating content for and teaching C and C++ programming courses to be delieverd remotely as part of a project sponsored by IBM, AT&T, and Intel.

    Top

    Job de Haas, Technical Director, Information Technology Security Experts
    http://www.itsx.nl

    Presentation Title: Hacking software and hardware in a PDA/GSM Device
    Presentation Details: The computer world is getting mobile and connected at faster and faster rates. The latest developments are the integration of mobile phones and PDA's connected with WiFi and GPRS. This presentation will show some means of hacking such a device both at the software and hardware level.

    As an example the XDA (also known as T-mobile PDA, Qtek or Siemens SX 45 ) will be used. Internal aspects of the ARM based PocketPC Phone Edition will be shown, as well as how the phone portion is connected to it. Examples from simple applications such as unlocking the phone to more complicated attacks will be demonstrated such as how to discover and use JTAG in understanding and attacking embedded devices.

    About Job:

    Job de Haas got involved in the area of Internet and security in 1991, during his studies in Electrical Engineering, when he responded to Internet providers' offers to hack their sites and win a free account. Following post-graduate studies in Electrical Engineering and three years of work in aerospace robotics at the Netherlands National Aerospace Laboratory he worked for DigiCash, where he acquired experience in cryptographic techniques used in secure, anonymous payment systems for the Internet.

    Top

    Meling Mudin (spoonfork), Network Security Consultant, Hack In The Box Sdn. Bhd.
    http://www.my-snort.org

    Presentation Title: Putting the Eye on IDS
    Presentation Details: Nowadays, a lot of organizations are deploying Intrustion Detection Systems (IDSes) as part of their security infrastructure. In Malaysia, we have seen IDS deployments in the public sector, and also private sector. However, there are a few questions that are always asked by these organizations when deploying IDSes: What is in it for my organization? Unlike other security devices such as firewalls and VPNs, organizations do not see the immediate value of having an IDS. This is due to vendors who are only keen on selling their products, but never understanding the needs of an organization. This presentation will uncover some of the tactics employed by vendors when pushing their products, and will allow organizations to better decide on an IDS implementation.

    About Mel:

    Meling Mudin is a freelance network security consultant specializing in the areas of intrusion detection and network intrusion analysis. Prior to becoming a freelancer, spoonfork worked as Security Consultant, Software Engineer and System Architect for SCAN Associates Sdn. Bhd. His last major role was as lead architect and designer for SCAN's Managed Security Services solutions. During his free time, he maintains Snort Malaysia's presence located at http://www.my-snort.org. He also fills his idle hours hacking code in Perl.

    Articles/Research Papers:

    Top

    Mohd. Saleh Raub (pokleyzz),Security Consultant, SCAN Associates Sdn. Bhd.
    Shaharil bin Abdul Malek, Security Consultant, SCAN Associates Sdn. Bhd.

    Presentation Title: Silence of the LAMP
    Presentation Details: TBA

    About Saleh:

    Mohamad Saleh Bin Mohamad Raub (pokleyzz) is Security Consultant for SCAN Associates; a Malaysian based consulting and security Services Company. SCAN Associates is also two-time winner of the Capture the Flag hacking competition held last year in Malaysia. Pokleyzz is the author of over 18 white papers detailing exploit details and security vulnerabilities, in closed and open source applications. He is also a seasoned Web security auditor, having done extensive research on security issues within the PHP programming language amongst several others.

    About Shaharil:

    Shaharil bin Abdul Malek is the co-founder and Managing Consultant for SCAN Associates; a Malaysian based consulting and security Services Company. Co-author of over 18 white papers detailing exploit details and security vulnerabilities, in closed and open source applications. Previously member of Malaysian Computer Emergency Team (MyCERT).

    Top

    Dinesh Nair, (alphaque) - Founder/Internet Technology Architect, Alphaque.Com
    http://www.alphaque.com

    Presentation Title:From Script Kiddies to Security Consultants
    Presentation Details: Frequently, the press has misrepresented hackers, crackers and script kiddies. There is a lot of myth and aura about practitioners of computer and network security. This presentation traces the journey of one such individual as he progresses from playing with the public switched telephone system to the TCP/IP networks of today, and the mobile and 3G networks of tomorrow.

    About Dinesh:

    Dr. Dinesh Nair is Internet Technology Architect for Alphaque.Com and has been involved in Internet and Security issues since 1986. In 1996 with Thian Seong Yi, he successfully breached security at Asiaconnect.com in response to a challenge by the company. He currently is involved in Managed Services Provisioning and architecting Internet deployed services and applications and was responsible for architecting Malaysia's Multimedia Super Corridor Telemedicine Flagship Application with WorldCare Asia Pte Ltd.

    Top

    Wong Chun Meng, Senior Consultant, Spectrum Edge Sdn. Bhd.
    http://www.spectrum-edge.com

    Presentation Topic: The Value of Computer Forensics
    Presentation Details: Incident Response (IR) Handling is a hot topic among many organizations these days. Many IT managers in this part of the region are beginning to realize the inevitability of their critical mission systems being compromised. It.s a matter of time. Computer forensics is a component of IR whereby it involves an investigation process to determine what has occurred when a system was compromised.

    This presentation would introduce the world of computer forensics to the audience and more importantly, its importance in an organization.s security framework. In addition, the presentation would also touch on how to perform a thorough computer forensic in a legally binding manner. Lastly, an introduction to an assortment of forensic tools that comprises of commercial programs and open-source tools would be presented as well. During the course of the presentation, the speaker would share his consulting experiences with clients ranging from multi-national organizations to government bodies to the audiences.

    About CM:

    Chun Meng has more than 5 years experience in the IT security field and is responsible for providing consulting services and security training for Spectrum Edge's customers. Areas of expertise include designing security management infrastructures, systems security, system forensics and ethical hacking focusing on Unix and Windows platforms. Chun Meng has provided his expertise to various financial institutions, government bodies, and multinationals primarily in Singapore and Malaysia. Prior to joining Spectrum Edge, Chun Meng worked as a consultant for Infinitum Security in Singapore, performing mainly ethical hacking and security systems audit work. In addition, he has contributed articles to CNET Asia as well as being an avid speaker at major security conferences in his own free time. Chun Meng graduated from Monash University with a Bachelors Degree in Electrical Engineering and is a Certified Information Systems Security Professional (CISSP).

    Published Articles:

    Speaking Engagements:

    • SingCERT - Securing your webserver, facts and myths : Real world cases from a real world practitioner
    • INTSO - Can Managed Security Services (MSS) Really Solve Your IT Security Problems?"

    Top

    HD Moore, Principal Architect, Digital Defense Inc.
    http://www.digitaldefense.net

    Presentation Topic: Advanced Exploit Development
    Presentation Details: This presentation focuses on the tools, techniques, and frameworks that can be used to write truly advanced exploit code. Some basic exploit information will be covered, as well as the current state of development, recent trends, and an exclusive look at a number of previously unreleased tools. Attendees will be provided with early access to version 2.0 of the Metasploit Exploit Framework; this package implements many of the techniques presented.

    About HD:

    HD is one of the founding members of Digital Defense, a security firm that was created in 1999 to provide network risk assessment services. In the last four years, Digital Defense has become one of the leading security service providers for the financial industry, with over 200 clients across 43 states. Service offerings range from automated vulnerability assessments to customized security consulting and penetration testing. HD developed and maintains the assessment engine, performs application code reviews, writes exploits, and is often involved in penetration tests.

    Before Digital Defense, HD was one of the youngest employees of Computer Sciences Corporation; developing security tools for the Department of Defense while still in high school. HD has created and contributed to many open-source security projects, presented at a handful of conferences, and has been publicly active in the info-sec community since 1997.

    Research sites:

    MetaSploit Project: http://www.metasploit.com
    Digital Offense: http://www.digitaloffense.net
    Research papers:
    Terminal Emulator Security Issues
    Media links:
    Hacker finds fault in .Net security
    Learn to secure your ASP.NET applications with these tips
    Problems with the FTP protocol
    Cracking Tools Get Smarter.

    Top

    Red Dragon (RD), Unix Coder, Writer, The Hackers Choice
    http://www.thc.org

    Presentation Topic: Advanced Linux Kernel Keylogger
    Presentation Details: This presentation will discusses some of the more advanced techniques in writing kernel based keyloggers and will present the newest release of THC-vlogger 2.1 with new keystroke logging techniques and more features such as centralized logging. THC-vlogger, first presented in Phrack Magazine #59, enables the capability to log keystrokes of all administrator/user's sessions via console, serial port and Telnet/SSH remote sessions, switching logging modes by using magic passwords, stealthily sending logged data to centralized remote server.

    Its smart mode can automatically detect password prompts to log only sensitive user and password information. This talk will also discusses the recently published tool in PHC's 'fake' phrack #62 dealing in the detection and disabling of Sebek, a host based honeypot monitoring tool of the Honeynet project. The presentation will also discuss the advantages of THC-vlogger 2.1 over Sebek and other similar keylogger tools.

    About RD:

    RD is a seasoned hacker and active member of The Hacker's Choice (THC). His security papers have been published in Phrack magazine and other security publications. RD is also a founding member of the Vietnamese security research group vnSecurity, a pioneer infosec security consulting company in Vietnam.

    Published Articles:

    Top

    Simos Xenitellis
    http://simos.info/

    Presentation Title: Event-driven system security vulnerabilities, an overview and demonstration
    Presentation Details: The event-driven model is used to implement software systems like graphical user interfaces (GUIs). An example of such a GUI is Microsoft Windows which we examine in detail. In an event-driven system, applications communicate with each other and with the system through events. While in Windows NT/2000/XP/2003 there is memory protection between applications belonging to different users, there is no protection against receiving events. Thus, events turn out to be a vector of attack.

    This presentation will explain the basics of event-driven systems, provide demonstrations, give an overview of existing work on security vulnerabilities in event-driven systems and discuss future developments.

    About Simos:

    Simeon (simos) Xenitellis is a PhD student at the Information Security Group, Royal Holloway University of London, United Kingdom. He holds an M.Sc. in Information Security from Royal Holloway University of London, United Kingdom. He did his first degree at the TEI of Athens, Greece in Informatics (Computer Science).

    His research interests include identification methodologies for security vulnerabilities, vulnerabilities in event-driven systems and static analysis. He has written a guide on open-source public-key infrastructures (http://ospkibook.sourceforge.net/) and wishes to find the time to work more on it.

    Published Articles:

    - Security vulnerabilities in Event-Driven Systems
    - A New Avenue of Attack: Event-driven System Vulnerabilities

    Top

    Yerra Ravi Kiran Raju, Principal Consultant, NSS MSC
    http://www.mynetsec.com

    Presentation Title: New Generation Frauds
    Presentation Details:

    Security is not the issue of devices, its the issue of people. Many creditcard companies/banks are changing their panorama of e-transactions such as upgrading Traditional Magnetic Strip to Smart chip based authentication or dual authentication, unfortunately every change has a counter effect like New Generation Cloning (Smart Card Cloning).

    This presentation will discuss the new generation frauds such as credit card cloning, smartcard cloning, credit card "trading", smartcard "ripping" with some case studies.

    The presentation also discusses online money laundering issues which may impact the govt and financial sectors adversely.

    About Ravi:

    Ravi completed PG Honors in Computer Science from RGICS, Hyderabad. He supported major media sources in respect of featured stories on the impact of cyber crime in Asia. Ravi possesses the premier Certified Ethical Hacker certification from EC Council, International Council of E-Commerce Consultants, USA. He has worked extensively with leading IT firms in the world, testing and identifying vulnerabilities in their networks, databases and products with various self designed and customised tools.

    These have covered a diverse range of industries and such specialized fields as banking specialized in providing "anti-ATM hi-jacking" solutions. He has executed major projects related to telecommunications security and net telephony (where he identified major vulnerabilities for one of the world's largest internet phone firms).

    Currently he is heading penetration testing, security practice and investigation teams at NSS. Net Psychology is one of his favourite topics. Ravi has also built a formidable reputation as a "cyber sleuth", and has successfully investigated many cases of computer abuse/misuse through network and computer forensics. He is researching on Hacking, Online Frauds & Prevention at Centre for Information and Network Security, University of Pune and he has devised many exploits like FSO (file system objects) and Docs (system Reshell calling). He has conducted numerous seminars/workshops on "Ethical Hacking" in India, Malaysia, dubai and Singapore. ELERT in Dubai, Ethical Hacking in KL, ATM, Creditcard & GSM frauds in Singapore and Technological Social Engineering in Singapore.

    Top

    Anurana Saluja, CISSP - Head Business Development, NSS MSC
    http://www.mynetsec.com

    Presentation Title: Threats to Wireless Networks - War Driving
    Presentation Details: Wireless networks have become one of the most interesting targets for hackers today. Organizations today are deploying wireless technology at a rapid rate, often without considering all security aspects. This rapid deployment is due, in part, to the low cost of the devices, ease of deployment, and the large productivity gains.

    The 1980s, saw "war dialing"--dialing phone numbers until an open modem is found--to access networks. The '90s Internet boom saw other means of attack, such as IP scanners and packet sniffers. Enter the next generation of nefarious network intrusion: war driving.

    This presentation shall touch upon the issues related to wireless security.

    About Anurana:

    He heads the Business Continuation & Disaster Recovery Planning practice of the company. Anurana is a Certified Information Systems Security Professional (CISSP), this security certification is administered by the International Information Systems Security Certification Consortium or (ISC)2. He has formulated the Disaster Recovery and Airbase Rehabilitation plans for the Indian Air Force. He is a certified Open Source Security Expert. A number of published technical cyber security white papers are to his credit. He was awarded the Gold Medal by the USI - a defence think tank for his research paper on cyber security and knowledge management in the armed forces. An ex-fighter pilot from the Indian Air Force awarded a gallantry award for successful handling and risk management of an air-borne emergency situation.

    Top

    Shaheezul (Pandir Harris), Software Engineer, SCAN Associates Sdn. Bhd.
    http://www.scan-associates.net

    Presentation Title: Snort over IPv6
    Presentation Details: TBA

    About Pandir:

    Shaheezul (Pandir Harris) is currently a programmer for SCAN Associates, focusing on the network security area. At the same time, he is also an IPv6 enthusiast. For past couple of years, he has been working on few IPv6 applications such as IPv6 protocal traslator(NAT-PT), and mobile IPv6. He was also involved in the development of the first and only Malaysian IPv6 tunnel broker (http://tbroker.manis.net.my/) and always exprimenting with latest applications. He was also a co-author on some conference and technical papers presented in APRICOT and IPv6 Summit events.

    Top

    Supporting Organizations

    Malaysian National Computer Confederation

    Special Interest Group in Security & Information InteGrity Singapore
    Sponsors
    Official Hardware Sponsor
    Silver Sponsor
    Silver Sponsor
    Silver Sponsor
    Bronze Sponsor
    NSS MSC
    Media Partners

    Official Media Partner

    Official Internet Magazine
    © 2003 Hack In The Box (M) Sdn. Bhd.
    HTML and PHP by spoonfork (mel at hackinthebox dot org)