[ :: mainpage :: register :: conference :: training :: venue map :: agenda :: press/media ]
[ :: capture the flag (CTF) :: zone-h hacking challenge :: open-hack :: forum :: sponsors ]
[ :: contact :: past conferences :: open source security project showcase ]

Conference presentation materials have been released.
You can download them from Packet Storm

Tim Pritlove

Filed under: Conference Speakers — Administrator @ 8:18 pm

April 21, 2005

Presentation Title: Project Blinkenlights
Presentation Details:

B L I N K E N L I G H T S

In 2001, Project Blinkenlights developed the “Blinkenlights light installation in Berlin, Germany turning the “Haus des Lehrers building at Alexanderplatz into a huge computer screen, worlds most interactive light installation achieving a broad range of public participation. The “screen consisted of 18 windows in 8 floors therefore providing a matrix of 144 monochrome “pixels that could be individually turned on and off. Blinkenlights combined the charme of a low tec installation with high-profile computer programming and managed to deliver a high level of participation for the public. People could send in their own animations to be played back on the screen. They could also play the classic computer game Pong in real time just using their mobile phone.

A R C A D E

Encouraged by the great success of the installation, the group got invited to join the Nuit Blanche art exhibition in 2002 in Paris to create the successor project named “Arcade. Targetting the Biblioth que nationale de France, the group managed to build worlds big gest interactive light installation so far. The installation made use of greyscaling redefining the appearance and flexibility compared to the original installation. The screen used 26 windows on 20 floors resulting in 520 “pixels. Each pixel allowed displaying 8 dierent brightnesses. The installation covered 3370 square meters making it visible from many kilometers away.

About Tim:

Tim Pritlove is a long time computer hacker, events organizer and member of the Chaos Computer Club. Working as a programmer, teacher and consultant he played around with a variety of computer systems and computer networks since the early eighties. He is the organizer of the annual Chaos Communicaton Congress and the quadren nial Chaos Communication Camp. Tim is the coordinator and project leader of Project Blinkenlights that became famous for interactive light installations in public buildings. In another life, he is an assistant professor and system administrator at the University of Arts in Berlin.

Anthony Zboralski (Gaius)

Filed under: Conference Speakers — Administrator @ 8:18 pm

Presentation Title: Social Engineering Fundamentals
Presentation Details:

** Presenting with Dave Mckay

“You might say there are two specialties within the job classification of con artist. Somebody who swindles and cheats people out of their money belongs to one sub-specialty, the grifter. Somebody who uses deception, influence, and persuasion against businesses, usually targeting their information, belongs to the other sub-specialty, the social engineer.” -Kevin Mitnik

In today’s world confidence scams present quite possibly the highest threat to security with in the business world. Control of information, withholding and leaking, can lead to massive failures and losses depending on how skilled the attacker may be. In combination with disinformation and propaganda, social engineering can as fatal as or even lead to loss of customer and shareholder confidence.

About Anthony:

Anthony Zboralski leads Bellua Asia Pacific, an Information Security consulting company based In Jakarta, Indonesia. He has more than 9 years of experience performing penetration tests, assessments, forensics and related services for some of the largest banks in Asia and a dozen Fortune 500 companies including Aerospatiale, Air France, Allianz, AXA, Electricite de France, Lagardere-Matra…

He is also known as Gaius, one of HERT cofounders and wrote some articles for phrack and hert.org (tunnelx, ciscogdb, procx, etc.). Anthony has been involved into hacking and security community since 1989 (started on x25 with otosync and bayernpower [Matthias]). He is 29 now, living in Indonesia with wife and two kids.

Dave Aitel

Filed under: Conference Speakers — Administrator @ 8:17 pm

Presentation Title: Nematodes - Beneficial Worms
Presentation Details: This presentation presents concepts for taking expoitation frameworks into the next evolution: solving complex security problems by generating robustly controllable beneficial worms. The Why, How, and What of Nematode creation are discussed, along with some concepts in Mesh routing.

Problems discussed include legal issues, controlling your worm, writing an intermediate language, the Nematode Intermediate Language (NIL) for writing robust worms, reliability problems, commications protocols, and future work.

About Dave:

Dave Aitel is the CEO of Immunity, Inc, and is still responsible for research and development for their flagship CANVAS product. In addition, he created and distributes under the Gnu Public license the fuzzing tool, SPIKE, the web application analysis tool SPIKE Proxy, and the remote access tool Hydrogen.

His original stint was as a computer scientist at the National Security Agency, after which he spent a few years at @stake, a private security consulting firm, and finally started Immunity, Inc. Immunity’s product CANVAS is used by penetration testing firms, government agencies, large financial firms, and other companies who wish to simulate information attacks against their infrastructure.

Roberto Preatoni

Filed under: Conference Speakers — Administrator @ 11:57 am

April 20, 2005

Presentation Title: Corp. vs. Corp: Profiling Modern Espionage
Presentation Details:

** Presenting with Fabio Ghioni

An impressionistic overview of what makes the difference today and in the future (in the digital playground) in the balance of power between economic and military powers. The presentation will also cover a description of the business behind espionage worldwide as well as the asymmetric organizations that are the real master of puppets.

- How do digital espionage asymmetric networks work
- Secret servicies and network mercenaries
- Prevention and monitoring vs data retention and “special laws” in today’s terrorism and data theft situations.

About Roberto:

Roberto Preatoni (aka Sys64738): 37, is the founder of the defacement/cybercrime archive Zone-H (http://www.zone-h.org). He’s also CEO of an International ITsec company (Domina Security) which is active in European and former soviet countries. He has been globetrotting, lecturing in several ITsec security conferences, including Defcon in the US. He has been interviewed by several print and online newspapers where he shares his experiences relating to cyberwar and cybercrimes.



Look out for the special edition Zone-H Comic “Clustermind” that will be released at HITBSecConf2005 - Malaysia!

Fyodor Yarochkin

Filed under: Conference Speakers — Administrator @ 11:57 am

** Presenting with Meder Kydyraliev

Presentation Title: STIF-ware Evolution
Presentation Details:

Meder and Fyodor have been working on their concept of common framework to unify offensive part of heterogeneous security data and security tools into a single unit - security tools framework. At this conference they will be presenting the evolution of STIF framework into what they call now “STIF-ware” - a set of STIF relevant modules that would allow the computer security hobbists to build, control and monitor the distributed network of “automated hacking” agents, guided by set of goals and targets, assigned to the system.

Expect this presentation to include some new tools and hopefully some exciting demos. :)

About Fyodor:

Fyodor Yarochkin is a security hobbyist and happy programmer with a few years spent in business objectives and the “security” service delivery field. These years, however, weren’t completely wasted - Fyodor has been contributing his spare time to a few open and closed source projects, that attracted limited use among non-business oriented computer society. He has a background of system administration and programming and holds Engineering degree in Software Engineering.

Note: Fyodor is not ‘nmap Fyodor’. (http://www.snort.org/docs/faq.html#1.2)

Meder Kydyraliev

Filed under: Conference Speakers — Administrator @ 11:56 am

** Presenting with Fyodor Yarochkin

Presentation Title: STIF-ware Evolution
Presentation Details:

Meder and Fyodor have been working on their concept of common framework to unify offensive part of heterogeneous security data and security tools into a single unit - security tools framework. At this conference they will be presenting the evolution of STIF framework into what they call now “STIF-ware” - a set of STIF relevant modules that would allow the computer security hobbists to build, control and monitor the distributed network of “automated hacking” agents, guided by set of goals and targets, assigned to the system.

Expect this presentation to include some new tools and hopefully some exciting demos. :)

About Meder:

Meder Kydyraliev is a security researcher interested in network security and applications of AI techniques in ethical hacking. Lately, together with Fyodor, he has been researching to find an intelligent way to automate security assessment processes to free up some time for creative stuff. Meder has obtained his B.S. in software engineering from AUCA/Kyrgyzstan and is currenlty working as an associate for KPMG Singapore doing infosec assessments.

Zubair Khan

Filed under: Conference Speakers — Administrator @ 9:00 pm

April 18, 2005

Presentation Title: Cyber Skirmishes
Presentation Details:

High-tech information warfare is fast becoming a reality. The term information warfare covers a wide range of activity, including corporate and military espionage and intelligence collection, psychological operations and perception management, attacks on communication systems, consumer fraud, and information piracy. In addition, the concept covers specifically computer-related issues: viruses, Trojan horses, and deliberate and targeted hacking efforts such as computer break-ins and denial-of-service attacks (where hackers flood an Internet server with traffic to overload and disable it). Cyber warfare is politically-motivated computer hacking that inflicts severe societal harm, and may also effect nation’s economy and defense. Cyber Warfare is so rapid that it may not give an opponent enough time to “surrender” before permanent and devastating damage is done. It has recently become of increasing importance to the military, the intelligence community, and the business world. Military planners are now imagining soldiers at computer terminals silently invading foreign networks to shut down radars disable electrical facilities and disrupt phone services.

# Introducing Cyber warfare
# Globalization of Cyber Warfare
# Outsourcing Warfare
# Cyber Targets
# Psychology of Modern Warfare
# Cyber Weapons
# Retaliation and Defense Tools

# Cyber battleground of Palestine and Israel
• Political and social effects caused by hacking incidents ( Real Examples)
• Targets
• Searching More Targets
• Famous Hacker Groups
• Volunteer Hackers
• Formation of Groups and their strategies
• Globalizing the war
• Tactics

# Cyber battleground of Iran and USA
• Political and social effects caused by hacking incidents ( Real Examples)
• Targets
• Searching More Targets
• Famous Hacker Groups
• Volunteer Hackers
• Formation of Groups and their strategies
• Globalizing the war
• Tactics

# Cyber battleground of China and USA
• Political and social effects caused by hacking incidents ( Real Examples)
• Targets
• Searching More Targets
• Famous Hacker Groups
• Volunteer Hackers
• Formation of Groups and their strategies
• Globalizing the war
• Tactics

# Cyber battleground of India and Pakistan
• Political and social effects caused by hacking incidents ( Real Examples)
• Targets
• Searching More Targets
• Famous Hacker Groups
• Volunteer Hackers
• Formation of Groups and their strategies
• Globalizing the war
• Tactics

# Capabilities of Al Qaeda
# Al Qaeda’s Interest In Cyber Warfare
# Al Qaeda’s Cryptography as Communication
# Cyber attacks during war of Terrorism
# Cyber attack on Al Qaeda by US
# Cyber Defense Strategies
# How hacking affect military operations?
# Influencing Foreign Policy
# How cyber attacks can spark a Real War?
# Cyber Propaganda and Terrorism
# ECHELON
# Revolution in Military affairs and C4I
# International Law
# Future of Cyber Warfare

About Zubair:

Zubair Khan is a freelance network security consultant. He has been researching mainly on DDoS Attacks and also on various other facets of network security for the past six years. He has given network security consultancy to top organizations of Pakistan. Recently he worked as a network security consultant for C4i of Pakistan. C4i is one of the directorates of Pakistan Army providing secure mode of communication for peacetime and war.

Zubair is founder of hacker’s conferences in Pakistan. His two major events Islamabad Hackers Training Camp 2004 and Islamabad Hackers Convention 2005 turned out to be a huge success. These events created a platform for security professionals in Pakistan. He has also conducted security trainings at various forums which includes government organizations. His research and work is recognized by Chairman of Pakistan Engineering Development Board and Chairman of Pakistan Engineering Council. His work and efforts to create network security awareness are greatly appreciated by high officials of country and also by media agencies.

« Previous Page



Event Organizer


Hack In The Box (M) Sdn. Bhd.

Supported & Endorsed By


Malaysian Communications and Multimedia Commission (MCMC)


Malaysian Administrative Modernisation & Management Planning Unit

Main Sponsor


Microsoft Corporation


Official Airline Partner


Malaysia Airlines


Open-Hack Sponsor


VIA Technologies Inc.


CTF Sponsor


Scan Associates


CTF Prize Sponsor


Defenxis


Media Partners:


The Virus Bulletin Conference takes place at The Burlington, Dublin, Ireland, 5 to 7 October 2005. Register here.

Phrack Magazine


Our Speakers Are Supported By:


Bellua Asia Pacific


F-Secure Corporation


Supporting Organizations


HERT


Chaos Computer Club (Germany)


X-Focus China


Zone-H Defacement Mirror


Xatrix Security


SyScan05


Special Interest Group in Security & Information InteGrity Singapore