Slide 1
Slide 1
Slide 1
Slide 1
Slide 1
Slide 1

PRESENTATION MATERIALS

PHOTOS / VIDEOS

Official conference photos and HD videos will be made available in the next 2-3 weeks. Please follow @hitbsecconf on Twitter for links or join our Facebook Group

Adam Gowdiak (Founder/CEO, Security Explorations)

PRESENTATION TITLE: Security Threats in the World of Digital Satellite Television

PRESENTATION ABSTRACT:

This presentation will showcase security threats in the context of the novel platform of digital satellite TV set-top-boxes. We will show that a combination of security issues present in software, hardware and services coming from different vendors can have a devastating impact on a security of the modern digital satellite TV platform.

The presentation will be divided into several parts. First, some brief information about the architecture of a modern digital satellite TV platform will be provided followed by a detailed discussion of a successful attack against Internet connected set-top-box devices allowing for the execution of arbitrary malware code on them. Information pertaining to the bypassing of a security of the OS and Java middleware atop of which the presented devices run, will be also given. Finally, details regarding persistent and stealth installation of backdoor / malware code on vulnerable set-top-boxes will be provided.

In addition to the above, technical details of about 20 security issues found in the environment of one of the biggest satellite TV operators in Poland (and potentially affecting other big satellite TV operators relying on the vulnerable equipment) will be given. Sample functionality of our 34,000 lines long Proof of Concept code will be also discussed for the purpose of illustrating the actual actions attackers / malware coders can take in the environment of a target set-top-box device.

This presentation will be followed up by an in-depth look at security vulnerabilities of Digital Video Broadcast chipsets. More information about the topic of this presentation can be found at: http://www.security-explorations.com/en/SE-2011-01.html

ABOUT ADAM GOWDIAK

Adam Gowdiak is the founder and CEO of Security Explorations, a security start-up company from Poland which provides various services in the area of security and vulnerability research.

Prior to founding Security Explorations, he worked for the Poznan Supercomputing and Networking Center and Sun Microsystems Laboratories. For over 8 years, he had been also an active member of a notable Polish security research group called the Last Stage of Delirium or LSD.

Adam is an experienced Java Virtual Machine hacker, with over 50 security issues uncovered in Java technology over the recent years. He is also the hacking contest co-winner and the man who has put Microsoft Windows to its knees (vide MS03-026) and was also the first one to present a successful and widespread attack against the mobile Java platform in 2004

Okura Hotel Amsterdam
Ferdinand Bolstraat 333, 1072 LH Amsterdam,
The Netherlands

1-Day Intensive Training Sessions – 21st of May / 0900 – 1800

 

SPECIAL OPS 1  - WIRELESS SECURITY KUNGF00

SPECIAL OPS 2  – THE ART OF EXPLOITING SQL INJECTION FLAWS

SPECIAL OPS 3 – MOBILE APPLICATION HACKING – ATTACK & DEFENSE



2-Day Hands on Training Sessions – 22nd – 23rd of May / 0900 – 1800

TECH TRAINING 1  – HUNTING WEB ATTACKERS

TECH TRAINING 2  – ADVANCED LINUX EXPLOITATION METHODS

TECH TRAINING 3  - ADVANCED APPLICATION HACKING – ATTACKS, EXPLOITS & DEFENSE

 

 



3-Day Hands on Training Sessions – 21st, 22nd & 23rd of May / 0900 – 1800

TECH TRAINING 4  – THE EXPLOIT LABORATORY: ADVANCED EDITION




QUAD TRACK CONFERENCE – 24th & 25th of May / 0900 – 1800

Featuring keynotes by BRUCE SCHNEIER and ANDY ELLIS



EVENT ORGANIZER

LOCAL PARTNER

PLATINUM SPONSORS

GOLD SPONSORS

TITANIUM SPONSOR (POST CONFERENCE RECEPTION + SPEAKER RECEPTION)

SILVER SPONSOR

HACKWEEKDAY SPONSOR

ALCO_PWN SPONSOR (POST CONFERENCE RECEPTION)

HITB LAB / SIGINT SPONSOR

NETWORK SPONSORS AND UPLINK

ADDITIONAL SUPPORT BY

SUPPORTING MEDIA

FRIENDS OF HITB

Copyright © 2012 Hack In The Box | http://www.hackinthebox.org

( / 10 )