
There are only 3 weeks left to mega-events - the
ZeroNights 2012 conference. The program of the event was formed by 90%, for which I want to say a special thank you to DCG # 7812 and to the program committee. The conference organizers in the face of Digital Security and Software People are ready to present you the final list of speakers and tell about all the events that await you.
So, in order.
')
The main program and the heart of our conference are technical reports. This year we will have 21 reports from the best specialists in their field from all over the world: the USA, Canada, England, Germany, France, Finland, Spain, Israel, Taiwan, Romania, Moldova and, of course, Russia.
The conference program is scheduled many interesting events:
• 3 key reports
• 21 technical reports in 4 sections:
- That's really scary
- Technical hardcore
- The future of web
- Mobile internals
• 7 workshops from 2 to 5 hours long
• More than 7 reports on the fast track (the exact number will be known at the conference)
• 2 competence centers with demonstrations of attacks on SAP and mobile applications
• Round table
• 0-day show
Key reports
Keynote to the main program of the first day
The Grugq will tell you where the attackers and hacktivists are punctured and how they can be calculated. Grugq is an eminent IS researcher with over 10 years of professional experience. He worked extensively with forensic analysis, binary reverse engineering, rootkits, VoIP, telecommunications and financial security. Also known as reseller exploits.
Keynote to the main program of the second day
Felix 'FX' Lindner is a cult figure in the world of information security, the leader of Phenoelit. He has performed at Black Hat, CanSecWest, PacSec, DEFCON, Chaos Communication Congress, MEITSEC and many other events. His research topics are related to Cisco IOS, HP, SAP and RIM BlackBerry printers. The topic of the report is still kept secret.
Keynote to mobile security section
Alexander Polyakov and Dmitry Evdokimov from Digital Security will deliver introductory words on the security of mobile applications, thus opening the mobile security section. You will learn the latest trends in this area and some history, and also hear more about the reports that will be presented at the section. But do not rush to think that it will be a boring keynote. As part of the welcome speech will be presented the results of a new project dedicated to the security of mobile applications.
Reports are divided into 4 categories, which cover the most interesting areas of security:
That's really scary
In this category, collected reports that show you the real threats that can be implemented in the presence of various vulnerabilities in various systems and technologies. This is the security of everything that is closely connected with our life and goes beyond the framework of computer systems or relates to systems that are critical for business: the security of aircraft, transportation systems, cars, payment applications, bank cards, EMV, NFC, security systems and critical corporate applications transmitting financial information.
Technical hardcore
This category is a paradise for reversers and those who love something harder. We have prepared for you an excellent portion of reverse from those who know a lot about it.
- Dmytro Oleksiuk, “ Applied anti-forensics: rootkits, kernel vulnerabilities and then some ”: Cr4sh will tell you how to reinstall a rootkit that you cannot detect using familiar methods. Believe me, this man knows what he is talking about! This is not another bla-bla about interception functions.
- Mateusz 'j00ru' Jurczyk, “ Windows Kernel Reference Count Vulnerabilities - Case Study ”: who does not know who J00ru is, are simply obliged to re-read his last draft. The man works at Google and knows firsthand how to explode the core of Windows.
- Mohamed Saher, “ Stealing from Thieves: Breaking IonCube VM to Reverse Exploit Kits ”: virtualization technologies are based on the most sophisticated copy protection systems, and public information on practical deobfuscation of real defenses is not enough, so we strongly recommend that you pay attention to this report.
- Aleksandr Matrosov, Eugene Rodionov, “Win32 / Flamer: Reverse Engineering and Framework Reconstruction”: the great and terrible reversers from ESET will show how to understand the intricacies of sensational Flamer. The authors of the report will present the results of their research on the reconstruction of the object-oriented platform on the basis of which Win32 / Flamer was developed, and demonstrate its relationship with Stuxnet / Duqu / Gauss at the level of code and architecture.
- Ivan Sorokin, “ Mac OS X malware overview ”: For some time now, Apple has stopped boasting of the absence of viruses in its products, and lovers of bitten apples are now at the sight of virus writers. On the report of Ivan from Dr. Web you can learn more about this.
- Nikita Tarakanov with the yet secret title of the report will tell us about his last 0 deyah, and be sure it will be cool! The author promised live demonstrations.
- Atte Kettunen, Miaubiz, “ Fuzzing at scale and in style ”: the researchers will tell you how and what to do with browser fuzzing. The guys killed just a huge number of vulnerabilities in popular browsers and are now ready to share their experience with us. By the way, Miaubiz got Rockstar status from Google.
The future of web
In this section, you will learn about the latest research in the field of WEB security, No-SQL, automatic search for indirect vulnerabilities, and also plunge deep into the field of the XML protocol that is used almost everywhere: as they say, XML is a new TCP. We even specifically invited a researcher from France.
- Shay Chen, “ The Diviner ”: it is now possible to get the source code of a web application when scanning with a black box. Of course, not all and not always, but the tool that will be presented copes with it more than adequately, and this technology can make a breakthrough in the field of BlackBox, although it has several disadvantages. We advise you to pay attention to this report. Shay is the technical director of a startup Hacktics, which was recently purchased by Ernst and Young.
- Michail Fyrstov, “ Impact on mongoDB ”: the popularity of NoSQL databases and, as a result, attacks against them are gaining momentum. Many large web projects use NoSQL technology. If you're wondering how to hack the largest social networks, then you are here.
- Nicolas Gregoire, “ That's why I love XML hacking! ”: You can’t even imagine what problems XML has and where it is not used! The speaker ate a dog on this topic, and his company deals with XML security.
- joernchen of Phenoelit, “ I’ve become BAH7BkkiDHVzZXJfaWQGOgZFVGkG ”: they’re the joernchen of that same Phenoelit, and partly DJ, tells about the insecurity of the fashionable Ruby language.
- Vladimir Vorontsov, Alexander Golovko, “ SSRF attacks and sockets: smorgasbord of vulnerabilities ”: the fashionable theme of the year is SSRF (cross-server request forgery). Even if you are already familiar with this topic from the report of Alexander Polyakov with BlackHat, we strongly recommend to visit this report, as it opens the topic of SSRF in a different direction.
- Andrei Petukhov, “ No locked doors, no windows barred: hacking OpenAM infrastructure ”: and again about the SSRF, at another angle. Andrew will put everything on the shelves and tell you about an interesting vector of attack on authentication systems.
Mobile internals
Last but one of the key topics is mobile security. Anyway, this is a trend, and a lot of research is being done in this area. We tried to choose the best reports on this topic, by the way, all of them will be presented to the public for the first time.
- Andrey Belenko, Dmitry Sklyarov, “ Dark and Bright Sides of iCloud (In) security ”: Dima is a thunderstorm for all those who carelessly handle cryptography. You, of course, know it from the old story with Adobe, but recently he shifted his view of Apple security and tells you about the problems of iCloud storage.
- Alisa Shevchenko and Alexey Troshichev, a joint study of Esage lab and Yandex: as in the previous report, Apple will be talking about devices, more precisely, about MiTM attacks. Details are about to appear on the site, but now we already know that the guys are planning a small show, and also smacks of 0-deyami!
- Alexey Kerasiviov, “Physical access to the Android device: attack and defense“: tells about various techniques of low-level gutting Android devices.
Workshops
Workshops will allow you to dive deep into one area or another and gain practical experience from the hands of experts. You will plunge into the world of exploit and circumvention, learn how to exploit XSS vulnerabilities, learn a lot about DDoS, immerse yourself in the physical security of RFID and much more.
• Alexey Tyurin, "
Exploitation of XML-based attacks " (2 hours): Alexey - the head of the audit department of the Digital Security company will tell, and most importantly, in practice will teach how to exploit the most interesting XML-related attacks, such as SSRF, XLST, XML Signature, XML Encryption, etc. He will also release a free tool for SSRF attacks and tunneling requests.
• Michele "antisnatchor" Orru, “
All you ever wanted to know about BeEF ” (2 hours): Michel is the author of the BeeF framework, works as a tester in TrustWave in London. At this workshop you will learn all about how to unleash a simple XSS to seize control over the entire corporate network.
• Kirill Salamatin (aka Del), Andrey Tsumanov, “
RFID: Jokers up our sleeves ” (4 hours): the simple Moscow guys will tell you all about RFID security, and most importantly, they will show you and let you try yourself to be all-powerful spies who can penetrate any protected object.
• Arseny Reutov, Timur Yunusov, Dmitry Nagibin, “
Random Numbers. Take Two ”(2 hours): at this workshop you will learn how to exploit vulnerabilities in the generation of random numbers. As many as three lecturers ensure that the material will be communicated to each listener.
• Jean-Ian Boutin, “
Reversing banking trojan: an in-depth look into Gataka ” (2 hours): A researcher from the ESET Canadian office will show you how to reverse interesting banker Trojans in practice.
• Alexey Sintsov, “
Advanced Exploit Development (x32). Browser Edition ”(5 hours): prepared a stunning course on exploit development and circumvention of defenses that prevent exploitation. This is a definite must have of this conference.
• Alexander Azimov from HighloadLab will tell you about DDOS and practical counteraction to such attacks.
Fast track
And that is not all. We have a section FastTrack, where interesting concepts will be presented, as well as incidents on the topic of information security. You will be able to get acquainted both with student work - by the way, no less interesting than the main reports - and with practical experience in protecting corporate systems from the first hands of people working in major organizations. Reports from this section will be added, and personally you also have a chance to speak and thus get to the conference for free. Already confirmed:
• Kirill Samosadny, “
Massive CSRF-attacks through Flash-advertising ”
• Fedor Yarochkin, Vladimir Kropotov, Vitaly Chetvertak, “
Techniques for traversing automatic systems for detecting malicious content — interesting examples of 2012 ”
• Alexander 'SolarDesigner' Peslyak, “
New in password hashing (or with what to replace bcrypt) ”
• Oleg Kupreev, “
Infection of 3G modems ”
• Igor Gotz, Sergey Soldatov, “
How to catch your hacker, or safety“ on your knees ”: how to build a system of monitoring security events with minimal expenses, as well as what events to look for.
• Evgeny Sobolev, “
Typical IS mistakes in corporations and large organizations ”
• Dmitry Evdokimov will talk about the tools for analyzing binary applications using Python.
Competence Centers
In the main hall, we will have two competence centers in two areas of security: business applications and SAP, mobile applications and devices.
Digital Security at its booth organizes the SAP Security Competence Center, where visitors can get answers to all questions related to attacks on SAP systems, protection from them, as well as familiarize themselves with the product throughout the conference. In addition, during the coffee breaks at the stands will be held mini-reports on hacking SAP.
Hackspace Neuron - demonstrations of typical attacks on mobile devices were organized on the stand, and visitors were also given the opportunity to play with various devices for intercepting GSM traffic and other spy toys.
Contests
We will also have a lot of contests for which you can get valuable cash prizes, as well as free entry to the conference.
Recently the following contests were launched:
• Onsec Hack-Quest with prizes - free admission to the conference
• “Yandex” program for rewarding researchers for found vulnerabilities in web services and mobile applications called “
Hunting for bugs ”
•
Competition from GazInformService to search for vulnerabilities in E & S with a prize fund of 100,000 rubles
During the conference
• Nokia's “
Capture The Phone ” Contest
• T-shirt and wallpapers competitions from ZeroNights organizers with prizes courtesy of Pwnie Express
Round table
The round table will be dedicated to the discussion or the battle of researchers and developers. I invite you to look at these hot battles. You can also take part in them, if you have something to say. Experts from developers and auditors will be invited.
0-day show
A small but very interesting bonus. Within 3-5 minutes you will be shown the most interesting 0-day and 1-day in the popular software. By the way, you can take part in it yourself.
So, we are waiting for you
on November 19 and 20 in Infospace : be one of those who create the future of the hardcore security scene! And remember that visitor registration ends
on November 14th .
We thank Yandex for the support, as well as our sponsors: GazInformService, Intel, Dr. Web, Advanced Monitoring, Nokia, Pwnie Express, and key media partners are magazines] [akep and Hakin9.
PS: on the Speaker Party there will be a unique DJ set from DJ joernchen from Phenoelit!