
At the beginning of November 2012, the strike brigade of PositiveTechnologies was careless to accept an invitation from the organizers and speak at the Power of Community (POC) conference in Seoul (South Korea).
While the impressions have not disappeared, I want to share how security is done in the Country of morning freshness.
Under the cut a lot of photos.')
About the conferenceThe POC conference is the largest regional information security event, gathering more than 300 specialists from Korea, China, Japan and other nearby countries. This year the event is held for the seventh time.
Conference site:
http://www.powerofcommunity.netHashtag on Twitter:
# POC2012
Me and Power of Community
There are quite a few Europeans at the site, whom the lame fate brought to the region. Three Russians arrived this time: Sergey Gordeychik (I) and
Gleb Gritsai from
Positive Technologies , and also
AlexandrPolyakov from Digital Security.

Poc preparty
However, there were much more Russian-speaking people. From Andrei Kostin (roots src = USSR) to ex-NSA Tom Creedon from iDefence - winner of Drinking Hell.
Suddenly, Tao Wan from IBM IBM gave us a stunning karaoke session ("Black Crow", "Moscow Nights", etc.). So you understand that Russia is a Far Eastern power.
Power of XXThe conference is held in one stream. In parallel, in a separate room, several hacker activities take place.
In addition to various geek competitions a la blind programming and the battle of overclockers, this year the organizers presented a real surprise - CTF competitions in which only girls took part.

Here it is, the power of XX
I could not personally take part in the competition and assess the complexity of the tasks due to the improper set of chromosomes, but HexView, Burp and OllyDbg on the laptop screens flashed, which is good.
The Pussy Cat team won the competition a little overtaking secu.

Final Scoreboard
ReportsThe conference program focuses on the practical aspects of information security, but the organizers do not adhere to any “general line of the party” and simply include in it the reports of the best experts from around the world.
Local features - a number of speeches were in Korean and Chinese, which somewhat complicated understanding. If it turned out that the slides were a complete hieroglyphic work of calligraphic art, then I could only catch the speakers after the performance, since the site is small.
From here a conclusion: we do slides in English.

Synchron?
Personally, I really liked the performance of Tao Wan on the Chinese hacker scene (a little more in the
note ). An excellent bunch of reports was devoted to Windows 8. After Chengyun Chu from Microsoft made a review of the new built-in protection tools for the new OS and stated that it would be very difficult to write exploits for it, MJ0011 demonstrated some workarounds and, as I understand it, mentioned SMEP, with which we have already
played a little .
A good report by
Luigi Auriemma and
Donato Ferrante on attacks on online games. A couple of 0day in Call of Duty will certainly interest all cheaters. For Luigi, this was the first gig on the big stage, and he was a little nervous. I had to hold emergency advice on the fight against "bad adrenaline." Hope that helped.
Links:
http://www.techhive.com/article/2013725/researchers-uncover-hole-in-call-of-duty-modern-warfare-3.html ,
http://revuln.com/files/ReVuln_CoDMW3_null_pointer_dereference. pdf
[Re] Vuln. Start
By the way, Donato and Luigi decided to unite and organize the company
[Re] Vuln . It's just great when talented people get together and do something new. Good luck guys!
Andrei Costin changed his
favorite printers and told about the security system of the dispatcher connection ADS-B. More precisely about the complete absence of any security system. The falsification of the coordinates of the aircraft, false reports of problems and the terrorist threat are all available to the non-lazy person.
Babah!Iron for sale, software - open source. Learn more:
http://www.andreicostin.com/papers/adsb_blackhat12us_slides.pdf ,
http://www.forbes.com/sites/andygreenberg/2012/07/25/next-gen-air-traffic-control-vulnerable- to-hackers-spoofing-planes-out-of-thin-air /About us lovedGleb Gritsay and I continued the theme of the development of the Die Hard 4 scenario.

We are speaking
Strangelove SCADA Report: How I Learned to Start Worrying and Love Nuclear Plants summarized the current research results of our company in the field of security of automated process control systems. In addition to a couple of dozens of new vulnerabilities in PLC / SCADA / HMI, including Siemens SIMATIC WinCC, PLCScan utilities, the WinCC Harvester module for Metasploit and the approach of an agentless client-side fingerpring systems with HMI software surfing the Internet based on Surfpatrol were presented. Read more about the releases
here .

The salvation of mankind is the work of the hands ...

Safety comes first! (at one of the audits of the automated process control system)
Immediately after the speech, we received an invitation to AV Tokyo. This, it seems to me, is a sign that we have not been wasting the code of industrial systems for good reason and wearing helmets during audits.

Yes, it's about us
Unfortunately, I had to give up the opportunity to speak in the capital of the Land of the Rising Sun, since this week the company Positive Technologies is celebrating its tenth anniversary, and instead of igniting along with the Japanese hacker community, I will have to take the rap in Moscow at corporate party.

Japanese hacker community ignites
Anyway. But I saw a booklet about MaxPatrol in Korean, which inspires.

PT @ Korea
Power of communityAn integral part of any successful conference is a party. To do this, all conditions were created at POC2012: traditional Korean dinners, formal and informal parties, battles with Benny about the need to drink local beer despite the presence in the Leffe menu ...
Unfortunately, I did not manage to fight for the honor of the Russian people in Drinking Hell, I found only preparations.

Drinking Hell Under Construction
But Gleb did not disappoint and took the honorable third place.
KoreaSeparately, I wanted to say a few words about Korean cuisine. For me, a native Khabarovsk who grew up on kim-chi, a “Korean” carrot and dried squid, not to mention the basis of the student ration - Doshirak, a visit to Korea is the heart and belly feast. Deliciously fed everywhere, from the "Michelin" restaurant to the street tray. Although we should not forget that in Korean "tasty" and "spicy" are practically synonymous.

Om-Nom-nom!
I often hear about the beauty of the Moscow metro. Friends, you probably were not in the Seoul subway!

Simple, "ugly" Seoul metro
In general, Seoul impresses with an eclectic combination of skyscrapers, Buddhist temples, high-tech gadgets and traditional gymnastics exercises in the subway, on the street and everywhere else ...

Seoul
I left POC2012 with lots of ideas, lots of new acquaintances and a little regret. So everything went great!
Many thanks to the organizers and personally
Vangelis , speakers and all participants for a wonderful event!

Preparing for POC2012
PS In the plane from Seoul to Moscow, Gleb and Alexander
indulged in a
little with the multimedia system AirBus.
SOMETHING WICKED THIS WAY COME!
PPS Several links to articles written based on our report:
searchsecurity.techtarget.com/news/2240171014/Report-highlighting-SCADA-insecurities-alarmist-says-ICS-expertwww.digitalbond.com/2012/11/08/siemens-time-for-code-review-sdlwww.computerworld.com/s/article/9233378/Siemens_software_targeted_by_Stuxnet_still_full_of_holeswww.darkreading.com/advanced-threats/167901091/security/vulnerabilities/240049917/scada-security-in-a-post-stuxnet-world.htmlAuthor: Sergey Gordeychik, CTO, Positive Technologies .