In St. Petersburg to be: reports of the "confrontation" NeoQUEST-2016
On July 7, the “confrontation” NeoQUEST-2016 will be held in St. Petersburg - an exciting event for all those involved or would like to deal with information security. We are waiting for everyone: information security specialists, developers and administrators, students and applicants of IT-specialties, hackers, geeks and everyone! Entrance to NeoQUEST-2016 is free, you only need to register on the event website .
NeoQUEST-2016 guests are waiting for:
Fascinating reports on the most current in information security. Let's talk about the features of creating and detecting bots in social networks, discuss how Intel SGX and Intel MPX make developers' lives better ... Or worse? We will tell you that a security researcher can learn interesting things while traveling from St. Petersburg to Moscow and back. We show that we are "in trend", talking about the security problems of smart and fashionable wearable electronics. Let's not go around with our attention mobile antiviruses and their shortcomings, we will study Intel ME ME and much more.
Demonstrations of attacks and ways to protect against them. Let's show an old-school attack on Intel ME for the Q35 chipset, demonstrate SSL Pinning bypass, show the vulnerability of modern web browsers to a man-in-the-middle attack using keys with revoked certificates, attack the smartwatch - and that's not all!
Contests, prizes, communication. Throughout the day, Twitter will hold a quiz "Examination of information security" with a variety of tasks on the knowledge of information security and ingenuity. In addition, guests will enjoy a lot of real contests, and, of course, prizes!
Details about the contents of the reports NeoQUEST-2016 - under the cut!
Registration continues!
NeoQUEST is an event for anyone interested in information security. From pros to the most beginners, from professionals who have long worked in the field of information security, to students and IT-specialty entrants! Our reports are completely different in complexity, and we try to cover the maximum of interesting topics from the InfoBase area (and how many!).
Those who have not yet registered, we decided to inspire a small teaser. Small, but very pathetic! ')
Now that everyone is scared and warned, let's talk about reports that will reveal the secret: why are you so easy to hack?
Reports
Alexey Nikolsky: "F @ ck ME" . Almost 7 years have passed since the moment when the Black Hat conference presented an attack on Intel ME technology for the Q35 chipset. Since then, this chipset is considered defective, and Intel introduced 7 new series of chipsets. In the report we will analyze Intel ME / AMT / vPro technology in detail, demonstrate and analyze the known attack on Q35 (yes, we managed to find this rarity on one of the flea markets!). We will launch a web server with removed RAM memory strips and show what has changed in 7 generations of chipsets in terms of security.
Evgeny Usov: "Enclave Power Armor". The report will contain a description of the Intel SGX technology, examples of the application of this technology in practice, and for the development of both malicious and protected programs. Let's tell about features of development of the applications using this technology.
Maxim Glame: “Intel MPX.A new solution to old problems. Intel Memory Protection Extensions (MPX) is a new Intel architecture extension that first appeared in Intel Skylake processors. It is designed to improve the reliability of applications and solve a long-standing problem - the problem of buffer overflow. To do this, Intel Skylake processors have been added a new set of instructions and new registers that allow you to control the buffer boundaries and detect overflow during program execution. We will tell you how it works, how to use it, and what profit the use of Intel MPX gives.
Denis Strelnikov: "Cyberfesh of May Professional: Spring-Summer 2016 Collection". The report will deal with the safety of modern representatives of wearable electronics: smart watches, fitness bracelets and other devices, which every year more and more can be seen in everyone. What are the potential threats of using these devices? How to protect your smart assistant? What new methods of attack appeared along with the popularization of wearable electronics? All these questions will be answered, and one of the new attacks on users of smart watches will be demonstrated!
Sergei Sychev: "Journey from St. Petersburg to Moscow: the security of public wireless networks." Wireless networks are very common in the life of an ordinary person. It is difficult to find a public place where an open access point would not be available. The speaker will present a security analysis using the example of a wireless network in a popular high-speed train. Let us show what banal administration errors can lead to, and try to decide whether to avoid connecting to public access points or is it just paranoia?
Alexey Myasnikov: “NFC and HCE.Wireless Password Manager. The term " NFC " is increasingly found in the specifications of modern smartphones and tablets. The report will look at this interface in detail from the point of view of practical application. Let us consider the different modes of operation and types of interacting devices. There will also be considered the implementation of HCE technology in modern phones, aspects of its security. As a demonstration, let us present the coding of the password manager under the Android OS. Data will be transmitted using the interface.
Evgeny Pavlenko: “Mobile antiviruses?No, have not heard". The report will present a security assessment of mobile applications for the Google Android operating system. The speaker will talk about existing means of protecting mobile devices and the shortcomings of existing antiviruses for Android.
Maxim Khazov: “Is it difficult to become a“ chameleon ”in social networks?”. As a rule, modern mobile applications use a certain API to interact with the server. The report will tell you why you may need to analyze the interaction protocol and this API itself, as well as possible approaches to its analysis. Let's analyze possible technologies of developers for more reliable protection of the communication channel between the client and the server ( SSL Pinning ). We show a successful bypass of these technologies in the popular mobile application (Facebook) in order to get an opportunity to analyze the API. As a result, we will show how you can write the simplest bots for some social networks that will be disguised as official mobile applications.
Yegor Malyshev and Andrei Dremov: "Zaalaykay me completely." Currently, social networks have become a powerful tool for influencing public opinion. It's no secret that they were used in the Tunisian Jasmine Revolution (and some even call it cyber-revolution!), And are now used, for example, to create a positive image of a politician, which is especially important before the elections. For a massive impact on people's opinions, automatically controlled accounts in social networks, in other words, bots, are used. Let's tell how to find them, on the example of the social network "VKontakte"!
Alexey Busygin: “Nightmare of compromised keys”. Should we be afraid of the “man in the middle” if the server's TLS key was once compromised? Even if the server has already been updated three times, the vulnerability is closed and gradually becomes history, and the old certificate has been revoked and replaced with a new one, the answer “no, not worth it” is very hasty. This report is devoted to a more detailed answer to this question. The report will examine in detail the problem of checking certificate revocation, demonstrate the vulnerability of modern web browsers to a man-in-the-middle attack using keys with revoked certificates, and also consider various approaches to protecting against this attack.
Roman Demidov: "Under the hood of a Flash." The report will provide an overview of the security of Adobe Flash over the past year, which turned out to be very difficult for its creators. The number of vulnerabilities discovered in 2014-2015 reached a record: 457 pieces! Many large companies refuse to support Flash in their products due to security issues. Architectural features of Flash, popular attack vectors and patterned exploitation methods will be considered. We will analyze the most recent recent vulnerabilities, information about which has been made publicly available. In addition, the report will present its own results in terms of Flash security research - we will show the vulnerabilities we found and understand their causes.
In addition to reports
The guests are waited by the NeoQUEST-2016 program, which is very rich in reports, but can't they sit all day and listen, listen, listen? We will dilute the reports with demonstrations of attacks and various “howto”, in particular, we will show the attack of Rutkovskaya, the attack on “smart watches”, we will tell about Intel SGX (and there is very little Russian-language information about SGX!) Android and much more!
In addition, all guests will have a chance to express themselves in competitions: real - for extroverts and virtual - for introverts. And for contests, as you know, prizes are awarded!
NeoQUEST is another reason why this summer is in St. Petersburg!