The fourteenth
Defcon 14 conference was held in Las Vegas from
3-6 August.
This year’s show for geeks gathered a record seven thousand spectators who came here from all over America and even from abroad. In the sea of fun, probably bonded with good alcohol, the
official part of the conference passed almost unnoticed, where the best hackers talked about their unique developments.
We have already mentioned the well-known cryptographer Phil Zimmerman, the developer of PGP technology. At the conference, he presented his new
Zfone program for encrypting VoIP traffic.
Among other interesting reports can be identified the presentation of developers from the company Ephemeral Security. They demonstrated an original way to create exploits. The exploit is written directly on the victim's computer using a
Mosquito virtual machine previously embedded there. A virtual machine is installed at both ends of the connection and provides the hacker with a reliable communication channel with cryptographic protection.
')
A security specialist from Secure Science Corporation, along with their hacker colleagues, demonstrated to the audience a
new technology for transmitting an encrypted message over the Internet. As an open channel of communication, they used a social network of Internet users who transmitted the message further. Such methods of message transmission allow you to effectively hide a message in information noise, so that the special services cannot detect it with the help of the most sophisticated analytical programs.
Hackers, as well as invited experts from the FBI and the CIA, discussed in detail various topics, including special networking programs and technologies for the Mac OS X operating system (Mac OS X Server Managed Clients, Nagios, Radmind, Apple Remote Desktop, HenWen, Tripwire , Open Directory Password, ipfw and dummynet, Centrify DirectControl, Dave, AdmitMac), which hackers can use on Apple-based networks; rootkits for
hacking Oracle 10g Express Edition ; visual analysis of logs using the program
AfterGlow ; FBI agents use
neuro-linguistic programming techniques during conversations with hackers.