📜 ⬆️ ⬇️

The most interesting hacker reports on Defcon 14

The fourteenth Defcon 14 conference was held in Las Vegas from 3-6 August.

This year’s show for geeks gathered a record seven thousand spectators who came here from all over America and even from abroad. In the sea of ​​fun, probably bonded with good alcohol, the official part of the conference passed almost unnoticed, where the best hackers talked about their unique developments.

We have already mentioned the well-known cryptographer Phil Zimmerman, the developer of PGP technology. At the conference, he presented his new Zfone program for encrypting VoIP traffic.

Among other interesting reports can be identified the presentation of developers from the company Ephemeral Security. They demonstrated an original way to create exploits. The exploit is written directly on the victim's computer using a Mosquito virtual machine previously embedded there. A virtual machine is installed at both ends of the connection and provides the hacker with a reliable communication channel with cryptographic protection.
')
A security specialist from Secure Science Corporation, along with their hacker colleagues, demonstrated to the audience a new technology for transmitting an encrypted message over the Internet. As an open channel of communication, they used a social network of Internet users who transmitted the message further. Such methods of message transmission allow you to effectively hide a message in information noise, so that the special services cannot detect it with the help of the most sophisticated analytical programs.

Hackers, as well as invited experts from the FBI and the CIA, discussed in detail various topics, including special networking programs and technologies for the Mac OS X operating system (Mac OS X Server Managed Clients, Nagios, Radmind, Apple Remote Desktop, HenWen, Tripwire , Open Directory Password, ipfw and dummynet, Centrify DirectControl, Dave, AdmitMac), which hackers can use on Apple-based networks; rootkits for hacking Oracle 10g Express Edition ; visual analysis of logs using the program AfterGlow ; FBI agents use neuro-linguistic programming techniques during conversations with hackers.

Source: https://habr.com/ru/post/4296/


All Articles