This workshop will explore brand-new tactics to incorporate little-known or undocumented development approaches to a Microsoft windows system

This workshop will explore brand-new tactics to incorporate little-known or undocumented development approaches to a Microsoft windows system

Chuck Easttom

The focus is going to be on methods you can use to subvert the protection of the system. For example api calls that can be used in influencing the machine and/or in generating malware. There may additionally be insurance coverage of important SQL stored treatments you can use in a similar manner, for instance there is certainly an undocumented accumulated treatment that can empty the computer manager code.

Content: Bring a laptop with a few form of house windows (even on a VM is ok). A c++ compiler as well as a duplicate of graphic C#

Chuck Easttom Chuck has been doing the IT field for more than twenty five years, he’s written 21 guides, such as lots of on computer system protection, forensics, and cryptography. Chuck in addition has written many data articles regarding cyber protection including several on malware manufacturing tips. Mr Easttom try a regular presenter at many protection events including showing a workshop at DefCon 2016 but in addition: SecureWorld Dallas, SecureWorld Houston,ISC2 protection Congress, HakonAsia, Secure Jordan, and many more. ‘” 2_Friday,,,Workshops,”Octavius 5″,”‘Subverting Privacy Exploitation Utilizing HTTP'”,’Eijah’,”‘

Eijah Founder, Demonsaw

The whole world happens to be an increasingly harmful location. Governments and businesses invest hundreds of millions of dollars yearly generate newer and cutting-edge technology designed for one purpose: the exploitation of our private marketing and sales communications. Exactly how performed we let this occur? And preciselywhat are we going to would about any of it? Is we ready to sit idly by and live in a state of anxiety while our very own versatility of message is silently revoked? Or perhaps is there some thing we can do in order to dare the status quo and make use of all of our skill to safeguard our privacy while the privacy of rest?

The Hypertext exchange method (HTTP) try an application-layer protocol that’s the first step toward the present day websites. Initially developed by Tim Berners-Lee in 1989, HTTP remains the preferred protocol used these days. One of the key skills of HTTP is that it really is flexible enough to send any type of data. HTTP normally almost everywhere – it really is active on desktops, mobile phones, and even IoT. As a result of common nature of HTTP, fire walls and proxies include designed automagically permitting this type of site visitors through. Could HTTP be used to connect securely while completely bypassing circle administration regulations?

This workshop challenges the assumption that HTTP cannot warranty privacy of information. It’ll familiarizes you with the HTTP method and illustrate how it may be used to deliver facts securely. We will produce command-line solutions in C/C++ on Linux that may use HTTP to securely send emails over the Internet, while skipping firewall and proxy procedures. We’re going to need a variety of ciphers, hashes, alongside cryptographic behavior being part of open-source libraries. Whether you are a professional programmer, end up only a little rusty and want a refresher training course, and/or should you’d never ever developed a protected software in C/C++ before; this working area is actually for you.

Please be aware that the is actually a medium-level, technical working area and needs that attendees have previous knowledge of at least one program writing language, ideally C or C++. Push your own computer, a USB flash drive, and your preferred C/C++ 11 compiler (>= gcc/g++ 4.9.2 or msvc 2015).

Prerequisites: Previous expertise in a minumum of one program coding language is essential. Past knowledge about C/C++ and cryptography is useful, yet not required.

Eijah Eijah could be the creator of Demonsaw, a protected and anonymous info posting system. The past 5 years he had been in addition an older designer at Rockstar video games where the guy labored on great Theft car V. Eijah have over fifteen years of program development also it Security enjoy. His job features secure an extensive selection of websites and mid-range systems, core safety, and system buildings. Eijah might a faculty affiliate at several colleges, has discussed safety and developing at DEF CON and tool Miami meetings, and holds a master’s amount in pc technology. Eijah is a dynamic member of the hacking community and it is a devoted proponent of Internet independence. ‘” 2_Friday,,,Workshops,”Octavius 6″,”‘Industrial regulation program protection 101 and 201′”,”‘Matthew E. Luallen, Nadav Erez ‘”,”‘

Leave a Comment

Your email address will not be published. Required fields are marked *