Sysdream has announced the 8th edition of Hack in Paris, which will take place from the 25th to the 29th June 2018, in France at the Maison de la Chimie (Paris). Hack in Paris is a unique event composed of 3 days of training and 2 days of conferences, all of which will be given exclusively in English.
Here’s the list of training that will be offered:
Training 1: CORELAN “BOOTCAMP” with Peter Van Eeckhoutte: founder of Corelan Team and author of the well-known tutorials on Win32 Exploit Development Training.
Training 2: PRACTICAL INTERNET OF THINGS (IOT) HACKING with Aseem Jakhar: well known as the founder of Null and Nullcon Security Conference.
Training 3: SMART LOCKPICKING – HANDS-ON EXPLOITING IOT DEVICES BASED ON ELECTRONIC LOCKS AND ACCESS CONTROL SYSTEMS with Slawomir Jasek: IT security consultant and expert since more than 10 years.
Training 4: HACKING IPV6 NETWORKS V4.0 with Fernando Gont specializes in the field of communications protocols security, working for private and governmental organizations from around the world.
Training 5: DESIGNING LINUX ROOTKITS with Himanshu Khokhar : an Information Security Instructor at CTG Security Solutions and the founder of SegFault, an infosec community.
Training 6: INFRASTRUCTURE SECURITY ASSESSMENT with Abhisek Datta and Omair. Abhisek Datta is a Security Researcher and Consultant and Omair has over eight years of experience in penetration testing, vulnerability assessment and network security.
Training 7: HACKING AND SECURING WINDOWS INFRASTRUCTURE with Paula Januszkiewicz: CEO and Founder of CQURE Inc. and CQURE Academy.
Training 8: LOW-LEVEL HARDWARE PENETRATION TESTING with Henrik Ferdinand Noelscher and Javier Vazquez: both working at NIO as a product security engineer.
Training 9: BUG HUNTING MILLIONAIRE: MASTERING WEB ATTACKS WITH FULL-STACK EXPLOITATION with Dawid Czagan: an internationally recognized security researcher and trainer / a founder and CEO at Silesia Security Lab.
Training 10: WINDOWS POST-EXPLOITATION SUBVERTING THE CORE with Ruben Boonen: a senior security consultant.
Training 11: ANALOGUE NETWORK SECURITY ARCHITECTURE & DESIGN with Winn Schwartau and Mark Carney. Mark works for Security Research Labs in Berlin and Winn is the Founder of The Security Awareness Company and in 2009 was named one of the Top-¬?20 security industry pioneers by SC Magazine.
Training 12: MOBILE APP ATTACK with Sneha Rajguru: active member of Null, senior consultant with Payatu software labs.
Training 13: PENTESTING THE MODERN APPLICATION STACK with Bharadwaj Machiraju, Francis Alexander: respectively OWASP project leader, and security engineer at Envestnet/Yodlee.
Training 14: REVERSE CODE ENGINEERING IN WIN32 APPS PROTECTING YOURSELF IN THE WILD with Ricardo Rodriguez: an Assistant Professor at Centro Universitario de la Defensa, General Military Academy, Zaragoza, Spain.
Training 15: SMASHING THE SSL/TLS PROTOCOL WITH PRACTICAL CRYPTO ATTACKS with Marco Ortisi: both an international speaker and independant penetration tester.
Training 16: PRACTICAL INDUSTRIAL CONTROL SYSTEM (ICS) HACKING with Arun Mane: a Hardware, IOT and ICS Security Researcher, working with Payatu Software Labs as Sr. Security Researcher.
Training 17: PENTESTING INDUSTRIAL CONTROL SYSTEMS with Arnaud Soullié, manager at Wavestone and specialist in Industrial Control Systems and Active Directory security.
Training 18: CCISO with Jeroen Van Der Vlies: Expert in the area of information security since more than 10 years.
More details available at: https://hackinparis.com/trainings/
Hack in Paris also offers 15 conferences including a debate, with world-renowned speakers.
Thursday, June 28th 2018 : (in chronological order)
Talk 1: DRONES THE NEW WEAPON OF CHOICE – ALSO FOR HACKERS by Dominique BRACK
Talk 2: BUILDING SYSTEMS ON SHAKY GROUNDS: 10 TACTICS TO MANAGE THE MODERN SUPPLY CHAIN by Robert WOOD
Talk 3: SILENT WIRE HACKING by Erwan BROQUAIRE & Pierre-Yves TANNIOU
Talk 4: AUDITD FOR THE MASSES by Philipp KRENN
Talk 5: FROM PRINTED CIRCUIT BOARDS TO EXPLOITS: PWNING IOT DEVICES LIKE A BOSS by Damien CAUQUIL
Talk 6: MOBILE OPERATORS VS. HACKERS: NEW SECURITY MEASURES FOR NEW BYPASSING TECHNIQUES by Sergey PUZANKOV
Talk 7: THE OBFUSCATION TOOLKIT (OTK) & PRACTICAL APPROACHES TO SECURITY RESEARCH by Daniel BOHANNON
Debate: TO SERVE MAN : AI, MACHINE LEARNING & DEEP LEARNING IN SECURITY by Winn SCHWARTAU, Gregory CARPENTER & Michael MASUCCI
Friday, June 29th 2018 :
Talk 8: THE INSECURE SOFTWARE DEVELOPMENT LIFECYCLE: HOW TO FIND, FIX, AND MANAGE DEFICIENCIES WITHIN AN EXISTING METHODOLOGY by April WRIGHT
Talk 9: KNOCKIN’ ON IPV6’S DOORS by Fernando GONT
Talk 10: THE BICHO: AN ADVANCED CAR BACKDOOR MAKER by Sheila BERTA
Talk 11: THE PAST, PRESENT & FUTURE OF ENTERPRISE SECURITY: THE ‘GOLDEN AGE’ OF ATTACK AUTOMATION by Marcello SALVATI
Talk 12: HUNTING PBX FOR VULNERABILITIES by Sachin WAGH
Talk 13: NO WIN32_PROCESS NEEDED: EXPANDING THE WMI LATERAL MOVEMENT ARSENAL by Philip TSUKERMAN
Talk 14: HOW TO BRING HID ATTACKS TO THE NEXT LEVEL by Luca BONGIORNI
Talk 15: NFC PAYMENTS: THE ART OF RELAY & REPLAY ATTACKS by Salvador MENDOZA & Leigh-Anne GALLOWAY
Explore the detailed programme at : https://hackinparis.com/talks/
Tickets available at: https://hackinparis.com/store/
Canadian Tech Company Fingered In Helping To Suppress Free & Open Access To The Internet In Syria, Egypt & Turkey
Posted in Commentary with tags Sandvine on March 9, 2018 by itnerdDo you live in Syria, Egypt or Turkey, or some part of the world where the Internet isn’t a free and open as it should be. If so, you might want to read this story from the CBC that details research from Citizen Lab that shows that using gear sourced from a Canadian company called Sandvine is being used to redirect Internet users in those countries towards spyware and malware, but also keep an eye on the activities of those Internet users and block their access to sites that the countries in question don’t want anyone to see:
Since last fall, Turkish internet users attempting to download one of a handful of popular apps may have been the unwitting targets of a wide-reaching computer surveillance campaign.
And in Egypt, users across the country have, seemingly at random, had their browsing activity mysteriously redirected to online money-making schemes.
Internet filtering equipment sold by technology company Sandvine — founded in Waterloo, Ont. — is believed to have played a significant part in both.
That’s according to new research from the University of Toronto’s Citizen Lab, which has examined misuse of similar equipment from other companies in the past. The researchers say it’s likely that Sandvine devices are not only being used to block the websites of news, political and human rights organizations, but are also surreptitiously redirecting users toward spyware and unwanted ads.
Using network-filtering devices to sneak spyware onto targets’ computers “has long been the stuff of legends” according to the report — a practice previously documented in leaked NSA documents and spyware company brochures, the researchers say, but never before publicly observed.
“When you have this middlebox which is capable of filtering and modifying people’s internet traffic, pretty much the sky’s the limit in terms of what you can do,” said Bill Marczak, one of the authors of the report.
As a Canadian citizen, I have to admit that I am disturbed that Canadian tech (that’s owned by an American company) is being used this way. But at the same time I am not surprised as Sandvine has been used by Comcast to throttle Internet traffic and they’ve tried to argue in front of the CRTC that this is a good thing. Thus it is entirely plausible that their gear is being used for this purpose because from a technical standpoint, it’s not a great leap. Now interestingly Sandvine has disputed the report and threatened to sue those behind it. Which suggests to me that perhaps they got caught with their hand in the cookie jar so to speak. Hopefully the Canadian and/or US Government is watching this and asks Sandvine some really tough questions as to who it sells its gear to and if they are aware what it is being used for.
Leave a comment »