Welcome back to the last day of hack.lu! First presentation was made by Philippe Langlois about the diversity of network perimeters available for companies today. Philippe was a founder of Qualis! Today everybody uses SS7 networks! Do you remember phreaking using blue boxes? SS7 was deployed by operators and prevented
Recovering Censored Text Using Photoshop and JavaScript
On Thomas Robinson’s blog, there is a nice article about a way to recover censored text using Photoshop! Take care if you protect some text on confidential documents with the Photoshop Mosaic filter! Recovering Censored Text Using Adobe Photoshop CS3 from Tom Robinson on Vimeo.
SANS Reading Room: Era of Spybots – A Secure Design Solution Using Intrusion Prevention Systems
There is a new document available in the SANS Reading Room: A case study about a fictive company infected by a spybot. How it was detected and eradicated. Finallly, solutions are proposed by avoid the same problem in the future. The document is available here.
ISC Threat Level: YELLOW
Due to the Microsoft out-of-band patch (declared as critical), the ISC threat level has been raised to yellow! Please install the patch asap. See the SANS ISC webpage for details.
hack.lu Part #7
Last presentation on the planning: Patrick Hof and Jens Liebchen, from Redteam Pentesting, presented slides about JBoss and its configuration. The goal was to explain how to exploit a JBoss server and got a shell on the server. They got it! Jboss is based on a complex architecture and is
hack.lu Part #6
Back from lunch, the conference continues with ligthing talks… First one, “NF3D and associates, firewalls get fun” from Eric Leblond, INL. NF3D is a vizualization tool for Netfilter logs. Logs (packets logged by Netfilter) are displayed in three-dimension like a GANTT diagram. Ulogd2 is a userspace logging daemon for Netfilter.
hack.lu Part #5
Back to the presentations… Ezequiel David Gutesman from Core Security Technologies presented a web application fuzzer. Why? Because web applications are very common (used everywhere) and consequences in case of attacks can be dramatic (loss of data, data theft, …) for companies. Countermeasure are WAF’s (Web Application Firewalls) coupled with
hack.lu Part #4
We’re back for the second day @ hack.lu. I need coffee! First presentation was made by Frank Boldewin. He presented the rootkit Rustock.C aka Ntldrbot. Like a lot of malwares, there was several versions were spread from 2005 to 2008 (when a new version was discovered – version .C). It
hack.lu Part #3
Last presentation of today, Joffrey Czarny presented how to go outside a Citrix context. As a pen-tester and maintainer of the Elsenet project, he explained how a pen-test was performed against a Citrix environment. First, it looked very easy to get a list of published applications! Amazing! Then ICA files
hack.lu Part #2
Back from a coffee break, let’s start the next part! Adam Laurie presented its Python library used to explore RFID devices. RFID devices becomes part of our daily life. Adam focused on ePassports. He made a demo with a passport grabbed from the audience (he had to ask several times,