Web Hacking Challenge (All day event)
|
We will be setting up a machine named �SconRox� that will have two
web applications that will challenge you to hack them. The first website is
a gated progression of login pages where you must solve specific problems
using different web hacking techniques. While the second is designed to be
more free-form, resembling more of what a real website would be like. A
unified scoreboard will be kept; so everyone will know who is "leading" in
the
competition throughout night. Woodzy will then hack, or get audience
members too (depending on levels of intoxication), the most interesting
challenges live at the end of the night. The winner of the hacking
competition
will receive a special surprise* from uncle redpantz (and yes,he _IS_ feeling
grabby).
*Void if you currently work in the 'security' industry. Nice try white devil mother fuckers.
|
Atlanta Freeside Hacker Space
|
Within two months of our announcement to form an Atlanta hacker space, over 50 people came together to help make it a reality. Freeside (http://www.FreesideAtlanta.org/) is on track to sign a warehouse lease this summer. This talk will cover how we got organized, how we planned for funding, some lessons we learned from other hacker spaces, and how Freeside will distinguish itself from the other spaces popping up all over the country.
|
Snort and ClamAV on Your Wireless Router
|
WORKSHOP
Bringing the power of Snort and ClamAV to embedded Linux!
We�ll start with a $90 ASUS WL-500g Premium wireless router and turn
it into a security gateway providing IPS (Snort Inline) and web AV
(DansGuardian and ClamAV) functionality. Along the way we�ll
introduce the hardware, liberate the firmware, and show you how to
unleash the power of your wireless router.
PREREQUISITES
If you want to play along you'll need a Linksys WRTSL54GS or ASUS WL-500g
Premium router, a computer with a SSH client, and basic *nix command
line skills (cp, ln, vi).
|
Swineocalypse Now: From Spl0it to Snort Detection in Minutes
|
WORKSHOP
The Snort intrusion prevention and detection system is the world's most
widely-deployed IDS/IPS. In addition, it is free (as in speech, not beer)!
One of Snort's strengths is its ability to describe powerful detection logic
in a high-level rules language.
In this workshop we'll start with the basics of Snort rule writing and work
our way into advanced topics such as preprocessor normalization and
decoding, resistance to evasion techniques, detection of web application
attacks, and the creation of Snort Dynamic Rules (i.e., shared object
rules).
PREREQUISITES
A VMware Server v1.x image will be provided to attendees of the workshop.
The provided VMware image includes the latest stable release of Snort
running on a minimal CentOS Linux platform. Attendees who wish to use the
VMware image should come prepared with their own computer and a compatible
installation of VMware Server (free as in beer), VMware Workstation, or
VMware Player (free as in beer).
VMware Server
http://www.vmware.com/products/server/
VMware Player
http://www.vmware.com/products/player/
|
Food Genome : Food programming application platform
|
Food Genome demo (more details later)
|
WORKSHOP
You've seen all the cool kids and leet haxors with their lockpick kits
at other cons... fanboys and scenewhores swoon, amazed at how adept
these ninjas and rogues are at opening locks. We all know that you long
to possess this talent, to have supple-skinned and dewey-eyed admirers
wrapped around your thigh and gazing up at you like the flaxen-haired
waifs painted on the side of a 1970s van. But... the deep, dark secret
you keep is that you were too busy with other things and missed out on
learning about lockpicking as it was getting more and more attention the
past few years.
You try to stop by the Lockpick Village at DEFCON, ShmooCon, or HOPE...
only to find it hopelessly crowded, and no one gives mere "intro to
lockpicking" courses at cons anymore. Well, be stymied no more! Help
is here in the form of Deviant Ollam, who feels that any time is a good
time (and a fun time) to learn the basics of lockpicking. He will
conduct a workshop at this year's SummerCon specifically dedicated to
taking complete novices and turning them into seasoned pickers, capable
of tackling a wide range of locks and exploring more advanced topics
with confidence and aplomb.
PREREQUISITES
A fine appreciation for Viking-themed heavy metal music is a must, and a
command of the Dutch language including its varied regional dialects
(the western Gelderland tongue, in particular), are very helpful given
that Deviant has been known to play tracks from bands like Heidevolk
during hands-on segments as people try what they have learned. Aside
from this, however, there are no prerequisites, per se. Locks, picks,
tools, and all other hardware will be provided. This workshop is BYOB.
|
Cross-Site Scripting is Stupid: So is Your Face
|
This talk will take the listener through a series of undeniable
arguments that PROVE XSS is stupid. It should only be considered a
means to an end and a waste of time, not the focus of any continued research.
|
The EX Factor: Proximity based identity theft
|
Everyone has a few skeletons in their closet: old relationships,
former co-workers, and nosy neighbors they would like to forget. But
what happens when one of these skeletons has a bone to pick with you?
Because of the proximity some people have unqiue access to details of
your personal life that can be used to compromise your online
identity. This talk will give you the power to put the skeletons back
in the closet by giving you tips, tricks, and techniques to keep
people in the past�.just a memory.
|
|