Conference at a Glance

Download Conference at a Glance PDF

Event at a Glance

Download Event at a Glance PDF
Legend
  • Inauguration and Opening Keynotes

    His Excellency
    Shri HR Bhardwaj
    The Governor of Karnataka
    (September 6th)
    Lt. General
    Lt. General (Ret.), Indian Army
    (September 7th)
  • September 6th Keynotes

    Father of Public Key Encryption,
    VP for Info. Security at ICANN &
    Scientific Advisor to Uniken
    VP and Divisional CISO,
    RSA
    IAAS
    Principal Account General Karnataka (A&E)
  • September 7th Keynotes

    Executive Director,
    (ISC)2
    Director Global Cyber Secuirty,
    Department of Homeland Security
    President & Co-Founder,
    EC-Council
  • 11:30AM -
    12:30PM

    Botnets at Application+ layer

    Botnets are now the key platform for many Internet attacks, such as click frauds, email spams, distributed denial-of-service (DDoS), identity theft, and phishing. Most of the current botnet detection approaches work only on specific botnet command and control (C&C) protocols (e.g., IRC) and heuristics. These approaches can become ineffective as botnets change their infection techniques. I would be presenting a prevalent botnet infection technique at application+ layer and mitigation methodology for such infections. Most of the software vendors provide extension frameworks for modularity and community development. These extension frameworks work at application+ layer. Common examples of such frameworks are dynamically-linked SDK extension to Acrobat or Adobe Reader, XUL by Mozilla and Skype4COM framework for Skype internet telephony. The modularity features of these extensions are misused by bot to inflect legitimate software.The presence of such bots at presentation+ layer are independent of C&C protocol and heuristics. Thus, these bot are known to be technically invisible to both onboard antivirus and host/network based intrusion prevention and detection systems (IPS & IDS). Such bots uses piggybacking mechanism on legitimate programs, which perform legitimate transactions between the C&C and the infected machines.

    The talk will be demonstrating the attack vector used by bots at Application+ layer.It would further bring about a working PoC of the attack vector on the firefox browser using Metasploit (Same applied for other browsers and apps like Skype, Adobe Reader etc..). Finally, would be emphasizing on the mitigation techniques for such an attack.

    About Raj Shastrakar, CERT Navy

    Raj has worked with Tata Consultancy Services (TCS) and the Tata Institute of Fundamental Research, Mumbai (TIFR). He has also undertaken development in the GNU/Linux Kernel and Semantic Knowledge Systems, as well as programmed the first Linguistic GNU/Linux Kernel for Indian Languages. Raj is currently working as Deputy Director with CERT Navy, wherein he deals with Cyber Threat Analysis and mitigation plans.

  • 11:30AM -
    12:30PM

    HTML5: Something Wicked This Way Comes

    HTML5 is quickly gaining media attention and popularity among browser vendors and web developers. Having tremendous features, together with its sister specifications like Drag & Drop API, File API or Geolocation it allows developers to build rich web applications that easily blend with desktop & mobile environments.

    The talk will be focused on finding the weakest link and combining several recent attack techniques to turn a security vulnerability into a successful exploit.

    We'll show how to build a successful advanced UI-Redressing attacks (also known as clickjacking), presenting the latest findings in this field, including malicious games and quizes. We'll work on file upload functionalities in current web applications and see how attackers might use HTML5 APIs for their advantage. Putting all these building blocks together will enable us to launch an attack and exploit even the otherwise unexploitable vulnerabilities.

    About Krzysztof Kotowicz, Securing

    Web security researcher specialized in the discovery and exploitation of HTML5 vulnerabilities. Author of multiple recognized HTML5/UI redressing attack vectors. Penetration Tester with Securing.pl. IT security trainer with Niebezpiecznik.pl and author of the "Hacking HTML5" training program. Read more

  • 11:30AM -
    12:30PM

    Implementing a Joint Computer Emergency Response Team (J-CERT)

    Escalating cyber threats are threatening the stability of national, regional, and international security. There continues to be an urgent need to establish an international cyber response team that can provide quick reactionary assistance to member countries in the inevitability of a cyber crisis. The J-CERT would provide this emergency technical assistance to support the host country’s computer emergency response team (CERT).

    The national CERT teams of Estonia and Georgia were grossly understaffed and poorly prepared to deal with the major cyber incidents that impacted their respective countries. If Estonia or Georgia had been able to call for J-CERT support, maybe their Internet interruptions would have only lasted a few hours or even a few minutes, rather than several days.

    Who will you call the next time bits and bytes start flying?

    John Bumgarner, CTO USCC

    John Bumgarner is the Research Director for Security Technology and Chief Technology Officer of the U.S. Cyber Consequences Unit, an independent, non-profit research organization that investigates the strategic and economic consequences of cyber attacks. He has over 20 years of work experience in information security, military special operations, intelligence, and physical security. Read more

  • 12:30PM -
    1:30PM

    Ground BeEF: Cutting, devouring and digesting the legs off a browser

    Browser security is still one of the trickiest challenges to afford nowadays. A lot of efforts has been spent on mitigating browser exploitation from heap and stack overflows, pointers dereference and other memory corruption bugs. On the other hand there is still an almost unexplored landscape.

    The presentation will cover the following main areas, among other things:
    Cutting: stealth activities, target enumeration and analysis.
    Devouring: internal network fingerprint via JS, exploiting internal
    services through the browser, keylogging, browser pwnage.
    Digesting: persistence, tunneling sqlmap/Burp through BeEF proxy, DOM
    Snitch and XSSrays integration.

    About Michele Orru, Royal Bank of Scotland Group

    Michele Orru' a.k.a. antisnatchor is an IT and ITalian security guy who works as a Penetration Tester for The Royal Bank of Scotland Group in Warsaw, Poland.He mainly focuses his research on web application security. Read more

  • 12:30PM -
    1:30PM

    Enabling Un-trusted Mashups

    Web mashups are the ultimate manifestation of user generated content, arguably primed for an unprecedented growth. This notion is already being hyper realized with proliferation of open social platforms where user is the developer, user and the distributor network.

    Mashups are everywhere, but in a avatar that is intrinsically insecure. They run on a technology stack that was never written with consideration of the former. Either the un-trusted mashup code runs with the same privileges as trusted parent code served from the host site or it is iframed. While iframes do have some security benefits, they mostly provide a false sense of security due to provisions that can be easily exploited by a malicious user. Then there is the third kind that was invented specifically to solve this conundrum - the virtual web sand boxing that enable the required secure behavior but with its own trade-offs and limitations.

    In this talk you will witness live demos of various attacks on mashups, potential solutions, their drawbacks and relevant risk management approaches.

    About Bishan Singh, Yahoo!

    Bishan (Bish) is from the Yahoo security group, called Paranoids. In his current role, he works with engineers at Yahoo SDC Bangalore to build secure and defensible applications.His role transcends to various groups at Yahoo from Ads, Media, Open Social to Cloud Security. Read more

  • 12:30PM -
    1:30PM

    Analyzing the Effectiveness of Web Application Firewalls

    In the spirit of earlier evaluations this talk will discuss the pros and cons of testing WAFs.

    A set of commercial and open source WAFs will be covered and the reasoning behind the ratings will be discussed. The tests focus on how effective are WAFs against a set of known vulnerable websites after a basic tuning process.The talk will also cover things to watch out for when evaluations are done as well as the basic strengths and weakness of each WAF under test. Weaknesses in WAFs will be covered as well as what the future holds for this type of security technology.

    About Larry Suto, Independent

    Larry Suto is an independent security consultant based in the Bay Area in the United states. He has been doing information security work for over 15 years.

  • 2:30PM -
    3:30PM

    From Printer to Owned: Leveraging Multifunction Printers During Penetration Testing

    In this presentation we go beyond the common printer issues and focus on configuration data available on multifunction printers (MFP) that can be leveraged to gain access to other core network systems. During this presentation I will be discussing how poor printer security, and discovered vulnerabilities can be leveraged to harvest a wealth of information from MFP devices including usernames, email addresses, and authentication information including SMB, Email, LDAP passwords. I will also be discussing the real world penetration testing scenarios and how MFP data was gathered and used to successful gain administrative access into core systems, including email servers, file servers and Active directory domains on multiple occasions. We will also explore MFP device vulnerabilities including authentication bypass, information leakage flaws, and XSS flaws. Tying this altogether we will discuss the development of an automated process for harvesting the information from MFP devices with the beta release of the tool 'PRAEDA'

    About Deral Heiland, CDW

    Deral Heiland CISSP, serves as a Senior Security Engineer where he is responsible for security assessments, and consulting for corporations and government agencies. In addition, Deral is the founder of Layered Defense Research a group of security professionals responsible for discovering and publishing multiple vulnerabilities. Read more

  • 2:30PM -
    3:30PM

    Rapid threat modeling: case study of the innocent (but still nice) Doctor

    Threat modeling is a security activity conducted at design phase, which aims at identifying and documenting the threats (and their most appropriate countermeasures) that apply on a given application. Its major advantage is to enable threat detection and defense at the earliest phases of a project.

    During this talk, we will observe the inspired case of a Doctor, interested in outsourcing the development of a web/mobile application to manage his patients appointments. We will use a simplified approach of threat modeling methods to quickly identify the most important threats and countermeasures that should be attached to the functional specifications document, before it gets transmitted to the architects/developers.

    About Antonio Fontes, L7 Sécurité

    Antonio has over 10 years experience in the field of software development and information security with financial and private organizations. Member of the OWASP Switzerland board, he leads the OWASP Geneva chapter and regularly contributes to several appsec reference projects such as the "CWE Top 25 most dangerous programing errors." Read more

  • 2:30PM -
    3:30PM

    Private Internet Circuits - Towards A Next Generation Internet

    The talk will cover a brief history of the evolution of the internet technology and the fundamental limitations that the current internet technology carries with it due to the underlying principals of design that are antithetical to the requirements of security and privacy. A new breakthrough technology - "Private Internet Circuits" - will be presented, which possibly could pave way to a next generation internet technology that could enable the creation of an ecosystem for a far more secure internet.

    Sanjay Deshpande, Uniken

    After obtaining a Masters degree in Computer Science, from University of New Brunswick, Canada, Sanjay worked as a Scientist with Center for Development of Advance Computing (the R&D Center that developed India's first super computer PARAM), and Tata Research Center (an R&D division of Tata Consultancy Services) in their Imaging and Pattern Recognition Group. Read more

  • 4:00PM -
    5:00PM

    Security Threats on Social Networks

    Over the past few years, there has been an explosion of social networking, which has reinvented communication as we know it- creating new opportunities to develop friendships and business contacts all over the world. According to comScore, today, Facebook is the 4th largest U.S. web property in audience size with 157.2 million visitors in May 2011, representing its all-time high and a gain of 3.2 million visitors vs. the previous month. Linkedin.com (33.4 million visitors) and Twitter.com (27.0 million) also reached all-time U.S. audience highs in May 2011.

    About Nithya Raman, Symantec

    Nithya is a threat researcher at Symantec, with a focus on web based threats. She has over 6 years of experience in the field of information security, and has been working with the Norton Safe Web product over the past 3 years. She has done extensive research on search engine optimization poisoning and has developed the detection methodology (patent pending) implemented in Norton Safe Web. Read more

  • 4:00PM -
    5:00PM

    A Crushing Blow At the Heart of SAP J2EE Engine

    Nowadays SAP NetWeaver platform is the most widespread platform for developing enterprise business applications. It's becoming popular security topic but still not cowered well. This talk will be focused on one of the black holes called SAP J2EE engine. Some of the critical SAP products like SAP Portal, SAP Mobile, SAP XI and many other applications lay on J2EE engine which is apart from ABAP engine is less discussed but also critical.

    About Alexander Polyakov, ERPScan

    Alexander Polyakov aka @sh2kerr, CTO at ERPSCAN, head of DSecRG and architect of ERPSCAN Security scanner for SAP. His expertise covers security of enterprise business-critical software like ERP, CRM, SRM, RDBMS, banking and processing software. Read more

  • 4:00PM -
    5:00PM

    Application Security Strategies

    For medium to large organizations, managing the business pressures to release applications in double-quick time, coupled with the regulatory pressures from RBI, IRDA, Department of Telecom, IT Act and others creates a conflict which seems difficult to resolve. How does a CISO manage to get the enterprise web application universe covered as comprehensively as possible from a security perspective, without becoming a bottleneck in business priorities? Which security testing methodologies should be chosen at what stage in order to be most effective – secure design, secure code reviews, black-box testing, application control reviews? Can applications be prioritized in terms of their assessment? How do we deal with vendors who are not too keen to spend additional developer time in fixing security issues?

    This talk presents some concrete ideas to help development teams, CISOs, and security managers implement certain strategies to help bring some method to the madness that currently prevails in a any fast-growing enterprise. It also looks at areas where goof-ups have happened, and lessons learnt to help ensure that high-risk issues do not get missed out. Finally, it also presents our suggested approach to testing web applications and ideas towards prioritizing the activities that would constitute an effective and efficient application security framework.

    About Kanwal K. Mookhey, NII Consulting

    Kanwal K. Mookhey (CISA, CISSP, CISM) is the Principal Consultant and Founder at Network Intelligence as well as the Founder of The Institute of Information Security. He is an internationally well-regarded expert in the field of IT governance, information risk management, forensic fraud investigations, compliance, and business continuity. Read more

  • 5:00PM -
    6:00PM

    Runtime thread injection and execution in Linux processes

    Windows malware conveniently uses the CreateRemoteThread() api to delegate critical tasks inside of other processes. However till now there is no API on Linux to perform such operation. This paper talks about my research on creating an API similar to createRemoteThread() on *nix OSes. The aim of the research is to show how a simple debugging functionality in *nix oses can be exploited by a malware to hide itself and delegate(inject) the critical(malicious) operation to an innocent process. The Proof of concept toolkit code named "Jugaad" currently works on Linux, allocates space inside a process and injects and executes arbitrary payload as a thread into that process. It utilizes the ptrace() functionality to manipulate other processes on the system. ptrace() is an API generally used by debuggers to manipulate(debug) a program. The talk will conclude with options for protecting against any such kind of attacks.

    About Aseem Jakhar, Payatu Labs

    Aseem "@" Jakhar is the chief researcher at Payatu Labs, a startup in information security trainings and consulting, with extensive experience in system programming, security research and consulting. He has worked on various security products and tools. He has been a speaker at various security conferences including Xcon, Blackhat EU, Clubhack, IBM Security & Privacy Bangalore, Cocon, ISACA Bangalore, Bangalore Cyber secuity summit, National Police Academy Cyber crime seminar Hyderabad. Read more

  • 5:00PM -
    6:00PM

    Using Data Analytics for Incident Response

    Critical Incident Response teams are tasked with quickly responding to any known attacks, which may be occurring in the company at a given time. As a result, most of their efforts are geared towards identifying those attacks, which are causing a lot of activity within their network and stopping them immediately. They have the assistance of various Security Incident Event Management (SIEM) and Full Packet capture tools in dealing with such real-time attacks. However, another significant challenge for CIRT teams is also to quickly identify the source of infection, once they learn from external sources that a confidential document has been compromised from the company. While they are working against the clock to identify and plug the infection vector, they are bogged down by multiple complexities. These include dealing with large amounts of varied types of security data (e.g. SIEM & Packet capture data, configuration data etc) as well as the increasingly low-and-slow nature of newer attacks based on the Advanced Persistent Threat model, wherein the attack activity is well distributed across time (i.e. conducted in smaller un-noticeable increments) and space (i.e. across different endpoints), not to show up high on the radar of the deployed SIEM or full packet capture based monitoring of the CIRT.

    In this session, we discuss how Data analytic techniques can be leveraged for enabling a Faster Incident Response handling structure. Herein, the security event data is either stored across distributed data clusters in an unstructured format such as that used in Hadoop, or can be stored within parallel structured databases such as Greenplum. As a technology demonstration, we choose the Greenplum community edition infrastructure, due to its support for relational databases, which is typically used within by existing CIRT infrastructures. The proposal hinges on the knowledge of a compromised artifact from some external sources (say, an underground forum discussing the leak from the enterprise) and using that information to track the version, timestamp of the leaked artifact. Further, therein we discuss how multistep temporal data correlation can be used, starting the analysis from the endpoints/users that have accessed the leaked version, to identifying the various servers which those endpoints have accessed within varying time-intervals, and further whether those respective servers have shown any unresolved SIEM activity which may be suspicious. Eventually, correlating such reduced SIEM activity data with information from configuration systems about any potentially exploitable vulnerabilities in the respective web servers or User activity anomalies, helps in reducing the set of suspicious endpoint activity to a small manageable set, which can be manually investigated by the CIRT team.

    About Samir Saklikar, RSA

    Samir Saklikar leads the Software Advanced Development team of RSA, The Security Division of EMC. As a Principal Technologist in the CTO office, he works on architecting and developing novel solutions and Proof of Concepts around strategic initiatives for RSA such as Cloud Computing, Anti-Threat, Mobile and Identity Security technologies. Read more

  • 11:30AM -
    12:30PM

    Alternative Exploitation Vectors (A study of CVE-2010-3333)

    Standard vulnerability and exploitation methodologies do not apply anymore, a security researcher is not only required to know how a vulnerability occurs but how it's created. This presentation challenges what you know about CVE-2010-3333 through publically available sources and how this vulnerability was exploited by the underground hacking community.

    About George Nicolaou, Independent

    George Nicolaou works as an independent security consultant and researcher, he received his BSc in Computer Science and MSc in Advanced Computing Security from the University of Bath in UK in which he pursued research involving malware and vulnerability analysis. Read more

  • 11:30AM -
    12:30PM

    Mobile Devices – Boon or Curse?

    As enterprises realize the efficiency in which employees operate by using mobile apps and allowing employees to bring their own smartphones, a merging of enterprise and consumer use presents real risks to the enterprise. We’ll discuss a number of mobile attack scenarios that may compromise enterprise data and present to you how attackers may try to get at information within smartphones. We will outline recommendations on what you should avoid when designing and developing mobile applications to protect yourself from such attacks.

    About Oliver Ng & Kishor Sonawane, Securitycompass

    Oliver Ng is the Director of Training at Security Compass. In this role, he is responsible for assisting clients in their educational IT Security needs and driving Security Compass' training programs to meet the constantly evolving security landscape. Read more

    Kishor has a total of 7 years experience in Information Security and provided consulting services for variety of International, domestic clients. He holds a Masters degree in Computer Science (M.C.S.) from Pune University. He is a Certified Ethical Hacker and BS7799-2 Lead Implementer. Read more

  • 11:30AM -
    12:30PM

    Communications Information Technology: Business Enabler or Business Liability?

    Following a concise review of the communications information technology revolution with the introduction of the personal computer to the ubiquitous mobile platforms of today, Dr. Marshall describes the current pervasive threat exposure environment and emphasizes the importance of creating a cyber-ecosystem that is both highly dependable and highly resistant to degradation and disruption. Toward that end, he touches on the importance of supply chain risk management, software assurance, and ongoing efforts such as the common weakness risk analysis framework, the common weakness scoring system, security content automation protocol, common criteria and the 25 most dangerous software errors that can influence and lead to a more robust cyber eco-system. He concludes with observations on why communications information technology governance should be a major component of the business enterprise governance lead by the chief executive officer.

    About Dr. Richard H.L. Marshall, DHS

    Dr. Marshall, a member of the Senior Cryptologic Executive Service (SES) and the Defense Intelligence Senior Executive Service (DISES), is the Director of Global Cyber Security Management, National Cyber Security Division, Department of Homeland Security (DHS) by special arrangement between the Director, National Security Agency (DIRNSA) and the Secretary of DHS. Within DHS he leads the direction of the National Cybersecurity Education Strategy; Software Assurance; Research and Standards Integration; Supply Chain Risk Management; and Cybersecurity Education and Workforce Development. Read more

  • 12:30PM -
    1:30PM

    Enterprise Wi-Fi Worms, Backdoors and Botnets for Fun and Profit

    In this talk, we will explore how perfectly legitimate and useful features like the Wi-Fi Hosted Network on Windows 7 can be abused by malware to wreck havoc! We will see how an attacker could create Wi- Fi worms, backdoors and botnets using different techniques and attack Windows 7 clients using WPA2- PSK networks. These malware will use their own private Wi-Fi network to propagate and communicate with the attacker, and each other. We will also look at how to create proxy chains using Wi-Fi clients and how this technique makes it almost impossible to trace back the attacker! Who knows, the next Stuxnet may just use Wi-Fi for propagation over USB

    About Vivek Ramachandran, SecurityTube.net

    Vivek Ramachandran started working on Wi-Fi Security since 2003. He has spoken at conferences such as Blackhat, Defcon and Toorcon on Wireless Security and is the discoverer of the Caffe Latte attack. He also broke WEP Cloaking, a WEP protection schema in 2007 publically at Defcon. Read more

  • 12:30PM -
    1:30PM

    Social Web & Privacy – An evolving world

    How Social Web has interesting impact on companies like Yahoo! that predate Social Web Revolution. Back in the day, users provided us a lot of personal information for their own consumption but we now want to encourage them to share some of it in the new world. What are the challenges in doing this from user education & expectation, legal & privacy disclosures, etc.?

    We provide high level introduction to the scale of data at play within Yahoo!, how we comply with legal and privacy laws based on jurisdiction, challenges like sometime we can't move the data closer to user geo which has performance implications.

    Privacy in the new world is dead – this is a hug myth. People still care a lot about it in spite of the openness promoted by the new social web like Twitter where everything is public, or sharing unprecedented amount of data(content like personal photos, videos, messages) within friends on networks like Facebook. We look at why this is a myth and debunk this theory.

    Lastly, we cover sharing data with 3rd party sites & developers via Apps & APIs – this introduces new set of challenges. Why does my alarm app on iPhone need my friends list? How to enforce retention policies? How to give better visibility to users on where their data is going, who is viewing it, etc.

    About Bala Sathiamurthy and Aridaman Tripathi, Yahoo!

    I focus on securing large scale distributed production software across Yahoo! networks. My team is responsible for building and maintaining all software tools and libraries that are used by engineers across Yahoo! to build secure products. Read more

    Aridaman has been with the Yahoo Paranoids team for the last seven years. In his current role, he works with security engineers across the international offices to help secure various projects going on there including projects in the field of eCommerce, Social Networking, Media and Communication. Read more

  • 2:30PM -
    3:30PM

    IronWASP - A Web Application Security Testing Platform

    All Web Applications share the same architectural underpinnings but each one has subtle differences in implementation. These differences make it impossible to write a generic Web Security Scanner that works for all applications. As a Penetration Tester, I routinely observe and understand how each application is designed before testing them. I had always dreamt of a day when I could feed my understanding of the application in to a scanner and let it take over from there. IronWASP is the realization of that dream.

    IronWASP is an extremely flexible and powerful web security scanner with components to test for most of the common web application vulnerabilities. These components can be extended and altered either in Python or Ruby. More importantly it has an integrated scripting engine which can be used to create your own web security scanner, customized for a specific web application, in a matter of minutes, in a few lines of Python or Ruby using the IronwASP API. It packs many clever features in a simple and clear UI including a JavaScript Analyzer to scan for DOM-based XSS. If you are in to Web Application Security then IronWASP will most likely make you drool!

    About Lavakumar Kuppan, Independent

    Lavakumar is a Web Security Researcher with over 5 years of Penetration testing experience. He has authored multiple security tools like 'Shell of the Future', JS-Recon, Imposter and the HTLM5 based Distributed Computing System - Ravan. Read more

  • 2:30PM -
    3:30PM

    Data Protection

    Loss of sensitive business information or customer data can bring an organization to its knees. The ability to easily port data using removable media, the increase in the use of mobile devices including laptops and the shift towards “consumerization” of IT are together making it extremely difficult for Information Security professionals to first identify and then protect data from falling into the wrong hands. Be it protection of intellectual property or compliance to statutory requirements, companies are taking a hard look at their ability to protect critical and sensitive information.

    This talk will cover all the aspects of Enterprise Data Protection within the context of protecting data at rest and in motion. The speaker will talk about real life problems and implications of data loss and then differentiate between traditional Encryption methodologies and new age Data Loss Protection approaches. In specific, the speaker with talk about the nature and upcoming trends of Full Disk Encryption, Content and Removable Media Encryption, Host based and Network based Content Discovery and DLP.

    About Dipankar Roy, McAfee

    Dipankar has been working in the Security industry for 9 years. A graduate in Physics and a MBA in Information Systems, Dipankar started his career in the US in early 2000. After working initially for a couple of product companies he moved to McAfee, Bangalore in 2002 and has been there since, helping build different products in the fast evolving Digital Security space. Read more

  • Web Application Defender

    By K.V. Prashant and Mohammed Imran
  • One Day Workshops

  • Mobile Security details

    Who should attend: New to Application Security, Developers, Architects, Project Managers, Senior Security Professionals, Hackers

    In this training workshop, you'll get started with mobile security for Android and iPhone. We will be discussing the mobile app security models, device security models, mobile data protocol analysis including proxying of the phone, the device file system and gaining access to critical files.

    We'll run through how applications are packaged for Android and understanding how to break down the packaged components for analysis purposes. This will include using open source tools to inspect compiled code and memory inspection.

    Finally, we'll discuss how these techniques can assist in pen testing the security of mobile apps, how they differ from traditional web applications and future of this growing area of application development.

    ID SB1DMHT
    Instructor Oliver Ng and Kishor Sonawane, Security Compass
    CPE Credits 7
    Duration 1 Day
    Date September 9th, 2011 (9 AM – 6 PM)
    Laptop Required
    Who should attend
    • New to Application Security
    • Developers
    • Architects
    • Project Managers
    • Senior Security Professionals
    • Hackers
    Overview

    In this training workshop, you'll get started with mobile security for Android and iPhone. We will be discussing the mobile app security models, device security models, mobile data protocol analysis including proxying of the phone, the device file system and gaining access to critical files.

    We'll run through how applications are packaged for Android and understanding how to break down the packaged components for analysis purposes. This will include using open source tools to inspect compiled code and memory inspection.

    Finally, we'll discuss how these techniques can assist in pen testing the security of mobile apps, how they differ from traditional web applications and future of this growing area of application development.

    Outline:

    1. Introduction
      • Approaching a mobile assessment
      • Mobile App protocol analysis
        • Attack vectors against protocols
      • Device analysis
        • Attack vectors against physical devices
    2. Device security model
      • Android
        • General OS model
        • How applications are distributed
        • How applications are sandboxed
      • iPhone
        • General OS model
        • How applications are distributed
        • How applications are sandboxed
      • Overview of differences between the platforms
    3. Protocol Analysis: Transferring skills from everyday pen-test experience
      • Proxying a mobile application for both Android and iPhone
        • Lab : on proxying traffic and insecure connections
      • Assessing mobile application traffic and protocol (how the app talks)
        • LAB: on performing parameter manipulation
      • Common protocols used by mobile applications
    4. Client Analysis: Device File system
      • Discussion on how to access the file system on both Android and iPhone devices
      • What are the commonly used files types for storage and settings
      • Accessing files on a non-rooted phone
      • Lab : file storage permissions
      • Logging of information on the device
      • Lab : insecure logging of information
    5. Client Analysis: Application Distributable
      • Android install package, what's in it?
        • Using apktool and introduction to smali
        • Using dex2jar and jad to get java files
      • Lab: on encrypting credentials
      • iPhone install package, what's in it?
        • Common methods to assess
    6. Other topics
      • Need for mobile best practices
      • State of mobile malware
      • Jailbreaking/rooting
    Pre-requisites
    • Knowledge of penetration testing/security Assessment will be an advantage but is not essential.
    Requirements

    Please be sure to bring a laptop to this course.

    • Laptop with Windows XP Professional / Windows 7
    • x86 compatible 2Ghz CPU minimum or higher
    • Hard disk size about 30 GB
    • RAM size 2 GB (minimum) or higher
    • CD/DVD Drive
    • USB slot
    • Administrator Privileges to install/disable software
    • VMWare Player installed
    • VMWare iamge will be provided at the workshop
  • Network Architecture and Firewall Basics details

    Who should attend: New to Network Security, Anyone who is intending to become Network Security Professional

    Demo + Few Hands on Exercises

    1. Network Perimeter Security
    2. Network Firewall
    3. Network IPS/IDS
    ID SB1DNFB
    Instructor McAfee
    CPE Credits 7
    Duration 1 Day
    Date September 8th, 2011 (9 AM – 6 PM)
    Laptop Required
    Who should attend
    • New to Network Security
    • Anyone who is intending to become Network Security Professional
    Overview

    Demo + Few Hands on Exercises

    1. Network Perimeter Security
      • Introduction
        • Business Situations
      • Technology Blueprints
        • Solution Space
      • Problem Definition
        • Why Security
        • Why Network Perimeter Security
      • Network Security
        • Attack Phases
        • Attacks on Network
      • Solutions
        • Network Security Solution
      • Conclusion
        • Defense in Depth
      • Router Basics
    2. Network Firewall
      • Firewall Introduction
        • Definition, what it can do?
        • How does it work?
        • Types of Firewall
      • Firewall Architecture
        • Single site in large organization
        • Home firewall
        • SOHO firewall router
        • Distributed firewall architecture
        • Firewall Evolution
      • Solutions
        • Illustrating Application Detection, App Defense
        • Content Inspection( IP Reputation, Smart Filtering, AV, IPS)
        • NAT, VPN, High Availability
      • Conclusion
        • Sample configurations
        • Future directions
      • Firewall Hands-on
    3. Network IPS/IDS
      • IPS Architecture, Categorization, and Features
      • Advantages and disadvantage for each of the categories
      • Attack tools
      • Attack Evasions
      • Nextgen IPS Features
      • IPS Hands-on Session
    Requirements

    Please be sure to bring a laptop to this course.

    • Laptop with Windows XP Professional / Windows 7
    • x86 compatible 2Ghz CPU minimum or higher
    • Hard disk size about 50 GB
    • RAM size 2 GB (minimum) or higher
    • CD/DVD Drive
    • USB slot
    • Administrator Privileges to install/disable software
    • VMware Workstation 7 (download)
    • Note: we are expecting that people who needs hands on, should have installed above mentioned software prior to start of presentation. During the presentation/hands on session, we planned to provide FW VM software which can be loaded on VM server installed.
    • Steps for Getting the trial license

      • Access the page https://www.vmware.com/tryvmware/?p=workstation&lp=1
      • Follow the instructions and register your email and provide the other details to get the trial license
      • Login to your email account and activate the vmware account
      • Ensure that you get separate email with key
  • Hacking Web 2.0 Applications – Attacks & Defense details

    Who should attend: Developers, Architects, Project Managers, Security Professionals

    Introduction and adaptation of new technologies like Ajax, Rich Internet Applications (RIA) and Web Services has changed the dimension of Web Application Hacking and focus has shifted to hack into Web 2.0 space. We are witnessing new ways of hacking next generation web based applications components like Flex, Silverlight and HTML 5 across popular web sites like Facebook, Twitter, Google etc to name a few. In this dynamically changing scenario in the era of Web 2.0 it is important to understand new threats that emerge in order to build constructive strategies to protect corporate application assets. Application layers are evolving and lot of client side attack vectors are on the rise like Ajax based XSS, CSRF, Widget injections, RSS exploits, Mashup manipulations and client side logic exploitations. At the same time various new attack vectors are evolving around SOA, Cloud and Mobile by attacking SOAP, XML-RPC and REST. It is time to understand these advanced attack vectors and associated risks.

    The course is designed by the author of "Web Hacking: Attacks and Defense", “Hacking Web Services” and “Web 2.0 Security – Defending Ajax, RIA and SOA” bringing his experience in application security and research as part of curriculum to address new challenges. Hacking Web 2.0 Applications is hands-on class along with right tools. The class features real life cases, hands one exercises, new scanning tools and defense mechanisms. Participants would be methodically exposed to various different attack vectors and exploits. Following broad areas will be covered in various sessions along with hands-on and tools.

    ID SB1DHWA
    Instructor Shreeraj Shah / Vimal Patel (Blueinfy)
    CPE Credits 7
    Duration 1 Day
    Date September 9th, 2011 (9 AM – 6 PM)
    Laptop Optional
    Who should attend
    • Developers
    • Architects
    • Project Managers
    • Security Professionals
    Overview

    Introduction and adaptation of new technologies like Ajax, Rich Internet Applications (RIA) and Web Services has changed the dimension of Web Application Hacking and focus has shifted to hack into Web 2.0 space. We are witnessing new ways of hacking next generation web based applications components like Flex, Silverlight and HTML 5 across popular web sites like Facebook, Twitter, Google etc to name a few. In this dynamically changing scenario in the era of Web 2.0 it is important to understand new threats that emerge in order to build constructive strategies to protect corporate application assets. Application layers are evolving and lot of client side attack vectors are on the rise like Ajax based XSS, CSRF, Widget injections, RSS exploits, Mashup manipulations and client side logic exploitations. At the same time various new attack vectors are evolving around SOA, Cloud and Mobile by attacking SOAP, XML-RPC and REST. It is time to understand these advanced attack vectors and associated risks.

    The course is designed by the author of "Web Hacking: Attacks and Defense", “Hacking Web Services” and “Web 2.0 Security – Defending Ajax, RIA and SOA” bringing his experience in application security and research as part of curriculum to address new challenges. Hacking Web 2.0 Applications is hands-on class along with right tools. The class features real life cases, hands one exercises, new scanning tools and defense mechanisms. Participants would be methodically exposed to various different attack vectors and exploits. Following broad areas will be covered in various sessions along with hands-on and tools.

    Section 1 – Web 2.0 and RIA Basics and Threats
    • Web 2.0 Application Architecture and Threats
    • Application Attack Surface and Scenarios
    • Technology trends and Threats
    • Web 2.0 Protocols and Structures (JSON, XML, AMF, WCF, RPC etc.)
    • Ajax and RIA Components and understanding
    Section 2 – Assessment and Hacking Methodologies
    • Web 2.0 Assessment methodologies
    • Blackbox Vs. Whitebox – Picking the right one
    • Threat Modeling for Web 2.0 Applications
    • Analyzing Flex and Silverlight driven Applications
    • Reverse Engineering Applications and Tools
    Section 3 – Injection and Fuzzing Web 2.0 streams (Zero Knowledge)
    • Injections and Fuzzing with Web 2.0 and AMF streams
    • SQL injection over XML and JSON
    • Blind SQL injections with Web 2.0 Components
    • Detecting Injections and Tools
    • XML and XPATH injections
    • JavaScript and Command Injections
    • LDAP injection
    • AMF/WCF injections
    • Fuzzing and server side stream injections
    Section 4 – Client Side Hacking with RIA/Web 2.0 Apps
    • XSS and DOM based hacking
    • HTML 5 injections and script executions
    • CSRF and SOP bypass
    • ClickJacking
    • Mashup and Widget Hacking
    • RSS and Client side data poisoning
    • DOM based open redirects and forwards
    • Securing browser and client side components
    Section 5 – Reverse Engineering and Static Analytics
    • Analyzing Web 2.0 Application code
    • Debugging JavaScript for vulnerabilities
    • Logic bypass and vulnerabilities
    • Reverse engineering Flash/Flex
    • Analyzing Silverlight driven applications
    Section 6 – Web Services, SOA and Cloud Hacking
    • Cloud based application and architecture
    • Hacking SaaS
    • Open API abusing
    • Web Services Scanning and Assessment
    • Attacking Web Services and SOAP
    • XML and SOAP poisoning and Vulnerabilities
    • Filtering Web 2.0 traffic for security
    Section 7 – Mobile and Web 2.0 Hacks and Attacks
    • Mobile interfaces and stack
    • Application architecture and business access
    • Android hacking and security
    • iPad and iPhone hacks and attacks
    • Mobile security and countermeasures
    Requirements
    • Demo Based. Participants may bring in Laptop for carrying tools
    • Laptop with Windows XP Professional / Windows 7
    • x86 compatible 2Ghz CPU minimum or higher
    • Hard disk size about 20 GB
    • RAM size 2 GB (minimum) or higher
    • CD/DVD Drive
    • USB slot
  • Mastering the Dark Art – Exploit Development and Advanced Metasploit details

    Who should attend: Senior Security Professionals

    1. Metasploit 101
    2. Introduction to Debuggers
    3. Exploiting Buffer Overflows
    4. Metasploit Shellcodes and Encoders
    5. Exploits prevention mechanisms - SafeSEH, DEP and ASLR
    6. Client-side exploitation
    7. Meterpreter and Post Exploitation
    8. Addons to Metasploit
    ID SB2DEAM
    Instructor Wasim Halani / Omar
    CPE Credits 7
    Duration 1 Day
    Date September 9th, 2011 (9 AM – 6 PM)
    Laptop Required
    Who should attend
    • Senior Security Professionals
    Overview
    1. Metasploit 101
    2. Introduction to Debuggers
    3. Exploiting Buffer Overflows
    4. Metasploit Shellcodes and Encoders
    5. Exploits prevention mechanisms - SafeSEH, DEP and ASLR
    6. Client-side exploitation
      • PDF
      • EXE
      • JAVA
    7. Meterpreter and Post Exploitation
      • Pass-the-Hash
      • Token Impersonation
    8. Addons to Metasploit
      • SET
      • Armitage
      • DB_Autopwn
      • SQLNinja+MSF
    Pre-requisites
    • Basic understanding of Assembly Code
    • Basic programming/scripting knowledge
    Requirements

    Please be sure to bring a laptop to this course.

    • Laptop with Windows XP Professional / Windows 7
    • x86 compatible 2Ghz CPU minimum or higher
    • Hard disk size about 10 GB
    • RAM size 2 GB (minimum) or higher
    • CD/DVD Drive
    • USB slot
    • Administrator Privileges to install/disable software
    • VMWare Player / Virtualbox isntalled
    • Backtrack 5 Virtual Machine
  • Secure Javascript for Developers details

    Who should attend: Developers, Architects, Security Professionals, This workshop is designed for Web Developers but can also be attended by Penetration Testers and anyone else interested in JavaScript security. All attendees should have basic knowledge of the JavaScript language and general programming concepts.

    Web Applications store and process their sensitive and critical data on the server-side by using frameworks like J2EE, ASP.NET, PHP etc. But still all of this data is accessible and modifiable from within the browser which makes security of the client-side code as important as the server-side code. Yet there is very little focus on how to write secure JavaScript code and most developers are unaware of the fact that insecurely written JavaScript can lead to serious security problems.

    This workshop will introduce the attendees to the various security issues related to JavaScript, JSON and HTML5. They will learn how to identify such issues in the code. And more importantly how such issues can be mitigated to write secure JavaScript code.

    There will be hands-on lab sessions where attendees would have to write insecure code, identify the problem areas in the code and also mitigate them.

    ID SB1DSJS
    Instructor Lavakumar Kuppan
    CPE Credits 7
    Duration 1 Day
    Date September 8th, 2011 (9 AM – 6 PM)
    Laptop Required
    Who should attend
    • Developers
    • Architects
    • Security Professionals
    • This workshop is designed for Web Developers but can also be attended by Penetration Testers and anyone else interested in JavaScript security. All attendees should have basic knowledge of the JavaScript language and general programming concepts.
    Overview

    Web Applications store and process their sensitive and critical data on the server-side by using frameworks like J2EE, ASP.NET, PHP etc. But still all of this data is accessible and modifiable from within the browser which makes security of the client-side code as important as the server-side code. Yet there is very little focus on how to write secure JavaScript code and most developers are unaware of the fact that insecurely written JavaScript can lead to serious security problems.

    This workshop will introduce the attendees to the various security issues related to JavaScript, JSON and HTML5. They will learn how to identify such issues in the code. And more importantly how such issues can be mitigated to write secure JavaScript code.

    There will be hands-on lab sessions where attendees would have to write insecure code, identify the problem areas in the code and also mitigate them.

    1. Importance of JavaScript Security
    2. DOM based XSS
      • Introduction
      • Source and Sinks
      • Identifying DOM based XSS
      • Mitigating DOM based XSS
      • Lab Session
    3. JSON Security
      • JSON Parsing
      • JSON Hijacking
    4. Clickjacking Protection
      • What doesn't work
      • What Works
    5. HTML5 Security
      • Cross Origin Requests
      • Client-side Persistent Storage
      • postMessage
    6. Things to avoid doing in JavaScript
    Requirements

    Please be sure to bring a laptop to this course.

    • Laptop with Windows XP Professional / Windows 7
    • x86 compatible 2Ghz CPU minimum or higher
    • Hard disk size about 20 GB
    • RAM size 2 GB (minimum) or higher
    • CD/DVD Drive
    • USB slot
    • Administrator Privileges to install/disable software
    • Your favorite Javascript/HTML IDE installed
  • SAP Security: Attack and Defense details

    Who should attend: CSOs who want to know more about SAP security, Security auditors/Pentesters, BASIS Administrators, SAP Consultants

    This workshop will be focused on basics and advanced areas of technical aspects of SAP security. Understanding the architecture of typical SAP system and focuses on every component that can be attacked with live demo and hands-on exercises Covering areas such as SAP Gateway, Message server, RFC security, ITS, ABAP code vulnerabilities, JAVA-engine attacks, Authorizations, Database security, SAPGUI security and many others will be described.

    This workshop will present some 0-day attacks and techniques that were never presented before.

    ID SB1DSAD
    Instructor Alexander Polyakov and Dmitriy Evdokimov
    CPE Credits 7
    Duration 1 Day
    Date September 8th, 2011 (9 AM – 6 PM)
    Laptop Required
    Who should attend
    • CSOs who want to know more about SAP security
    • Security auditors/Pentesters
    • BASIS Administrators
    • SAP Consultants
    Overview

    This workshop will be focused on basics and advanced areas of technical aspects of SAP security. Understanding the architecture of typical SAP system and focuses on every component that can be attacked with live demo and hands-on exercises Covering areas such as SAP Gateway, Message server, RFC security, ITS, ABAP code vulnerabilities, JAVA-engine attacks, Authorizations, Database security, SAPGUI security and many others will be described.

    This workshop will present some 0-day attacks and techniques that were never presented before.

    Course Outline:

    1. Introduction to SAP
      • Why should we care
      • History of SAP security
      • Current situation in SAP security
      • SAP attack features
      • SAP defense features
      • Methodologies for ERP/SAP security (OWASP-EAS)
    2. Network level
      • Open ports
      • Protocol security
      • Trusted systems
      • Securing Network
    3. OS level
      • Sap-specific OS vulnerabilities
      • Critical SAP data in OS
      • From OS to SAP
      • From SAP to OS
    4. Database level
      • Critical database data
      • Attacking Database
      • From database to SAP
      • From SAP to Database
      • Securing Database
    5. Client-side security
      • Remote attack SAPlpd
      • Attacking ActiveX components
      • GUI scripting attacks
      • Collecting critical data
      • Advanced attack combinations and Trojans
      • Sapsploit/saptrojan demo
      • Securing workstations (ERPScan Online tool
    6. NetWeaver Application Server ABAP
      • SAP Gateway
      • SAP Message server
      • SAP Dispatcher
      • SAP ICM
      • SAP ITS (ERPScan Pentesting Tool)
      • SAP Router
    7. NetWeaver Application Server JAVA
      • Visual Admin
      • Web applications
      • SAP Portal
    8. Authorization Model
      • Authorization concept
      • Problems of SAP tools for checking authorizations
      • Critical Transactions
      • Critical Reports
      • Access to OS
      • Access to Tables
      • Segregation of Duties (SOD)
      • SOD problems and bypasses
    9. ABAP code security
      • Secure development
      • Improper Authorization
      • Injections ABAP/SQL
      • Access to OS/Traversals
      • Generic calls
      • Backdoors
    10. JAVA code security
      • Securing applications (ERPScan WEBXML checker)
      • Using secure API

    Participants will learn:

    • How to provide security assessment of SAP systems
    • How to Secure SAP systems from attackers
    • Practical experience from world-known experts
    Requirements

    Please be sure to bring a laptop to this course.

    • Laptop with Windows XP Professional / Windows 7
    • x86 compatible 2Ghz CPU minimum or higher
    • Hard disk size about 20 GB
    • RAM size 2 GB (minimum) or higher
    • CD/DVD Drive
    • USB slot
    • Administrator Privileges to install/disable software
    • SAPGUI client application, which can be found here (login required).
    • Perl needs to be installed
  • Two Day Workshops

  • CEH v7 / Pentesting Labs Overdrive details

    Who should attend: New to Network Security, Pentesters, Hackers

    This 2 days workshop covers 100% hands-on labs with cutting edge sophisticated hacking techniques. You will learn about advanced SQL Injection techniques, Cross-Site scripting, wireless key-loggers, Man-in-the-Middle Attacks, Wifi and Bluetooth hacks, tunneling techniques ,evading IDS and Firewalls, Stealth sophisticated techniques, Jailbreaking iPhones /iPads, deadly Trojans and rootkits and many more. There will be no PowerPoint slides or rather death-by-PowerPoint. Pure hands-on demos. Watch Haja the Hacking Magician perform his sophisticated attack techniques.

    ID SB2DCEH
    Instructor Haja Mohideen, EC-Council
    CPE Credits 14
    Duration 2 Days
    Date September 8th – 9th , 2011 (9 AM – 6 PM)
    Laptop Required
    Who should attend
    • New to Network Security
    • Pentesters
    • Hackers
    Overview

    This 2 days workshop covers 100% hands-on labs with cutting edge sophisticated hacking techniques. You will learn about advanced SQL Injection techniques, Cross-Site scripting, wireless key-loggers, Man-in-the-Middle Attacks, Wifi and Bluetooth hacks, tunneling techniques ,evading IDS and Firewalls, Stealth sophisticated techniques, Jailbreaking iPhones /iPads, deadly Trojans and rootkits and many more. There will be no PowerPoint slides or rather death-by-PowerPoint. Pure hands-on demos. Watch Haja the Hacking Magician perform his sophisticated attack techniques.

    • Footprinting and Reconnaissance
      • Basic Network Troubleshooting Using the Ping Utility
      • Basic Network Troubleshooting Using nslookup Tool
      • People Search Using the AnyWho Online Tool
      • Tracing an Email Using the eMailTrackerPro Tool
      • Network Route Trace Using Path Analyzer Pro
      • Analyzing Domain and IP Address Queries Using SmartWhois
      • Extracting Company’s Data Using Web Data Extractor
      • Mirroring Website Using HTTrack Web Site Copier Tool Scanning Networks
    • Scanning Networks
      • Scanning System and Network Resources Using Advanced IP Scanner
      • Fingerprinting Open Ports Using the Amap Tool
      • Monitoring TCP/IP Connections Using the CurrPorts Tool
      • Scanning for Network Vulnerabilities Using the GFI LANguard Network Scanner
      • Exploring and Auditing a Network Using Nmap
      • Mapping a Network Using the Friendly Pinger
      • Scanning a Network Using the Nessus Tool
      • Identifying Open Ports Using the Unicornscan Tool
      • Scanning a Network Using Hping3
      • Auditing Scanning by using Global Network Inventory
      • Proxy Server Daisy Chaining
      • HTTP Tunneling Using HTTPort
      • Basic Network Troubleshooting Using the MegaPing Enumeration
    • Enumerating a Target Network
      • Enumerating NetBIOS Using the SuperScan Tool
      • Enumerating Passwords from "Default Password List"
      • Enumerating NetBIOS Using theNetBIOS Enumerator Tool
      • Enumerating a Network Using SoftPerfect Network Scanner
      • Enumerating a Network Using Solarwinds Toolset
    • System Hacking
      • Extracting Administrator PasswordsUsing LCP
      • Hiding FilesUsing NTFS Streams
      • Find Hidden FilesUsing ADS Spy
      • Hiding Files Using the Stealth files Tool
      • Exracting SAM hashes using PWdump7 tool
      • Extracting Administrator PasswordsUsing L0phtCrack
      • Recover PST (Outlook) Password Using the Password Passware Recovery kit Forensic Tool
      • Monitoring a System Using the Alchemy Remote Executor
      • System Monitoring Using RemoteExec
      • Privilege Escalation using sethc.exe
      • CHNTPW.iso
      • Snow
      • Auditpol
      • Record Keystrokes and Passwords Using Perfect Keylogger
    • Trojans and Backdoors
      • Creating a Server Using the ProRat Tool
      • ICMP backdoor
      • Wrapping a Trojan using One File EXE Maker
      • Proxy Server Trojan
      • HTTP Trojan
      • Remote Access Trojans Using Atelier Web Remote Commander
      • Detecting Trojans
    • Viruses and Worms
      • Creating a Virus Using the JPS Virus Maker Tool
      • Virus analysis using IDA Pro
      • Virus analysis using Virus Total
      • Scan for Viruses using Kaspersky
    • Sniffers
      • Mapping a network topology
      • Sniffing the Network Using the Colasoft Packet Builder
      • Sniffing the Network Using the OmniPeek Network Analyzer
      • Spoofing MAC Address Using SMAC
      • Sniffing a Network Using the WinArpAttacker Tool
      • Analyzing a Network Using the Colasoft Capsa Network Analyzer
      • Sniffing Passwords using Wireshark
      • Performing Man-In­The­Middle Attack using Cain & Abel
    • Social Engineering
      • Detecting Phishing Using Netcraft
      • Detecting Phishing Using PhishTank
    • Denial of Service
      • Creating a Zombie Using Poison Ivy
      • SYN Flooding a Target Host Using hping3
      • Creating Zombies using Shark
      • HTTP Flooding using DoSHTTP
    • Session Hijacking
      • Session Hijacking Using the Paros Proxy
    • Hacking Webservers
      • FootprintingWebserver Using thehttprecon Tool
      • Footprintinga Webserver Using ID Serve
      • Hacking Windows Server 2008 with Metasploit Framework
    • Hacking Web Applications
      • Hacking WebA pplications
      • Testing WebA pplications Using the Burp Suite
      • Website Vulnerability Scanning Using Acunetix WVS
    • SQL Injection
      • SQL Injection Attacks on MS SQL Database
      • Blind SQL Injection Techniques
      • Accessing the OS using SQL Commands
      • Evading the Filters
      • Testing for SQL Injection Using IBM Rational AppScan Tool
    • Evading IDS, Firewalls and Honeypots
      • Detecting Intrusions using Snort
      • Logging Snort Alerts to Kiwi Syslog Server
      • Detecting Intruders and Worms using KFSensor Honeypot IDS
      • Auditing and Verifying Network Security Using Traffic IQ
    • Buffer Overflow
      • Buffer overflow example
    • Cryptography
      • Basic Data Encrypting Using HashCalc
      • Basic Data Encrypting Using MD5 Calculator
      • Basic Data Encrypting Using Advance Encryption Package
      • Basic Data Encrypting Using TrueCrypt
      • Basic Data Encrypting Using CrypTool
    • WiFi and Blutooth Hacking
      • Jailbreaking iPhone and iPads
      • Cracking WEP, WPA, WPA2 Passwords
      • Rogus Access Points
      • Intercepting Blutooth Comunications
      • Mobile Phone Trojans
    Pre-requisites
    • Basic Networking knowledge
    • Knowledge of Unix / Linux OS
    Requirements
    • Laptop with Windows XP Professional / Windows 7
    • x86 compatible 2Ghz CPU minimum or higher
    • Hard disk size about 30 GB
    • RAM size 2 GB (minimum) or higher
    • CD/DVD Drive
    • USB slot
    • Administrator Privileges to install/disable software
    • VMware Player/Virtualbox installed
    • Backtrack 5 Virtual Machine
  • Reverse Engineering & Exploitation details

    Who should attend: Advanced Hackers, Security Professionals

    Reverse Engineering is one of the most technical fields in computer science. It is intended for people that seek to understand how software work behind those fancy user interfaces with their text boxes and buttons. Reverse Engineering can be associated with malware analysis, compiled code reconstruction, software exploitation, software hardening and other fields of computing. The purpose of this course is to introduce the student to these fields with hands-on examples and interactive in-class discussions where the students are called to participate in the analysis and understanding of the targeted software. The students who will fully understand and acquire the transferred knowledge passed to them in this course, will be proven to be valuable security professionals in the software and security industry.

    ID SB2DREE
    Instructor George Nicolaou
    CPE Credits 14
    Duration 2 Days
    Date September 8th – 9th , 2011 (9 AM – 6 PM)
    Laptop Required
    Who should attend
    • Advanced Hackers
    • Security Professionals
    Overview

    Reverse Engineering is one of the most technical fields in computer science. It is intended for people that seek to understand how software work behind those fancy user interfaces with their text boxes and buttons. Reverse Engineering can be associated with malware analysis, compiled code reconstruction, software exploitation, software hardening and other fields of computing. The purpose of this course is to introduce the student to these fields with hands-on examples and interactive in-class discussions where the students are called to participate in the analysis and understanding of the targeted software. The students who will fully understand and acquire the transferred knowledge passed to them in this course, will be proven to be valuable security professionals in the software and security industry.

    Pre-requisites

    It is intended for people that seek to understand how software work behind those fancy user interfaces with their text boxes and buttons.

    Requirements
    • Any operating system
    • x86 compatible 2Ghz CPU minimum or higher
    • Hard disk size about 10 GB
    • RAM size 2 GB (minimum) or higher
    • CD/DVD Drive
    • USB slot and one USB Stick with 6GB+ of free space
    • Administrator Privileges to install/disable software
    • VMWare Player or VMWare Server
    • VMWare image will be provided at the workshop
  • Wireless Hacking Techniques details

    Who should attend: Security Professionals, Advanced Hackers, Network Administrators

    Participants will learn:

    • Basic to Advanced Wireless LAN security
    • Be able to audit wireless networks for security vulnerabilities
    • Demonstrate different Wi-Fi attacks as Proof of Concepts
    • Best practices in creating a secure wireless network
    ID SB2DWHT
    Instructor Vivek Ramachandran
    CPE Credits 14
    Duration 2 Days
    Date September 8th – 9th , 2011 (9 AM – 6 PM)
    Laptop Required
    Who should attend
    • Security Professionals
    • Advanced Hackers
    • Network Administrators
    Overview

    Participants will learn:

    • Basic to Advanced Wireless LAN security
    • Be able to audit wireless networks for security vulnerabilities
    • Demonstrate different Wi-Fi attacks as Proof of Concepts
    • Best practices in creating a secure wireless network

    A non-exhaustive list of topics include:

    1. Wireless LAN Basics
    2. 802.11 WLAN Packet Types and Headers
    3. WLAN Authentication and Encryption
    4. Wireless Lab Setup
    5. Analyzing Wireless Traffic with Wireshark
    6. Wireless Sniffing and War Driving
    7. Bypassing WLAN Authentication
      • Shared Key Authentication
      • Hidden SSID
      • Mac Address Filtering
    8. Breaking WLAN Encryption
      • WEP
      • WPA/WPA2 Personal
      • WPA/WPA2 Enterprise
      • Different Scenarios for Cracking
        • AP-less Cracking
        • Client-less Cracking
    9. Attacking the WLAN Infrastructure
      • Network discovery and enumeration
      • Misconfigured Access Points
      • Rogue Devices
      • Evil Twins
      • Denial of Service attacks
      • Replay Attacks
      • Man-in-the-middle attacks
    10. Attacking the Wireless Client
      • Mis-Association attacks
      • Denial of Service attacks
      • Ad-Hoc network attacks and Viral SSIDs
      • Honeypot attacks
      • Hotspot attacks
      • Caffe Latte attack
      • Fragmentation Attacks
      • Hirte attack
      • Viral SSIDs and Ad-Hoc network attacks
      • Wi-Fishing
      • Enumerating security settings
    11. Hacking Enterprise Security
      • 802.1x basics
      • Hacking 802.1x authentication
      • RADIUS, EAP, LEAP, PEAP attacks
      • Rogue Servers
    12. Advanced Wireless Attacks
      • Wi-Fi Malware . Windows 7, Vista, XP, OSX, Linux
      • Breaking into the client with Metasploit and SET
      • SSL MITM over Wireless
      • Evading Wireless IDS/IPS
    13. Scripting Wireless
      • Programming Wireless Injectors and Sniffers
      • Automating Wi-Fi attacks
      • Extending existing tools like Aircrack-NG for fun and profit
    14. Wireless Forensics
      • Analyzing Wi-Fi traffic
      • Attack analysis with Wireshark and other tools
      • Reconstructing attacks
    15. Wireless best practices
      • Access Points
      • Clients
      • Network Architecture
      • Wireless Intrusion Prevention systems
    16. Roadmap for further study

    What's included: The course includes the following:

    • Over 25 hands on lab sessions
    • 5 pure Wi-Fi CTF challenges during training
    • Full course content slides
    • Over 10 hours of HD quality video lectures with hands-on demonstrations
    Pre-requisites
    • This class is for anyone who wants to learn the art of hacking Wireless networks.
    • Wireless LAN basics
    • How to configure a Wireless Access Point and Client
    • Familiarity with Linux
    Requirements
    • Laptop with Windows XP Professional / Windows 7
    • x86 compatible 2Ghz CPU minimum or higher
    • Hard disk size about 30 GB
    • RAM size 2 GB (minimum) or higher
    • CD/DVD Drive
    • USB slot and one USB Stick
    • Administrator Privileges to install/disable software
    • WiFi Enabled
    • DLINK DWA-125 Wi-Fi Card
    • Backtrack 5 Virtualbox VM
    • Required tools will be distributed during the session
  • Web War IV (September 6th)

    This is event is FREE for everyone

    This year’s Web CTF at the SecurityByte Conference 2011 is being powered by NII Consulting.

    Game Format

    The contest will be open to the public.Participants have to attack a series of web applications and solve security based puzzles along the way. For each stage cleared, flags are awarded to the participants. The challenger with the most number of flags at the end of the game duration wins the contest.To keep an element of uncertainty the levels will be assigned randomly. Difficulty of levels will not necessarily be gradual.

    Rules

    The contest does not give permission to participants or anyone else to target the infrastructure hosting the challenges.

    • The challenge is to be played purely on the web application level.
    • Automated tools likes crawlers/brute-forces/fuzzers/scanners are not permitted to discover flaws in the application.
    • Participants cannot attack other contest challengers or tamper with the systems in a manner which prevents other participants from playing the CTF.
    • Anyone found flouting the above rules will be immediately disqualified.
    • Teams of maximum two members will be allowed. However, if you win you'll have to share the prize :)
    • Registration for the CTF will open online prior to the conference. You have to be present at the conference to play.
    • Participants are required to carry their own laptops and tools/scripts etc. Requests for computers will not be entertained.
    • If you are able to social engineer the contest developers, it would be considered l33t.
    Prize

    The winner will receive an Apple iPod and a free training with the Institute of Information Security, a NII initiative.

    Registration for this event is now open:

    Register for WWIV CTF

  • Wireless CTF (September 7th)

    This is event is FREE for everyone

    The Wi-Fi CTF would test your skills as a Wi-Fi Ninja. The skills you will need will range from understanding how WLAN networks work, to how to crack WEP and WPA, decrypting encrypted Wireless packets, attacking WLAN infrastructures and last but probably the most important - thinking outside of the box.

    Objective

    We will be setting up multiple access points and clients in the conference area, your task would be to break into them using various tools and techniques. In some you could use the raw power of an exploit, in others it may have to social engineering. Be prepared for a battle which will be waged over the air during SecurityByte 2011!

    Eligibility Criteria of Participants

    Interested Participants should go through the WLAN Security Megaprimer course that Vivek has released online: http://www.securitytube.net/downloads

    Ammunition

    In order to participate, you will need a laptop running BT5 and a wireless card capable of Wi-Fi Sniffing / Injection.

    Rules

    Go by your instinct!

    Length of the CTF

    One Day - September 6 2011

    Winning Criteria

    There are 4 challenges; the first to finish all or > 2 wins the challenge. The challengers will have the entire day to battle.

    About Vivek Ramachandran

    Vivek is a world renowned security researcher and evangelist. His expertise includes computer and network security, exploit research, wireless security, computer forensics, embedded systems security, compliance and e-Governance. He is the author of the books – "Wireless Penetration Testing using Backtrack" and "The Metasploit Megaprimer", both up for worldwide release in 2011. Read more

  • India Technology Leadership Summit 2011

    BE Social or BE Secure

    A discussion around social networking and the security implications of it India Technology Leadership Summit attracts the best and brightest IT executives because the Securitybyte brand is synonymous with the highest quality and integrity. Since 2009, Securitybyte’s India Technology Leadership Summit has evolved into an authoritative platform for technology leaders.

  • Security Product Producers

    CEO India
    McAfee Inc.
    Global CISO
    RSA, an EMC Company
    Evangelist
    ArcSight, an HP Company
  • Consumers

    Director Global Cyber Security
    Department of Homeland Security
    Mr. Alok Vijayant
    Director
    NTRO
    IAAS
    Principal Account General Karnataka (A&E)
    Mr. AR Vijay Kumar
    CISO
    Genpact
    Deputy Director,
    Office of the Secretary Defence (R&D)
  • Producers

    Mr. Shouvick Mukherjee
    CEO India
    Yahoo!