G-Con Announcement

From: Enrique A. Sanchez Montellano (esanchezat_private)
Date: Fri Nov 22 2002 - 08:03:10 PST

  • Next message: J Edgar Hoover: ""download" caps"

    Hackers vs Security Consultants
    
    What is G-Con?
    
    In the changing environment of Internet security, you must have complete
    control over your
    security and your network, especially in the face of massively escalating
    vulnerability report
    rates and actual network intrusions.
    You need to know your enemy, their motives, their techniques and their
    abilities, that is why Kelsi
    Siler has generated the first congress of high level intrusions in Mexico …
    G-Con.
    Everything from "Capture The Flag" games to live demonstrations of advanced
    penetration
    techniques will be included in this congress of security professionals. This
    has never before
    been done in Mexico - a gathering of both the hacker and Infosec mindsets
    for you to learn from.
    
    Objectives:
                Generate a complete view for security within the mexican market
    due to recent integration of
    networks on global level.
    Breaking the myths anf generalization about security and hackers, to know
    who knows security and who doesn’t.
    
    Date and Place:
                  December 2nd and 3th 2002 at ITESM Campus Estado de Mexico.
    Entrance: 3,000 Pesos. (300 dlls)
    
    
    Speakers:
    
    Speaker: Anakata
    Conferences: Complex explotation scenarios, including memcpy() techniques,
    also various shellcodes.
    About the Speaker: http://www.anakata.hack.se
    Latest Conferences: | None |
    Description:
    
    Speaker: Dave Aitel
    Conference: Advanced Windows Overflows
    About the Speaker: http://www.immunitysec.com
    Dave Aitel is a founder and security consultant at Immunity, Inc,
    based in NYC. His public contributions to the security community include
    SPIKE, the application assessment suite, and vulnerabilities in major
    systems such as Windows NT's RPC stack, and Microsoft Exchange and
    Microsoft SQL Server 2000.
    
    Latest Conferences:
    
    BLACKHAT USA 2002
    An Introduction to SPIKE, the Fuzzer Creation Kit
    Dave Aitel, Immunity, Inc
    [ Their Presentation ] [ Application Security ]
    SPIKE (spike.sourceforge.net) is a tool created in order to better
    analyze new or complex network protocols. Publicly, SPIKE is best
    known for locating 2 of the recent IIS vulnerabilies; privately, it has
    located many more.
    Although SPIKE is a fuzzer, and there are many fuzzers, SPIKE
    has some unique theoretical underpinnings. These, and the SPIKE API itself,
    will be presented, along with some interesting demos.
    
    Description:
    Like Unix, Microsoft Windows exploitation techniques are advancing at a
    dizzing pace. From portable shellcode, passing difficult filters, or
    just finding vulnerabilities buried under layers of DCOM, the security
    community is starting to get a grip on how to best penetrate Win32
    machines. This talk will focus on some of the recent developments, with
    demonstrations and low-level examinations of the techniques used by
    advanced Win32 exploitation.
    No previous knowledge of Windows is necessary to understand this talk,
    although you should be familiar with basic overflow and x86
    architecture.
    
    
    Speaker: Gerardo Richarte
    Conferences:Advanced PTrace explotation
                         Automated Pen-testing.
    About the Speaker:
    Gerardo Richarte - Director, CORE SECURITY TECHNOLOGIES
    Gerardo Richarte is a Co-Founder and Director of Core. Before founding
    Core-SDI in 1996,
    he was a team member of the Special Projects Group at Dirección General
    Impositiva (AFIP / DGI),
    the Argentine tax agency. He was also an independent consultant for several
    Argentinian companies
    and government agencies, as well as group member of the Frenetik Research
    R&D Group, a
    non-profit organization in Argentina.
    Mr. Richarte studied computer science and mathematics at the University of
    Buenos Aires (UBA), Argentina.
    Latest Conferences:
    Paper: Bypassing the StackShield and StackGuard protection
    Paper: Advances in format string exploitation
    Conference: Cansecwest / vancouver / canada
    Descriptions: Live demostration of Core Impact, Demostration and Live
    Explotation of Ptrace.
    
    
    Speaker: Mattias Bääth
    Conference: Advanced PKI implementation on the comercial and militar level.
    About the Speaker: | none |
    Latest Conferences: | none |
    Description: | none |
    
    
    Speaker: Mark Hardy
    Conference: Advanced Crypto techniques for total control and security.
    About the Speaker: http://www.g-con.org/expo/hardy.pdf
    Latest Conferences: http://www.g-con.org/expo/hardy.pdf
    Description: http://www.g-con.org/expo/hardy.pdf
    
    
    Speaker: Luis Guillermo Castañeda Estañol
    Conference: Advanced PE esteganographic infection [Proof Concept
    Parasites/Infection]
    About the Speaker:
    Latest Conferences:
    Paper: Advenced Polimorphic & Steganographic PE/ELF Memory Infection
    Paper: The Disinfection Technique
    Paper: Inyecting Code in the PE Infraestructure
    Paper: Fraccionary Windows Kernel Hacking
    Conference: Steganographic analisis "the rupture of the *crypt*" &
    Steganographic Memory
                        Usurpation. ITESM CEM/DEGREE
    Conference: A day into the virii programmers Life. ITESM CEM/Degree.
    Conference: The Steganalisis Exposed.
    Description: Memory Usurpation bypassing Permises Arbitrary under Windows
    2000/NT/XP,
    Steganographicall Box Making, Parasitary Infection, Deploy of the
    steganographic Machine
    by security common Failures under windows kernel.
    
    
    Speaker: Enrique Sanchez
    Conferences:   Advanced polimorfic virus with steganographic parser on UNIX
                            Beating the forensics analizis (Stego tool)
                            Taking over a corporative network in less than 50
    lines of C code
    About the Speaker: Kaspersky Lab Chief Technicall Officer.
    Latest Conferences:
    Conference: The Steganalisis Exposed.
    Conference: DEF CON Nine Speakers "Didse: Distributed Intrusion Detection
    System Evation"
    
    Description: | none |
    
    
    Speaker: GOBBLES
    Conference: Wolves among us, CISSP and their weakness
    About the Speaker: Security Research and Development non-profit Group.
    Latest Conferences:
    Defcon X Wolves among us
    Summercon 2002
    Description: | none |
    Speaker: Tiago assumpcao
    Conference: Steganography in kernel and process within linux (A real
    demostration)
                        NOD32 Research Advanced Speech
    About the Speaker: | none |
    Latest Conferences: | none |
    Description: | none |
    
    Speaker: Eduardo Ruiz Duarte
    Conference: WarDriving in Mexico City
    About the Speaker: Kaspersky Lab Main Development Staff
    Latest Conferences: Linux Steganographical File Systems
    Description: | none |
    



    This archive was generated by hypermail 2b30 : Sat Nov 23 2002 - 11:27:49 PST