Hackers vs Security Consultants What is G-Con? In the changing environment of Internet security, you must have complete control over your security and your network, especially in the face of massively escalating vulnerability report rates and actual network intrusions. You need to know your enemy, their motives, their techniques and their abilities, that is why Kelsi Siler has generated the first congress of high level intrusions in Mexico … G-Con. Everything from "Capture The Flag" games to live demonstrations of advanced penetration techniques will be included in this congress of security professionals. This has never before been done in Mexico - a gathering of both the hacker and Infosec mindsets for you to learn from. Objectives: Generate a complete view for security within the mexican market due to recent integration of networks on global level. Breaking the myths anf generalization about security and hackers, to know who knows security and who doesn’t. Date and Place: December 2nd and 3th 2002 at ITESM Campus Estado de Mexico. Entrance: 3,000 Pesos. (300 dlls) Speakers: Speaker: Anakata Conferences: Complex explotation scenarios, including memcpy() techniques, also various shellcodes. About the Speaker: http://www.anakata.hack.se Latest Conferences: | None | Description: Speaker: Dave Aitel Conference: Advanced Windows Overflows About the Speaker: http://www.immunitysec.com Dave Aitel is a founder and security consultant at Immunity, Inc, based in NYC. His public contributions to the security community include SPIKE, the application assessment suite, and vulnerabilities in major systems such as Windows NT's RPC stack, and Microsoft Exchange and Microsoft SQL Server 2000. Latest Conferences: BLACKHAT USA 2002 An Introduction to SPIKE, the Fuzzer Creation Kit Dave Aitel, Immunity, Inc [ Their Presentation ] [ Application Security ] SPIKE (spike.sourceforge.net) is a tool created in order to better analyze new or complex network protocols. Publicly, SPIKE is best known for locating 2 of the recent IIS vulnerabilies; privately, it has located many more. Although SPIKE is a fuzzer, and there are many fuzzers, SPIKE has some unique theoretical underpinnings. These, and the SPIKE API itself, will be presented, along with some interesting demos. Description: Like Unix, Microsoft Windows exploitation techniques are advancing at a dizzing pace. From portable shellcode, passing difficult filters, or just finding vulnerabilities buried under layers of DCOM, the security community is starting to get a grip on how to best penetrate Win32 machines. This talk will focus on some of the recent developments, with demonstrations and low-level examinations of the techniques used by advanced Win32 exploitation. No previous knowledge of Windows is necessary to understand this talk, although you should be familiar with basic overflow and x86 architecture. Speaker: Gerardo Richarte Conferences:Advanced PTrace explotation Automated Pen-testing. About the Speaker: Gerardo Richarte - Director, CORE SECURITY TECHNOLOGIES Gerardo Richarte is a Co-Founder and Director of Core. Before founding Core-SDI in 1996, he was a team member of the Special Projects Group at Dirección General Impositiva (AFIP / DGI), the Argentine tax agency. He was also an independent consultant for several Argentinian companies and government agencies, as well as group member of the Frenetik Research R&D Group, a non-profit organization in Argentina. Mr. Richarte studied computer science and mathematics at the University of Buenos Aires (UBA), Argentina. Latest Conferences: Paper: Bypassing the StackShield and StackGuard protection Paper: Advances in format string exploitation Conference: Cansecwest / vancouver / canada Descriptions: Live demostration of Core Impact, Demostration and Live Explotation of Ptrace. Speaker: Mattias Bääth Conference: Advanced PKI implementation on the comercial and militar level. About the Speaker: | none | Latest Conferences: | none | Description: | none | Speaker: Mark Hardy Conference: Advanced Crypto techniques for total control and security. About the Speaker: http://www.g-con.org/expo/hardy.pdf Latest Conferences: http://www.g-con.org/expo/hardy.pdf Description: http://www.g-con.org/expo/hardy.pdf Speaker: Luis Guillermo Castañeda Estañol Conference: Advanced PE esteganographic infection [Proof Concept Parasites/Infection] About the Speaker: Latest Conferences: Paper: Advenced Polimorphic & Steganographic PE/ELF Memory Infection Paper: The Disinfection Technique Paper: Inyecting Code in the PE Infraestructure Paper: Fraccionary Windows Kernel Hacking Conference: Steganographic analisis "the rupture of the *crypt*" & Steganographic Memory Usurpation. ITESM CEM/DEGREE Conference: A day into the virii programmers Life. ITESM CEM/Degree. Conference: The Steganalisis Exposed. Description: Memory Usurpation bypassing Permises Arbitrary under Windows 2000/NT/XP, Steganographicall Box Making, Parasitary Infection, Deploy of the steganographic Machine by security common Failures under windows kernel. Speaker: Enrique Sanchez Conferences: Advanced polimorfic virus with steganographic parser on UNIX Beating the forensics analizis (Stego tool) Taking over a corporative network in less than 50 lines of C code About the Speaker: Kaspersky Lab Chief Technicall Officer. Latest Conferences: Conference: The Steganalisis Exposed. Conference: DEF CON Nine Speakers "Didse: Distributed Intrusion Detection System Evation" Description: | none | Speaker: GOBBLES Conference: Wolves among us, CISSP and their weakness About the Speaker: Security Research and Development non-profit Group. Latest Conferences: Defcon X Wolves among us Summercon 2002 Description: | none | Speaker: Tiago assumpcao Conference: Steganography in kernel and process within linux (A real demostration) NOD32 Research Advanced Speech About the Speaker: | none | Latest Conferences: | none | Description: | none | Speaker: Eduardo Ruiz Duarte Conference: WarDriving in Mexico City About the Speaker: Kaspersky Lab Main Development Staff Latest Conferences: Linux Steganographical File Systems Description: | none |
This archive was generated by hypermail 2b30 : Sat Nov 23 2002 - 11:27:49 PST