You can also subscribe to the DEFCON RSS Feed for up to the minute news.
As pentesters and hackers we often find the need to create our exploits on the fly. But one challenge took us to a new limit and a new level. From Bug to 0Day will show the audience the process of fuzzing, locating the bug, using egghunters then figuring out to build a pure alphanumeric shellcode to exploit it.
Mati has been training security and hacking courses for over 10 years and is actively involved in the security arena.
Top of page An autoimmune disorder is a condition that occurs when the immune system mistakenly attacks and destroys healthy body tissue.
We will discuss practical brute force attacks using FPGAs and how to use software-radio to read RFID cards.
Mati is a network security professional, currently working with various Military and Government agencies as well as private sector businesses.
We will release several open source tools we wrote in the process of researching these attacks.
With live demos, we will demonstrate how we broke these systems.
He has discovered "Caffe Latte" attack which was presented in Toor Con9, which is about retrieving WEP key from an isolated client in the absence of its authorized access point.
Top of page This presentation describes how attackers could take advantage of SQL Injection vulnerabilities using time-based blind SQL injection.