Top of page In this talk we go over weaknesses in common subway fare collection systems.
We focus on the Boston T subway, and show how we reverse engineered the data on magstripe card, we present several attacks to completely break the Charlie Card, a MIFARE Classic smartcard used in many subways around the world, and we discuss physical security problems.
He is a very famous speaker in Spanish conferences about IT Infrastructures, Microsoft Technologies and Security.
He has been working in the Microsoft Technet Program from 2005 delivering conferences, webcasts and technical information.
Although 802.11w promises immunity from Do S attacks, we show that autoimmunity disorder leaves a door open through which Do S attacks can still be launched.
One example of Do S attack against MFP(11w) will be demonstrated.
You can also subscribe to the DEFCON RSS Feed for up to the minute news.
As pentesters and hackers we often find the need to create our exploits on the fly. But one challenge took us to a new limit and a new level. From Bug to 0Day will show the audience the process of fuzzing, locating the bug, using egghunters then figuring out to build a pure alphanumeric shellcode to exploit it.
Top of page This presentation describes how attackers could take advantage of SQL Injection vulnerabilities using time-based blind SQL injection.He writes monthly in several Spanish Technical Magazines as "Windows TI Magazine", "PC Actual" or "Hackin9". Recently spoke at BH Europe 2008 about LDAP Injection & Blind LDAP Injection attacks.He is currently working on his Ph D thesis under the direction of Dr. More info: Insider_2006-08 José Parada is an IT Pro Evangelist in Microsoft. The DEFCON 16 speaking schedule is complete, with occasional minor adjustments.!So keep your eye on the Speaker Page and the Schedule Page for all the latest info as it happens.