-
08:00 - 09:00
Registration
-
09:00 - 09:05
Attila Marosi-Bauer - Opening ceremony
-
09:05 - 09:45
Sebastian Garcia & Veronica Valeros - Spy vs. Spy: A modern study of mic bugs operation and detection
In 2015, artist Ai Weiwei was bugged in his home, presumably by government actors. This situation raised our awareness on the lack of research in our community about operating and detecting spying microphones. Our biggest concern was that most of the knowledge came from fictional movies. Therefore, we performed a deep study on the state-of-the-art of microphone bugs, their characteristics, features and pitfalls. It included real life experiments trying to bug ourselves and trying to detect the hidden mics. Given the lack of open detection tools, we developed a free software SDR-based program, called Salamandra, to detect and locate hidden microphones in a room. After more than 120 experiments we concluded that placing mics correctly and listening is not an easy task, but it has a huge payoff when it works. Also, most mics can be detected easily with the correct tools (with some exceptions on GSM mics). In our experiments the average time to locate the mics in a room was 15 minutes. Locating mics is the novel feature of Salamandra, which is released to the public with this work. We hope that our study raises awareness on the possibility of being bugged by a powerful actor and the countermeasure tools available for our protection.
-
09:50 - 10:30
Dávid Szili - The Metric System
In this presentation, we will see why security metrics are important and how they relate to risk management, if there are "good" and "bad" metrics and how we can visualize them. We will take an overview of the current state and resources available to security metrics. Finally, we will also attempt to find the most vital security metrics that can indicate the effectiveness of the overall security program of an organization.
-
10:30 - 10:50
Coffee break (20 mins)
-
10:50 - 11:30
Zoltán L. Németh - How to exploit the DNSmasq vulnerabilities
When a vulnerability is found, it is always an interesting question whether and how can it be exploited. In this talk we take the Dnsmasq
<2.78 vulnerabilities [1] as examples, and show how some of the proof of concept codes published by Google [1] can be extended to real exploits which give the attacker reverse shell connections. During the course we also see how the main memory protection mechanisms like No-Execute bit (NX), Address Space Layout Randomization (ASLR) and Stack Canaries work.
Furthermore, we discuss and (with the exception of the Stack Canaries) demonstrate how to bypass these protections in a 64-bit Linux environment.
-
11:35 - 12:15
Julien Thomas - In-App virtualization to bypass Android security mechanisms of unrooted devices
In-App virtualization is becoming a popular subject on mobile platform. This unique feature of Android and alike allows developers to build hundred of virtualization capable apps, with millions of users, to allegedly enhance privacy or offer muli-spaces. When considering future of malwares, it is generally admitted that In-app virtualization may weaken security of (1) the host app and (2) the virtualized apps among themselves. Recent studies also show that host app with malicious intent are a danger to virtualized apps.
However, we believe that the danger of this technique is far greater for the whole android ecosystem as a non-maliciously payloaded (no requested permissions, no keylogging hooks, for instance) host and an even non-root device can attempt to deceive any app installed on the device. We will show in this talk how trivial it is to build a malware platform that rely on few if no permission yet is capable of launching advanced, targeted and undetected attacks. Such attacks include stealing of user personal data, stealing of user on-line identity, eavesdropping of network connection, even if SSL secured, and live in-memory patching of the ART structures to redirect or proxify core Android methods.
-
12:20 - 13:00
Jose Pino & Jhonathan Espinosa - Trape: the evolution of phishing attacks
Trape is a recognition tool that allows you to track people and make phishing attacks in real time, the information you can get is very detailed. Objective is to teach the world through this, how the big Internet companies could monitoring you, getting information beyond your IP, such as the sessions of your sites or Internet services.