Search This Blog

Monday, February 16, 2009

firewall-wizards Digest, Vol 34, Issue 2

Send firewall-wizards mailing list submissions to
firewall-wizards@listserv.icsalabs.com

To subscribe or unsubscribe via the World Wide Web, visit
https://listserv.icsalabs.com/mailman/listinfo/firewall-wizards
or, via email, send a message with subject or body 'help' to
firewall-wizards-request@listserv.icsalabs.com

You can reach the person managing the list at
firewall-wizards-owner@listserv.icsalabs.com

When replying, please edit your Subject line so it is more specific
than "Re: Contents of firewall-wizards digest..."


Today's Topics:

1. Re: Announcing pcapr (Darren Reed)
2. CanSecWest 2009 Speakers and Dojo courses (Mar 14-20)
(Dragos Ruiu)


----------------------------------------------------------------------

Message: 1
Date: Mon, 09 Feb 2009 22:14:58 -0800
From: Darren Reed <darrenr@reed.wattle.id.au>
Subject: Re: [fw-wiz] Announcing pcapr
To: Firewall Wizards Security Mailing List
<firewall-wizards@listserv.cybertrust.com>
Message-ID: <49911B62.9080103@reed.wattle.id.au>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

kowsik wrote:
| It's something like web 2.0 meets packets. Has a whole lot of stupid
| packet tricks (tm), not to mention you can convert any packet into a
| DoS generator.
|
| In short, pcapr does to packets what flickr does to pictures.
| Automatic protocol tagging, full-text search on packet summaries (try
| searching for "gssapi" or "180 ringing"),
| decodes/stream-reassembly/ip-rewrites/fragmentation in your browser,
| etc.
|
| You can check it out at http://www.pcapr.net.

Please write back when your web site does not require
users to register in order to simply view your data/examples.

Darren

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkmRG2IACgkQP7JIXtvLbFUdaQCgsgo40FYnbGGKPe3H+Msiszns
JMQAniskx3gtvygcTheX+H354ysaNkEF
=GVtZ
-----END PGP SIGNATURE-----

------------------------------

Message: 2
Date: Sun, 15 Feb 2009 21:51:54 -0800
From: Dragos Ruiu <dr@kyx.net>
Subject: [fw-wiz] CanSecWest 2009 Speakers and Dojo courses (Mar
14-20)
To: firewall-wizards@honor.icsalabs.com
Message-ID: <200902152151.54643.dr@kyx.net>
Content-Type: text/plain; charset="iso-8859-1"

Final Speaker Lineup for CanSecWest 2009 (March 18-20):
===============================================

The Smart-Phones Nightmare - Sergio 'shadown' Alvarez

Getting into the SMRAM: SMM Reloaded - Lo?c Duflot

Network design for effective HTTP traffic filtering - Jeff "rfp" ?
Forristal, Zscaler

Ninja Scanning - Fyodor, Insecure.org

On Approaches and Tools for Automated Vulnerability Analysis - Tanmay ?
Ganacharya & Nikola Livic & Abhishek Singh & Swapnil Bhalode & Scott ?
Lambert, Microsoft

Kicking It Old School: No DNS Packets Were Harmed In The Making Of ?
This Presentation - Dan Kaminski, IOActive

Binary Clone Wars: Software Whitelisting for Malware Prevention and ?
Coordinated Incident Response. - Shane Macaulay, Sean Comeau, and ?
Derek Callaway, Security Objectives

.NET Rootkits - Erez Metula

The Evolution of Microsoft's Exploit Mitigations - Matt Miller and Tim ?
Burrell, Microsoft

An overview of the state of videogame console security. - Victor Mu?oz

A Look at a Modern Mobile Security Model: Google's Android - Jon ?
Oberheide

Bug classes we have found in *BSD, OS X and Solaris kernels - Christer ?
Oberg and Neil Kettle, Convergent Network Solutions

Multiplatform Iphone/Android Shellcode, and other smart phone ?
insecurities - Alfredo Ortega and Nico Economou, Core

Platform-independent static binary code analysis using a meta-assembly ?
language - Sebastian Porst & Thomas "halvar" Dullien, zynamics

Persistent BIOS Infection - Anibal Sacco & Alfredo Ortega, Core

Decompiling Dalvik and other JavaFX - Marc Schoenefeld

Automated Real-time and Post Mortem Security Crash Analysis and ?
Categorization - Jason Shirk & Dave Weinstein, Microsoft

SSL, The Sequel: MD5 collisions and EV certificates - Alexander ?
Sotirov & Mike Zusman

Exploiting Unicode-enabled software - Chris Weber

Chinese Infosec & Malware Overview - Wei "icbm" Zhao, 365menshen

Hacking Macs for Fun and Profit - Dino Dai Zovi & Charlie Miller

...and a variety of lightning talks...


Security Masters Dojo courses (March 14-17):
====================================

Metasploit: Asymmetric Warfare - H D Moore, BreakingPoint Systems

Advanced Honeypots - Thorsten Holz

IPv6 Network Security - Nico Fishbach & Guillaume Valadon, COLT & CNRS

Ultimate Web Hacking (One Day Edition) - Mike Andrews, Foundstone

TCP/IP Network Security In Depth - Andrea Barisani, inverse path

Effective Fuzzing using the Peach Fuzzing Platform - Michael ?
Eddington, Leviathan Security

Secure Java Programming and Auditing - Marc Schoenefeld

Practical 802.11 WiFi (In)Security - C?dric Blancher, EADS

Q/SSE Qualified/ Software Security Expert Certification Bootcamp - ?
Security University

Q/SA Qualified Security Analyst Penetration Tester - Security University

Advanced Linux Hardening - Andrea Barisani & Jay Beale, inverse path & ?
Intelguardians

Physical Security and Lock Technology - Deviant Ollam

The Exploit Laboratory - Advanced Edition - Saumil Shah, Net-Square

Mastering the Network with Scapy - Phillipe Biondi, EADS


Pwn2Own Contests:
================

There will be TWO Pwn2Own contests this year.
Generous cash prize(s) for exploits will be sponsored by Tipping Point,
and ?a Sony VAIO P fresh from Japan and a new loaded Apple Macbook
will be amongst the prizes.

The targets this year will be mobile smart-phones, and browsers.

Mobile targets:
????????iPhone
????????Android
????????Symbian
????????RIM/BlackBerry
????????Windows Mobile

Browser Targets:
????????IE8
????????FF3
????????Safari
????????Opera

The contest will like in previous years feature a progressively ?
expanding attack surface over the three day duration of the
conference. Final prizes and rules will be announced shortly.

Post-Conference Whistler Expedition:
=============================

We have secured some rooms at good rates at the Westin in Whistler
and reserved a cluster of four, 3-5 bedroom, cabins for the weekend
after the conference. Contact dr@kyx.net if you wish to be included
in the planning, final accommodation rates will be announced shortly.

Conference Hotel Block:
===================

The room rates at the Sheraton Wall Center hotel where the conference
is being held have been reduced from $183 to $169, and still includes
a waived $15/day free internet access in the rate.


Tenth Anniversary Gala Event:
========================

Since this is our tenth anniversary for the conference, we will
be having a party on Thursday night. Venue TBD. We're pretty
sure there will be a cake. No word yet on whether there will
be dancers inside it. ;-)


Day-Care Facilities will be available:
=============================

As a nod to the shifting demographic of early gen. security
researchers we will be trying a new experiment this year
and we will be providing day-care facilities for those
traveling with kids. We will try to arrange some group
discounts with our provider once we know how many
kids and what ages and times will have to be
accommodated. If you are interested in this service
please send a note to yuriko@secwest.com and let
her know ages and times.

We will try to get them started on exploit writing
courses for pre-schoolers :-). Does this mean
we are all grown up now?


It promises to be another fun conference again this
year. See you all there.

cheers,
--dr

--
World Security Pros. Cutting Edge Training, Tools, and Techniques
Vancouver, Canada ?March 16-20 2009 ?http://cansecwest.com
pgpkey http://dragos.com/ kyxpgp


------------------------------

_______________________________________________
firewall-wizards mailing list
firewall-wizards@listserv.icsalabs.com
https://listserv.icsalabs.com/mailman/listinfo/firewall-wizards


End of firewall-wizards Digest, Vol 34, Issue 2
***********************************************

No comments: