The most interesting hacking reports on Defcon 14

    The fourteenth Defcon 14 conference was held in Las Vegas on August 3-6 .

    “Show for geeks” this year brought together a record seven thousand spectators who came here from all over America and even from abroad. In the sea of ​​fun, probably held together by good alcohol, the official part of the conference passed almost imperceptibly , where the best hackers talked about their unique developments.

    We already mentioned the famous cryptographer Phil Zimmermann, the developer of PGP technology. He presented at the conference his new Zfone program for cryptographic protection of VoIP traffic.

    Among other interesting reports, one can highlight the presentation of developers from Ephemeral Security. They demonstrated an original way to create exploits. The exploit is written directly on the victim’s computer using the Mosquito virtual machine that was previously implemented there . A virtual machine is installed at both ends of the connection and provides the hacker with a reliable communication channel with cryptographic protection.

    Security Specialist from Secure Science Corporation, along with their hacking colleagues, showcased new encrypted messaging technologythrough the Internet. As an open channel of communication, they used a social network of Internet users who transmitted the message further. Such methods of message transmission allow you to effectively hide the message in the information noise, so that special services cannot detect it using the most advanced analytical programs.

    Hackers, as well as experts from the FBI and the CIA invited to the conference, discussed various topics in detail, including special network programs and technologies for the Mac OS X operating system (Mac OS X Server Managed Clients, Nagios, Radmind, Apple Remote Desktop, HenWen, Tripwire , Open Directory Password, ipfw and dummynet, Centrify DirectControl, Dave, AdmitMac), which hackers can use on Apple networks; rootkits for hacking Oracle 10g Express Edition; visual analysis of logs using AfterGlow ; use by FBI agents of neuro-linguistic programming techniques during conversations with hackers.

    Also popular now: