PhreakNIC 0x0b Schedule (Mostly confirmed)
Friday, October 19, 2007
-
- 10:00
- Lobby
- Registration (Until 10 PM)
-
-
-
-
-
-
-
-
-
-
- 21:00
- Cumberland
- Decius - Drunken Rant (Video)
Saturday, October 20, 2007
-
- 09:00
- Lobby
- Registration (Until 6 PM)
-
-
- 11:00
- Cumberland
- - Corydon - How To Start Your Own Charity (Video)
-
-
-
-
-
-
-
-
- 21:00
- Cumberland
- Presentation of Awards for Wifi Race and Scavenger Hunt (Video)
-
- 21:30
- Cumberland
- Neoteric and Abaddon - Why You Suck (Video)
Kickoff What the heck is this stuff in the schwag this year?
Why are we worried about aliens this year? Didn't the prophet predict that
next year is when we'll be foooooood? Learn the answer to all of these
things at the kickoff to PN0x0b, where all of the P's and x's are silent.
RFID 2.0 - Kn1ghtl0rd and lowtek mystik
Last year's presentation was high level
functionality and basic knowledge of what RFID is. The year they will present
the low level technical specs on different communication types, the physics
behind RFID reading and transmitting, and the actual circuitry of an RFID
tag and what it takes to make them operate more consistently. The presentation
will also cover actual tag data and coding schemes with standardization
including EPC Gen 2 and other ISO standards such as PayPass RFID enabled
credit cards. There will be reader/writer demonstrations as well as other
proof of concept demonstrations.
ReactOS -
Qui Gon Gene and
PJ
This talk gives a brief overview and many kinks and quirks in the F/OSS
implementation of the Microsoft Windows OS that is ReactOS. Join Qui Gon Gene
and newcomer PJ in the fun as they discover what ReactOS is, what it can and
cannot do, and why, despite being an extremely noble project, it isn't quite
ready for primetime. Skill levels from n00b all the way to network and OS
gods are welcome to attend.
Postal Experiments - CypherGhost
A review of the USPS
entrails explained with strange things sent through the mail. What is the
heaviest thing that you can send in a flat rate box? What happens if you
mail a sphere? How do digital postage meters work? How modern automation
allows you to send a letter 3000 miles for only 41 cents and what security
vulnerabilities might exist in that infrastructure. How to postmark your
own mail, how the new "PLANET" barcode will track all mail in the future.
100% legal, but sure to make the mailman wonder. Postal inspectors welcome.
Analyzing Intrusions and Intruders -
Sean Bodmer
Intrustion analysis has been primarily reserved for network junkies and bit
biters. However, due to the advances in network systems automation we now
have time to pay more attention to the subtle observations left by attackers
at the scene of the incident. Century old sciences have enabled criminal
investigators the ability to attribute attacks to specific individuals or
groups. Intrusion Analysis and Criminal Sciences can be combined to learn
more about the cyber threats slipping into your systems. You will walk away
from this talk with a better understanding of how to approach and intrusion
and analyze more than just the minutia. I will attempt to convey processes
and procedures that you can implement in your Security Program that supports
a deeper approach to Intrusion Analysis and Attacker Characterization.
Designing and Responding to Targeted Network Attacks
against the Enterprise - Presmike
and Cygnus
Corporate and federal networks are under attack by increasingly
sophisticated attackers employing information warfare tactics. Gone are the
days of simple port scans or IIS worms. The target is no longer the network
but its users and information. The goal has changed from destruction to
passive control. These targeted attacks and their methods will become
commonplace in the next five years. Currently, and for the near future, only
advanced, threat aware, incident response teams are capable of prevention,
discovery, and recovery from such attacks. We will discuss the application
of information warfare techniques as they relate to attack design, defense
and recovery.
The Magical Hacker Journey -
Rick Dakan
Rick Dakan, the author of Geek Mafia and the forthcoming Geek Mafia: Mile
Zero, will be discussing the creative process involved in writing books for
and about the hacker community. This will be an interactive session, where
audience members will be allowed to voice their comments and suggestions for
future projects.
Why AJAX Makes the Baby Jesus Cry -
Billy
Hoffman
Billy has a tendency to break things. Not that this is a bad thing, but
often times what he breaks are things that people have come to rely upon,
like web applications, payment systems, and gravity. Find out whether or
not Billy will one day have to tell his kids, "Daddy drinks because AJAX
is so bad."
The Down and Dirty on the Security Industry -
Bruce Potter
This presentation will poked everyone in the room squarely in the eyes.
The goal of this talk is to call out all the 800 lb. gorillas in the
security industry - the real issues that hound us everyday but are
uncomfortable to talk about. Training, profiteering, cheating and even using
Microsoft products will all be fair game. It should be noted that this talk
has the same title as the talk that I presented at Defcon, but since this is
PhreakNIC, I won't pull any punches. This will be a new talk with new
information, because frankly, I can never rant about the same thing twice.
Stupid WiFi Tricks - Catonic
Wireless networks have been around for a few years, however the ways to
extend, use and abuse them haven't changed too much. While not a completely
new look at things, this presentation will touch on some previously
undiscovered territory which should be of interest to any wireless
security researcher, as well as discuss a few ideas on unusual uses of
antennas and dishes, oddball antennas and just general wi-phun.
Introduction to Vulnerability Analysis - RedPantz
This presentation will cover the basics of vulnerability analysis. It will
cover topics ranging from reading a public advisory, to analyzing binaries,
and finally identifying the location of the problem. An overview of various
tools used and how to use them in tracking down a bug will also be given.
An Introduction to Hardware Hacking - Obi Won Shinobi
People spend money every day on cool new gadgets. Sometimes these new
toys take the place of things they already have. Sometimes that device has
the same features as something you already have, but you simply didn't know
it. Best of all, even new toys sometimes have hidden functions that we
didn't even know about. People throw out what they consider worthless
technology every day, or let it sit on a shelf collecting dust. There will be
demonstrations of technology doing things that the manufacturer didn't think
of, and possibly things that they hoped you would never think of, and how to
unlock those hidden features.
Turn-Key Pen Test Labs - Thomas Wilhelm
Currently, those interested in learning how to professionally conduct
Information System Penetration Tests have very little options available to
them - they can either illegally attack Internet-connected systems, or
create their own PenTest Lab. For those who prefer to avoid legal
complications, they really only have the last option - a lab. However, this
can be a very complicated and expensive alternative. In addition, scenarios
have to be created that actually represent real-world scenarios; for a beginner
this is a Catch-22 since they don't yet have the experience to even know what
these scenarios might look like, let alone design them in a challenging way.
In order to provide a simply way for both beginners and experts to improve
their skills in Penetration Testing, I have designed what is, in effect, a
Turn-Key Pen Test Lab using LiveCDs and minimal equipment requirements. The
LiveCDs each represent different scenarios that mimic real-world systems and
services, which provide essential challenges to improve critical skills in the
field of Pen Testing.
Creativity and Hacker Culture: The Role of Local and
Hyper-Local Interaction - Froggy
Hacker cons have been around for about 20 years. The concept of a con
where people with similar interests can interact together has been around
long before that in the areas of science fiction, etc. However, with the
growth of a few hacker "mega cons", there is an increased focus and interest
in regional, local and hyper-local get-togethers and events. Are smaller
events better than the larger events? What can smaller events and
gatherings provide, with sufficiently limited resources as compared to large
events, that those larger events only wish they could? In this discussion
I hope to explore some of these issues, get feedback and develop with
participants new structures in which to view and appreciate events such
as Notacon and PhreakNIC.
Democracry 2.0 - Bringing an Open Source Revolution to
the Ballot Box - smoke
This talk will be a major update on the third track discussion led at
HOPE 6. Various topics will include the building blocks of democracy 2.0,
reviews of open source voting software and electronic voting machines,
and how I believe these steps can go a long way towards turning back the
tides of war, corruption, greed and the constant assault on our liberties.
Cryptanalysis with Field Programmable Gate Arrays - Decius
This talk is an attempt to build a community around doing distributed
computing with Field Programmable Gate Arrays. The first target is
Cryptanalysis of DES. Most of the alloted time will be spent actually working
on this, so bring your computer, and if you are really interested in this,
order a
Digilent Spartan 3-1000 prototyping board and bring it to the con. They
can be obtained for about $150. Hacking is not a spectator sport. This talk
is for people who actually want to roll up their sleeves and work on a cool
technical project. This project is starting from scratch at PhreakNIC.
Web site and all contents © Copyleft Nashville 2600 Organization 2007, All rights reserved.
Free website templates
|