Welcome to PhreakNIC i'm Notlarry and I'll be your host this weekend. I'll quickly cover the dos and do nots for the weekend as well as tell a few jokes while I fill you in on last minute changes that didn't make the website or official printed material.
After five years in grad school working on a project that visualizes magnetic fields, no funding sources were found to continue my research; so I started my own company. You can see my work at www.revolution-labs.com. I will talk about my work with magnetism and my experiences in higher education. Will finish the talk by looking at some CUDA GPU magnetic modeling programming and the resulting 3d images.
The tabletop and electronic gaming area will be open from now until we close up on Sunday.
Feel free to stop in here and socialize between talks or play a round of Munchkin, Jungle Speed or Killer Bunnies. We will also have a Wii and Xbox 360 setup for some coop or head to head console action. Finally Notlarry is setting up the Quake stations from last year once more for some old school deathmatches!
This presentation discusses the security issues with the critical network architectures being deployed by service providers and utilities to support next generation network services such as IPTV, 3G/4G, smart grid etc.
Network infrastructure security is often neglected during the typical security audit process due a lack of router and switch knowledge. In this presentation attack vectors will be discussed that enable an attacker to take control of network infrastructure by targeting common configuration mistakes, trust relationships, inter-dependencies and protocol weaknesses. The presentation will explain what an attacker may do with network infrastructure components once captured to gain further influence and complete access to network resources and data.
Need to talk to him to get a topic that he is going to talk on. He is currently slated to teach the open curriculum with Vanderbilt University's Coursera program.
Go out and socialize we're providing BBQ tomorrow night.
Take advantage of the Steak and Shake deals in the program guide
Got a question about home brew or want to share a recipe? Come on out to this panel hosted by Dolemite and Erin.
There will be samples! Bring your best batch to show off as well.
A practical demonstration of how technology can be re-purposed and made more easily usable for people with disabilities.
This will also cover what types of technology that you might have sitting in a closet that they can use to help others. They will also demonstrate toy adaptations so that they can be played with by children with disabilities. Come out and show your support for their most excellent cause.
Here is a list of toys that they would like for donation that have been shown to be adaptable. Please look this list over and make a donation!
At no time in history have we had a greater need for cybersecurity experts to protect government networks, critical infrastructures and private sector enterprises from the global onslaught of organized cybercrime, nation states and terrorists. But we face new forms of discrimination that will empower lawyers unless ‘Hiring’ groups change their habits.
Schwartau believes we need a complete top-down rethink of how we choose security experts, how we manage them and how we view the skill sets needed to provide the best possible cyber defenses.
So, you want to run a capture the flag game? Well, have you thought of scenarios you want to use? Already ran one and need to change it up for the next con? What sort of hardware do you think you will need? Feel too lazy to come up with your own scenarios every single time? Running a CTF can be a pain.
The idea behind NetKotH is to have the players make the game dynamic so you don’t have to. They have to own the boxes, and keep them, to score point. This makes them both the red and the blue teams. Even if you reuse the same scenarios/VMs each time, things change as player race each other to get control first, script re-pwning of boxes and try to make life hell for each other.
This will start immediately following the talks along with the other gaming events. Notlarry has several vulnerable systems that should be ready to pwn.
We do not condone drinking and driving, however we do promote drinking and gaming! Returning this year we will have two racing stations setup for head to head competition on Forza for the Xbox 360.
Do you play Skylanders for 3DS, Wii, XBox360, PS3? We aren't judging you but we will have a 1v1 single elimination tournament. Bring your own character or choose from those we will have available. If you haven't ever played that's no problem either. It's so simple my 5yr old nephew can beat you at it.
Trash talking is required.
An overview will be given of different types of locks and the techniques used for picking them, including bypass methods. This talk will be focused more on the individual who is new to locksport, though some more advanced topics will be mentioned.
Online gaming addiction is the excessive use of online video games for leisure. This excessive use leads to problems in daily living to include: social, occupational, or academic dysfunction. This therapist has treated several people with this disorder and has found online gaming addiction is common in the military population. As certain aspects of this disorder are highlighted during the presentation, I will provide real life case studies of online gaming addictions and how it negatively affected their lives.
Go out and eat. Keep it light we have whole hog bbq at 6
Chad had a scheduling conflict and we agreed with him that it was far more important than presenting.
We'll either do lightning talks here or I have a few alternates that will fill the spot. Check back later.
"Crypto Party" is a worldwide movement where speakers encourage non tech savvy yet privacy rights interested people to protect themselves online. You can read more about it at https://cryptoparty.org/wiki/CryptoParty. Anyway, if you're looking for people to give talks, I'd love to talk about setting up a crypto party in other places. I know most of Phreaknic has the technical knowledge to use cryptographic technologies and analyze how safe they are, but it's also important that the layman understand that as well. Please allow me 30 minutes to encourage people start up a group in their respective cities.
Making your own electronics has never been easier. So why aren't you making anything yet? Stop being so lazy and lets build stuff.
Got a question about Intellectual Property law ask an expert. There will be no legal advice given but factual answers about the law will be discussed. Working in the technology industry where do you stand with your ideas and your company?
Police, Emergency Medical, and Critical Infrastructure maintain wireless networks on the 4.9GHz Public Safety Band, but what’s actually there? Learn how to find, identify, and monitor these networks. This talk discusses the technical details of the 4.9GHz band, then dives deep into the hardware and software required to discover and interact with it. The presenters will show how commercial off the shelf hardware with modified drivers can be used to explore these networks with minimal effort, and disclose the results of wardriving the 4.9GHz band in a number of major US cities.
We're supplying dinner tonight so grab a drink and come out to socialize.
After getting suspended twice from Google Plus over what became #nymwars, aestetix began to explore what identity is really all about and the different ways we represent ourselves both online and offline. Picking up from his PhreakNIC talk last year, aestetix is back from the Gulch to present some of his new findings. This talk will explore the nature of identity, gleaning wisdom from masters like Carl Jung, and will try to answer a number of important questions, such as "Why do hacker handles matter?" and "Is there such a thing as a real name?" We'll also take a look at existing technical implementations of online identity, how well they incorporate fundamental principles, and make some suggestions for future online identity systems.
DNS is a key portion of the internet today. However, the protocol is old and has lingering security vulnerabilities. DNSsec is technology to help defend DNS and make the entire internet safer. This talk is about the status of DNSsec: how easy it is to deploy, how well we are adopting it and what, if anything, is keeping us from moving forward.
The victory of the netizens over SOPA and PIPA has been hailed as a revolutionary moment in which the Internet is finally coming into its own from a political standpoint. However, there are two realities that pose a threat to us in the future. The first is that the Internet community has underestimated the deeply warped perspective that people in the content industry have developed about us and the way that this perspective will motivate future attacks on our liberty. The second is that over the past few years our interactions have become mediated by a handful of technology companies whose sympathy for our freedoms may be temporary. These two forces have the potential to dramatically change the nature of the Internet in the future.
Talks are over get out to the atrium and socialize. Foot Pound Force is confirmed to come play again and we will have table top gaming going on as well.