Difference between revisions of "User:M3m0r3x"

From SHA2017 Wiki
Jump to: navigation, search
(Things done on Camp)
Line 82: Line 82:
  
 
=== Day One ===
 
=== Day One ===
Opening Talk <br />
+
'''Opening Talk''' <br />
Crypto Wars 2.0: Lessons learned from the past, for the present <br />
+
This was just the opening talk for the awesome SHA2017 Camp. Stitch, the main organizator of this event told in this Talk who it was rganizing the camp and what has gone wrnge at the very first beginning for example with the batch production. But in the end all has gone good and he celebrated with us the opening of this camp. <br />
Attacking OpenSSL using Sidechannel Attacks <br />
+
Recording: [https://media.ccc.de/v/SHA2017-251-sha2017_opening sha2017_opening]
Famous C&C servers from inside to outside <br />
+
 +
'''Crypto Wars 2.0: Lessons learned from the past, for the present'''<br />
 +
Phil Zimmerman, founder of PGP,  held a very political keynote at the beginning. In his talk he speaks about the willing from different politics to backdoor or harm cryptography for instigation purposes. This was in the history done on many other technologies. For example in the time of Bonnie and Clyde, the police was not able to catch them up because after every robbery the drove away fast. As consequences the politics wanted to shorten the tanks of the car so that the police is able to catch them up while they were going out of gas. The main statement of his talk is: backdoors for the good guy are backdoors for the bad guys.<br />
 +
It was really an honor to se the man live on stage who brought the people PGP, strong Crypto for the masses. <br />
 +
Recording: [https://media.ccc.de/v/SHA2017-336-cryptowars_2_0_lessons_from_the_past_for_the_present cryptowars_2_0_lessons_from_the_past_for_the_present] <br />
 +
 
 +
'''Attacking OpenSSL using Sidechannel Attacks''' <br />
 +
'''Famous C&C servers from inside to outside''' <br />
 
Batch soldering <br />
 
Batch soldering <br />
 +
Fun Fact of the day
  
 
=== Day Two ===
 
=== Day Two ===

Revision as of 18:24, 8 August 2017

m3m0r3x Verfied.png
User-M3m0r3x.jpg
Generated SHA Flag with Name (experiment here)
Arrival 2017/08/03 00:00
Departure 2017/08/09 10:00
BuildupVehicle Car, Transporter
Bringing Arduinos, Raspies, LTE-Router, Switch, Powercoard, some soldering stuff, Hacking Gadgets, UpriBox, FruityWiFiPi
Village Village:1838, Village:Foodhackingbase
Working on
Contributions
Contact
Twitter @_m3m0r3x_




Orga

Things I want to visit

Talks (Live or Recording)

Friday

SHA2017 Opening
Cryptowars 2.0: Lessons from the past, for the present
Attacking OpenSSL using Side-channel Attacks
Computer crime and criminal law 101
Famous C&C servers from inside to outside
Blockchain beyond the buzz and hype
icibici workshop: a brain-computer interface for your phone/tablet/etc

Saturday

Android Application Pentesting 101
Tor de-anonymization techniques
An academic's view to incident response<--
Smart Home Security with Tor
Network concepts introduction & wireshark workshop
Modern Digital Forensics analysis, where to find evidence

Sunday

Data Exploitation
TLS Pool: Security orthogonal to Applications
A look at TR-06FAIL and other CPE Configuration Management Disasters<--
Anonymous, secure and easy. You can have them all
An introduction into next generation computing using Field Programmable Gate Arrays (FPGA)
Making bombs
Secure communications hardware

Monday

Blockchains for a Better World
Physical Penetration Testing
Windows forensics
FaceDancer 2.0

Tuesday

Exploiting Twitter with Tinfoleak for investigative purposes
DDoS attack and defense
Exploiting Twitter with Tinfoleak for investigative purposes
Infrastructure review
SHA2017 Closing
SHA2017 Closing Simulcast

Self organized sessions

Flamethrowers_101
The_One_Ring_Workshop
Open_Molecular_Cooking_Night
Pimp_your_Android(-fork)_with_the_best_Free_Software_apps_(live_&_interactive)
FPGAs_for_Newbies
LearnToSolder
Monitoring_Government_Surveillance_Capabilities_by_means_of_Transparency_tools
Secure_communications_hardware
Modern_Digital_Forensics_analysis,_where_to_find_evidences
Windows_forensics

Projects

KillerBee
RaZberry

Camp Notes

Things done on Camp

Day Zero

SHA2017.jpg

We arrived at Zeewolde at approximate 01:00 pm. Of course first we build up our village "1838". The rest of the day we were carrying our luggage and equipment from the parking lot to the camp at the Turing field. Then of course we built up the infrastructure to our tents (power and LAN from the Datenklo). I was setting up an accespoint for our village wich is based on an raspberry-pi wich connects all the traffic by tor and separates us from the Camp LAN. It is not that we don't trust the SHA2017 people but...

Parts of luggage.jpg
Powerup.jpg

After work was done we drank some beer and walked over the camp ground to check out different locations. We of course visited the SHA-Habour wich was build up just for this event for people who come by (House)boat. After that we tried to find the food curt. As we found it, it was unfortunately closed. Some people of our village registered their DECT phone at event phone. There was not much built up at day zero. Just some big projects built up there stuff but most of the people where normal campers. We visit also the so called "Food Hacking Base" were a bunch of people do all things with food. There are also workshops like a cheese and a whisky tasting, molekular kitchen and so on. And we all donated a bit of money to get three meals a day (breakfast, lunch and dinner) on every day.

Fun Fact of the day: The Finish Embassy have their own sauna.

Finish sauna.jpg

Day One

Opening Talk
This was just the opening talk for the awesome SHA2017 Camp. Stitch, the main organizator of this event told in this Talk who it was rganizing the camp and what has gone wrnge at the very first beginning for example with the batch production. But in the end all has gone good and he celebrated with us the opening of this camp.
Recording: sha2017_opening

Crypto Wars 2.0: Lessons learned from the past, for the present
Phil Zimmerman, founder of PGP, held a very political keynote at the beginning. In his talk he speaks about the willing from different politics to backdoor or harm cryptography for instigation purposes. This was in the history done on many other technologies. For example in the time of Bonnie and Clyde, the police was not able to catch them up because after every robbery the drove away fast. As consequences the politics wanted to shorten the tanks of the car so that the police is able to catch them up while they were going out of gas. The main statement of his talk is: backdoors for the good guy are backdoors for the bad guys.
It was really an honor to se the man live on stage who brought the people PGP, strong Crypto for the masses.
Recording: cryptowars_2_0_lessons_from_the_past_for_the_present

Attacking OpenSSL using Sidechannel Attacks
Famous C&C servers from inside to outside
Batch soldering
Fun Fact of the day

Day Two

TOR de-anonymization techniques
An academic view on incident response
modern digital forensic analysis
Cidre Tasting

Day Three

Datab Exploitation
A look at TR-06 FAIL and other CPE Configuration Management Disasters
Secure Communications hardware
Cheese Tasting

Day four

Fun Fact: Ransomware for the Batch <br /