Wired Reports On Korea's First Hacker Con 40
evanwired writes "Quinn Norton offers a great first-hand account of the first South Korean Hacker con. Marked by conservative dress and polite conversation, the group was nevertheless still very much concerned with the shortcomings of computer security." From the article: "A police crackdown three years ago left South Korea's hacking community broken and fragmented. One of the conference's more animated speakers, 'Xpl017Elz,' complained that many of Korea's best and brightest hackers wound up emigrating to more receptive environments with better pay for security researchers. But he also demonstrated a large and difficult divide between how the hacker communities behave in Korea and the United States. Xpl017Elz's presentation focused on four (of a reported seven) attacks he developed against Red Hat's Fedora Core using ExecShield. He demonstrated privilege escalation, where a logged-in user can become root and take over the machine, and remote code execution, wherein an external attacker can gain root without a login."
About time... (Score:2)
Hacking Solitaire (Score:1)
conspiracy theory (Score:2)
Re: (Score:3, Funny)
Re: (Score:2)
His name is Xpl017Elz? (Score:4, Funny)
Re: (Score:2, Insightful)
Re: (Score:2, Funny)
Re: (Score:1)
Re: (Score:2)
BTW, what d'ya think of this thread's nimroddery and faux stupidity (I hope) on the presenter's nick being referenced in the first place. At first, it's funny, then it gets more and more strained and lame. Sort of like watching nerds struggling at chitchat
What?! (Score:1)
Re: (Score:2, Insightful)
Re: (Score:1)
Re:Security researchers? (Score:4, Insightful)
Hacking into someone's network uninvited and posting some silly "hacked by" page is not security research.
I missed the part of the article where this is discussed. Can you please point me to it?
The article I read talks about someone who's created exploit code to get around a security measure developed by RedHat. I'm no expert at "ExecShield", but independently developing exploits to security measures sure sounds like Security Research to me.
What you're describing sounds more like script kiddies. It'd be nice if you actually presented some evidence that these guys are actually just script kiddies and not just assuming it because of what I can only assume is personal bias.
Wow, shitty submission, shitty editor. (Score:2)
Every day I'm reminded why I adblock and don't subscribe here. I can get URL Cut & Paste on IRC. And it's realtime.
Is Fedora Core (Score:1)
Not the first... (Score:2)
Not really a dupe article, hrm... maybe Wired writers can't read Korean
Oblig (Score:1)
First Korean conference? More than Six years ago! (Score:3, Informative)
I was a speaker there in August 2000 at the First WorldWide Top Hackers Conference 'IS2K' [blackrosetech.com] in Seoul Korea at the Millennium Hotel [hilton.com]. We spoke for several days and even got to meet Kim Hyong-O [blackrosetech.com], the Member of the National Assembly.
And in the room next door... (Score:1)
ExecShield ? (Score:2)
So, does this attack actually use ExecShield to gain elevated privileges, or do the attacks succeed despite ExecShield ?
According to Redhat:
It is important to note that ExecShield can only reduce the risk and impact of buffer overflow type security issues. The presence of these technologies should never be seen as a substitute for applying security updates provided by the oper