Code Auditing the Defcon Way 74
An anonymous reader writes "Last weekend at Defcon, the best and brightest hackers got together to play Capture the Flag, a weekend long hacking event that is the premier event of its kind. According to the results, Shellphish won (UC Santa Barbara students led by professor Giovanni Vigna). An article at SecurityFocus states that the competition was far more technical than in previous years, focusing on reverse engineering skills and code auditing." From the article: "The game required skills that are also required by both security researchers and hackers, such as ability to analyze attack vectors, understanding and automating attacks, finding new, unpredictable ways to exploit things...It's about analyzing the security posture of a system that is given to you and about which you initially know nothing."
More technical? (Score:4, Insightful)
Re:More technical? (Score:1)
Re:More technical? (Score:2, Insightful)
real-Reverse Engineering under linux ?!? forget about it.
i mean the system is free
Re:More technical? (Score:2, Interesting)
Sorry to tell you this, because just like Shrinker, some bunch of dorks has also broken AsPack (as far as Win32 Portable Executeable format packers/compressors)...
I use (or have used) both in the past not only to gain the faster loadtime off disk (or, even over LANS, because the decompression process only happens AFTER the read up off of the diskdrive into memory, & thus, runtime & today's modern VERY fast nearly 4ghz CPU's more than makeup for t
Re:More technical? (Score:1)
This was still a "creeping" influence the last time I attended (not too long ago), but it sure felt like a trend.
I can understand why companies are upset by the c
Re:Why do Defcon hackers prefer Linux? (Score:3, Funny)
Re: (Score:1)
Re: (Score:1)
Re:Why do Defcon hackers prefer Linux? (Score:1, Interesting)
The job of a linux distributor (such as Red Hat, Debian, Gentoo, Ubuntu etc) is primarily that of assembling a large quantity of free and open source software into an easy to use and pre-configured package. While they may write and contribute some of their own software to the mix, and do some customisation and bug fixes of their own, 95%+ of the software you see in a linux distro will be common to other distrabutions.
I don't use Red Hat or Fedora myself, so could be wrong about the below, but... Fedora is
Re:Why do Defcon hackers prefer Linux? (Score:1)
Re:Why do Defcon hackers prefer Linux? (Score:1)
Linux is only free if your time is worthless.
That isn't to say Linux is bad-- but the setup of various components can be... trying at times.
You forgot (Score:1)
Seroiusly though, buy only supported hardware. When you buy a Mac, you don't expect for all your existing PC peripherals to work with it. Same goes for Linux. Check to see what is supported. That's all there is to it.
What really gets me are all these whiny posts, "I installed Linux and now my camera's not working and my scanner's not working and blah blah bla..." - Get a clue, kids!
Re:You forgot (Score:1)
Under Windows it is a messy pain but you at least can run the program. Under OS X you contr
Re:Why do Defcon hackers prefer Linux? (Score:1)
apt-get install is actually a very easy way to install new software on linux. Alot quicker (human time and attention wise) than finding your MS Office CD, typing in the CD code, then going through the 15 minute insta
Re:Why do Defcon hackers prefer Linux? (Score:1)
And for those who are not money rich and not time rich, what options do we have? OS X is set up in less than 30 minutes. Windows is set up in a few hours. Linux has taken too long to get working and therefore not worth spending more time on it which is unfortunate since I'd like to use it.
"According to the results" (Score:4, Funny)
Who wants to be that Shellphish hacked the results...
Re:"According to the results" (Score:1)
Doh! (Score:1)
Well, as for myself, my PC runs OT/NT (Score:2)
While I like how the OT is handling faults from a theoretical point of view, in practice I mostly use the NT, since applications keep on running and work together well.
Re:Well, as for myself, my PC runs OT/NT (Score:5, Funny)
Anyone parse that as professor Vagina? (Score:1, Funny)
Posture =) (Score:1)
Erm on a serious note, how did the Defconhackers get an overal score of 0?
Why are they even *on* there? Randomness.
-Phil
Re:Posture =) (Score:1)
Re:Posture =) (Score:2)
X (Hackers) Games (Score:2, Insightful)
The problem is when begins to be a serious "news" or "event".
The article try to remark that the event is "pro" or "serious", dont get it...
Its just a game!
Re:X (Hackers) Games (Score:1)
Im _NOT_ denigrating them, they are playing and this is good!, i play to!
I use "Davici Code" in the example, becouse its a "best seller" book, fictional novel, who was taken seriously as if we were talking about a SERIOUS book.
Olimpic games its a bad example, to discuss becouse i dont aprove olimpic games, i think its stupid (medaling stuff).
I dont share your point of view... i mean, be better all the time is what i want, but becouse i want to be better, not becouse i want somethin
Re:X (Hackers) Games (Score:1)
Security Posture?!? (Score:1)
Re:Security Posture?!? (Score:2)
The worst is the growth of "dark" words, darkmail, darknet, darkphish, argh... enough already!
Re:Security Posture?!? (Score:1)
Re:Security Posture?!? (Score:1)
Re:Security Posture?!? (Score:1)
I agree that CV is pretentious as a word. But, there's a difference between a CV and a resume. And CV comes about historically; it's an older phrase than resume and people trying to get academic jobs have called their
Re:Security Posture?!? (Score:1)
That's like saying there are a lot of pitches that haven't been pitched. I mean, pitch vectors that haven't been pitched.
Look, if you consider making fun of an entire industry tantamount to personally attacking each individual, then fine, give me that power. At any rate, I'm sorry if my argument isn't as tight as you'd like. Maybe if I summarized it more eloqu
Re:Security Posture?!? (Score:1)
Re:Security Posture?!? (Score:1)
Jeez, that makes it sound even more pretentious! Guys with guns who dodge morter rounds invented the term, and it's been adopted by pasty guys who wear sandals, write computer code and wake up around noon. (I'm one of the latter guys, so don't get too pissy about the insult.) Sure, call me a dick (and you'd be half right) but don't you see my point eve
I would love to see network trace logs (Score:3, Insightful)
I'm sure someone watched the wire for this event - if TCPdump (or whatever) traces of it are available anywhere, someone post a link. It would be a fascinating thing to waste my weekend on.
The game is quite different... (Score:2)
The way they setup the infrastructure also does not allow you to do a whole lot of defense against the attacks.
In terms of this being real-world... Honestly, how many security incidents are caused by hackers reversing the binary which lead to the intrusion? I would say 95% of intrusion are done by script-kiddie method.
I hope they will put more infrastruc
Teams? (Score:1)
Re:Teams? (Score:1)