Speaker: Brandon Dixon
Mobile spam has not reached the same popularity as email spam, but what if it was as easy as submitting a form to spam thousands of people?
Research was done on several messaging services and implementations to identify vulnerabilities to exploit. The end result to the research was that the idea of mobile spam was easily a reality using Jabber/XMPP and some techniques already put in place by multiple vendors.
This talk will conclude with a proof-of-concept web application demo that demonstrates the techniques and issues mentioned as well as thoughts for solving the next generation of spam. Expect to walk away with a new look on mobile spam and the damage that could be done just by pressing submit.
Change your thoughts and you change your world
Videos from the same category or videos related to the subject.
You will find something new to watch and expand your knowledge.
The talk discusses a GSM debugging tool that consists entirely of open source software and open radio hardware. We will demonstrate how to record and decode GSM calls, even encrypted ones.
I will discuss specific design flaws in the security of “secure” Applications that promise to keep your data / password safe and sound should the device fall into the wrong hands.
The talk uses fresh examples of application cryptography successes and failures, and also incorporates the new OWASP ESAPI.
This talk will summarize what we have learned about the internal architecture of the iPhone platform, its security, and the ways we have found to defeat these security measures.
This talk will conclude with a proof-of-concept web application demo that demonstrates the techniques and issues mentioned as well as thoughts for solving the next generation of spam.
This presentation will delve into the science and process behind secure code review and will continue to discuss a simplified approach to secure code review
Many websites mix secure and insecure content on the same page this makes it possible to steal all the data entered on such a page easily, using Moxie Marlinspike’s new SSLstrip tool. I will give a brief explanation and demonstration of the technique.
This talk ends the myth of unbreakable SIM cards and illustrates that the SIM cards are plagued by implementation and configuration bugs.
In the Free City of Hamburg a coalition of hackers, activists and other players of civil society have drafted the most revolutionary Freedom of information law in the world.
Short demo using the passthrough option of Pyrit which eliminates the need for giant tables taking up all your hard drive space.
This talk introduces Trabbler, the first highly versatile “cross site scripting Trojan”. In the talk, we will discuss Trabbler ́s architecture and code and give practical examples of its application.
This talk will is intended to understand where and how the digital conflicts are conducted today but we will dig deeply into the future.
This talk will discuss the past methods used for XSS defence that were only partially effective. Learning from these lessons, will also discuss present day defensive methodologies that are effective, but place an undue burden on the developer.
The first part of the talk provides a brief history of Storm Worm focusing on the actual propagation phase. Afterwards we describe the network communication of the bot in detail and show how we can learn more about the botnet.
I will demonstrate both local and remote attacks on ATMs, and I will reveal a multi-platform ATM rootkit. Finally, I will discuss protection mechanisms that ATM manufacturers can implement to safeguard against these attacks.
Tom Scott explains the insecure ways in which some websites deal with passwords.
This talk will focus on building a phishing framework on top of Metasploit that pentesters can use to automate phishing and increase their overall capabilities.
Using Linux and a device with 2 network cards, I will demonstrate how to configure an undetectable transparent bridge to inject a rogue device onto a wired network that is secured via 802.1x using an existing authorized connection.
Vladimir Katalov Vladimir Katalov presents the results of analysing the Apple iCloud protocol and its impact on iCloud services.
The details of reversing software running on Android is a scarce. This talk will explore the filesystem, memory, and reverse engineering techniques in-depth.
Johnny Long reveals basic and advanced search techniques, basic and advanced hacking techniques, multi-engine attack query morphing, and zero-packet target foot printing and recon techniques.
We will describe the process of setting up the test network we operate at 29C3, what legal and technical challenges we have faced, and we will describe the actual installation at the CCH.
This talk details how we have abused some of the most popular and recommended Firefox addons, with previously unreleased vulnerabilities. Demos will cover remote code execution, local file disclosure and other tailored Firefox Addon exploits.
After a short introduction on the differences of IPv4 to IPv6, the weaknesses in IPv6 will be shown. Highlight of the talk is the presentation of the THC-IPV6 Attack Toolkit.
Ben Smith presents new malicious abuses of printers as well as some fun new uses for old attacks.
Believe you can and you’re halfway there
A collection of videos organised or just select a video by the first impression.
That choice is up to you.
Just click and be surprised
Find what you're looking for