Speakers: Verónica Valeros | Sebastián García
Bluetooth has been around for a long time. It was subject to hacking and security analysis right from the start. At DeepSec 2013 Verónica Valeros and Sebastián García gave an overview about the current state of affairs. They showed that Bluetooth is alive and kicking, exploit-wise.
A new tool called Bluedriving is presented to capture and store the position and information of bluetooth devices. The devices can be visualized on a map and different alerts can be used to follow people in the street.
We present the tool along with a large capture dataset and a deep privacy analysis. We conclude that it is possible to follow people using their Bluetooth device.
I know what I'm looking for
The presenters showed that Bluetooth is alive and kicking, exploit-wise. A new tool called Bluedriving is presented to capture and store the position and information of bluetooth devices.
In this presentation we propose an approach and hybrid shellcode detection method, aimed at early detection and filtering of unknown 0-day exploits at the network level.
This presentation will cover techniques that can be used to control and extract data from network printers.
We analyzed the hardware of the Mifare tags and found weaknesses in several parts of the cipher.
David Litchfield is recognized as one of the world’s leading authorities on database security.
Learn how Fortune 500 and government organizations are using Splunk to protect themselves against fraud and misuse, and as a valuable tool in their network security and compliance reporting toolboxes.
This presentation is meant to encourage individuals to put the applications and software that they may use on their own home or small business networks under the research microscope.
Learn about the security and social aspects of RFID technology
We will describe the process of setting up the test network we operate at 29C3, what legal and technical challenges we have faced, and we will describe the actual installation at the CCH.
In this talk, the technology and capabilities of US-VISIT will be explained in detail; weaknesses in the system will be explored, and the consequences of such a system will be considered.
The “European Great Firewall” was the way that European civil rights organizations has addressed the proposal to create a “single European cyberspace”. This lecture will describe a vulnerability that the proposal reveals in the power structures of the European and world governance.
We will cover on how the DEF CON network team builds a network from scratch, in three days with very little budget.
This talk is about the project to build the next generation IDS engine. The engine has been released under the name Suricata and can be downloaded from the Open Information Security Foundation (OISF) web site.
Ever wondered what is in these blocks of squares on postal packages, letters and tickets?
I will discuss specific design flaws in the security of “secure” Applications that promise to keep your data / password safe and sound should the device fall into the wrong hands.
This video is made by EXALT and shows a reenactment of a remote hack he did on a Damn Vulnerable Linux (DVL) box.
Architects and developers often perceive threat modeling as being too difficult. During this talk, we’ll attempt to bust these myths and show how organizations can incrementally obtain better results.
We deauthenticate the victim from his own wireless network and wait until he connects to our access point. When the victim connects, he is redirected to a service page asking for the WPA-2 key.
This class will focus on understanding how rootkits work, and what tools can be used to help find them.