Archive > 2003 Workshops

  1. Introduction to x86 assembly language programming - Onq
  2. Reverse-Engineering Workshop - Shadz
  3. Introduction to Format Strings and Heap Overflows - Andrew Griffiths
  4. Introduction to Filesystem's and Data Recovery Concepts - Mitchell Bezzina
  5. Secure Virtual Private Networking - David Balnaves
  6. A Brief Overview of 802.11b - Op7imus_Prim3

top ^

Workshop Details

Details on the workshops at RUXCON 2003 is available below to view. Workshop material (slides, etc) is available in the Archive section of the site.

Introduction to x86 assembly language programming - Onq
Prerequisites: Some general programming knowledge

Intended as a prerequisite for the more advanced talks and will cover the basic concepts of x86 assembly language programming from the ground up (mainly under linux), followed by a brief introduction to writing shellcode.

Bio:
Once a recreational programmer (until university compsci subjects sucked the programmer from him), Onq is currently studying computer engineering and pure mathematics at the University of Sydney; although since losing direction like a compass at the north pole, his interests have degenerated to full time tv watching.

top ^

Reverse-Engineering Workshop - Shadz
Prerequisites: Some general programming knowledge

Reverse Engineering (more a science), is not only a means of discovery, its a way of life. This workshop will begin by examining why a need for Reversing exists and progress onto various methodologies employed by reversers in the course of a project.

Bio:
University educated in both Software and Hardware engineering, Shadz is currently working as a software engineer developing Usermode Protocol Drivers and Kernel Mode Device Drivers for proprietary hardware on the NT/Win2k platform.

Shadz has been reverse-engineering software (and real-life stuff) for the last 10 years, as well as writing networking tools for both Windows and *NIX.

top ^

Introduction to Format Strings and Heap Overflows - Andrew Griffiths
Prerequistes: some programming knowledge; general understanding of buffer overflows

These two subjects cover exploitation for format strings and heap corruption, (specifically malloc chunk, although notes on other heap exploitation methods will be discussed). Due to the power offered to you by format strings, various simple and advanced techniques will be shown for format string exploitation.

Bio:
Andrew Griffiths is fluent with C and x86 assembly and various other languages. Educational background includes Diploma of Network Engineering, and currently is studying Diploma of Systems Administration. Various interests currently include community wireless networks, revision control systems, and routing protocols.

top ^

Introduction to Filesystem's and Data Recovery Concepts - Mitchell Bezzina

A brief insight into the FAT, NTFS and EXT2 Filesystem's to discover how your system is saving and retrieving data. Then walk through a simple data recovery from a floppy diskette.

Bio:
Mitchell has been working in the field of Data Recovery and Computer Forensics for over four years, specialising in low-level filesystem analysis, file recovery and repairing of physically damaged media forms. He has provided evidence in a number of major investigations including cases in the District, Local and Supreme Court, and is in completion of a Diploma in Network Engineering.

top ^

Secure Virtual Private Networking - David Balnaves

An overview of IPSEC from top to bottom. Gain an appreciation as to what IPSec is achieving through encryption and authentication, a look at the different transport mechanisms that may be used, a brief display of how key exchanges and encryption is applied to tunnels, finishing with a brief talk about some practical issues and products that exist when implementing different solutions.

Bio:
David Balnaves is a consultant working for Conetecs Pty Ltd. He is also a part time student at University of Western Sydney finishing a Bachelor of Computer science. David has worked in IT for about 3 years. While working primarley under a Linux/UNIX environment, he has recently diversfied into a Microsoft environment working with Windows 2000 Server and XP. He is also single.

top ^

A Brief Overview of 802.11b - Op7imus_Prim3

This talk basically covers 802.11b security, why it is so poor, and how to make it slightly better. It goes into more detail than the wireless section in Hacking Exposed, but is by no means a white paper on the subject.

Some of the topics covered include WEP, War Driving and using antennas in WiFi applications.

Bio:
Has been reverse engineering things since he first got a PC at the age of 4, and thus has a strong affection for soldering irons and screw drivers.

Got into wireless about a year ago through the London 2600 group and has had a keen interest in the subject ever since. Currently studies Applied Physics at UTS.