top ^
This is the finalised list of presentations for RUXCON 2005
top ^
This presentation will mainly focus on the Linux operating system, however, the ideas presented are applicable for other operating systems as well. The presentation is aimed to give a general high level overview with some examples to demonstrate the case in point.
top ^
top ^
top ^
top ^
top ^
top ^
top ^
SensePost will provide the audience a glimpse of BiDiBLAH - an attempt to automate a focussed yet comprehensive assessment. The tool provides automation for:
top ^
Jason has been involved in forensic computing for more than a decade and has trained nationally and internationally in data analysis, reverse engineering, data recovery, computer forensics and incident response, including training from a number of US law enforcement agencies with three letters and other US and Canadian government agencies. He has developed extensive training courses in electronic evidence, data recovery, and reverse engineering. He has also developed numerous software tools to automate many of these processes.
top ^
Although groundbreaking research work exists in terms of attacking the individual technologies like Safe SEH, /GS stack protection, Heap Cookies and NX itself, it is very difficult to obtain a unified view of how the technologies work together against real world attacks. If you're comfortable with stacks and heaps and have a passing familiarity with x86 assembler and CPU architecure then join us as we attempt to clarify the operation of all the new protection features, alone and in combination, and then see what attacks remain viable.
top ^
She is also one of the primary organisers of SecureCon, a free computer security conference held in Melbourne each February.
top ^
top ^
top ^
top ^
top ^
top ^
However, its actual implementation provides an intruder with the opportunity to discover, evade, confuse and disable the NIDS in order to reduce its overall function for incident response.
Christian Heinrich will present several new attacks with a number of supporting "real world" case studies of an unpublished API in which to identify, confuse and disable an NIDS and to evade detection over a TCP/IP network.
Christian Heinrich has participated in a senior technical capacity for a large number of network security projects for News Corporation, Australian Security Intelligence Organisation (ASIO), Australian Federal Police (AFP) and Defence Signals Directorate (DSD).
Christian Heinrich has many network security qualifications, including Checkpoint Certified Security Engineer (CCSE), Cyberguard Firewall Security Administrator (CSFA), Lucent Security Professional, Sophos PureMessage for UNIX and SANS Firewalls, Perimeter Protection, and VPNs.
Christian Heinrich is the "Organizer" for the recently announced Australian and New Zealand Snort User Groups.
Christian Heinrich participated in the Technical Q&A of "SecCon 98" as an invited expert of the chair.