Termin:Chaotic-Congress-Cinema Nr. 7

Aus Attraktor Wiki

Wechseln zu: Navigation, Suche


Chaotic-Congress-Cinema Nr. 7

Beginn:

23.02.2011 20:00

Ende:

23.02.2011 23:00


Needs to be there, but does not need to be seen by a visitor Yes Wir schauen uns die Aufzeichnung von Congress Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)

Weitere Informationen unter Chaotic Congress Cinema.

SMS-o-Death

From analyzing to attacking mobile phones on a large scale.

Smart phones, everybody has a smart phone! No! Just about 16% of all mobile phones are smart phones! Feature phones are the most common type of mobile phone in the world. Some time ago we decided to investigate the security of feature phones. In this talk we show how we analyzed feature phones for SMS security issues. We show our results and the kind of attacks that are possible with our bugs.

This talk is about security analysis of a class of mobile phone the so-called "feature phones". We show how we analyzed these type of phones for SMS security issues and what kind of problems to overcome in the process. We show results for the major mobile phone manufacturers in the world. Everyone of them has problems. Finally we show what kind of global scale attacks one can carry out with these kind of bugs. The attacks range from interrupting phone calls, to disconnecting people from the network, and sometimes even bricking phones remotely.

The talk is structured in the following way:

   * Introduction to the Topic
   * Problem Description
   * The Analysis (major part of the talk)
   * Analysis Results
   * A look at the Operator Network
   * Attacks based on our Results
   * Conclusions

http://events.ccc.de/congress/2010/Fahrplan/events/4060.en.html


Building Custom Disassemblers

Instruction Set Reverse Engineering

The Reverse Engineer occasionally faces situations where even his most advanced commercial tools do not support the instruction set of an arcane CPU. To overcome this situation, one can develop the missing disassembler. This talk is meant to be a tutorial on how to approach the task, what to focus on first and what surprises one may be in for. The primary focus will be on the transformation of byte code back into mnemonic representation where only the reverse transformation is available (i.e. you have the respective assembler). It also covers how to integrate your new disassembler into your reverse engineering tool chain.

This tutorial talk will give:

   * An introduction to the problem
   * How to obtain byte code
   * Recognizing basic properties of the byte code
   * Finding Addressing Modes
   * Implementing a IDA Pro processor module
   * Reading code you are not supposed to

http://events.ccc.de/congress/2010/Fahrplan/events/4061.en.html

Diese Seite wurde zuletzt am 9. Februar 2011 um 20:17 Uhr geändert. Diese Seite wurde bisher 2.580 mal abgerufen.