October 31, 2017
You can, quite reasonably, expect smart locks and access control systems to be free from alarming security vulnerabilities – such a common issue for an average IoT device. Well, this training will prove you wrong. After performing multiple hands-on exercises with a dozen of real devices and various technologies, you will never look at the […]
Tags: Access Control, DeepSec, Hacking, Infrastructure, IoT, IoT Devices, Smart Lockpicking, Training
Posted in Conference, Training
October 30, 2017
Last week the Privacy Week 2017 took place. Seven days full of workshops and presentations about privacy. This also included some security content as well. We provided some background information about the Internet of Things, data everyone of us leaks, and the assessment of backdoors in cryptography and operating systems. It’s amazing to see for […]
Tags: Crypto
Posted in High Entropy, Security
October 25, 2017
Encryption and ways to break it go hand in hand. When it comes to the digital world, the method of rapidly using different keys may lead to success, provided you have sufficient computing power. The graphics processing units (GPUs) have come a long way from just preparing the bits to be sent to the display […]
Tags: authentication, BitCracker, BitLocker, Crypto, DeepSec, Talk
Posted in Conference
October 17, 2017
Seeing is believing. If you sit in front of your desktop and everything looks as it should look, then you are not in the Matrix, right? Right? Well, maybe. Manipulating the surface to make something to look similar is a technique also used by phishing, spammers, and social engineers. But what if the attacker sitting […]
Tags: Cybercrime, DeepSec, Gozi, hidden VNC, Malware, Talk
Posted in Conference
October 17, 2017
The Marshmallow version was a significant revision for Android. Among the new features that were introduced one of the most significant is, without any doubt, the runtime permission. The permission model was totally redesigned, categorising the permissions into four main categories. The main concept of this categorisation is how much risk a user is exposed […]
Tags: Android, DeepSec, Marshmallow, Mobile, Talk
Posted in Conference, Security
October 16, 2017
The world’s gone mobile. Mobile devices have surpassed the standard computer (i.e. desktop) installation multiple times. In turn this means that you will encounter these devices most definitely when testing or implementing security measures. Usually adversaries do not use the platform itself. They use software to gain entry. This is why mobiles apps are the […]
Tags: Android, Attack, DeepSec, iOS, Mobile, Mobile App, Smartphone, Training
Posted in Conference, Training
October 12, 2017
The motto of DeepSec 2017 is „Science first!“. This is expressed by the co-located ROOTS workshop, many speakers from academics, topics fresh from the front lines of research, and a mindset that favours facts over fake content or showmanship. This is why we want to thank the University of Applied Sciences Upper Austria for their […]
Tags: DeepSec, Mindset, Research, Science
Posted in Conference, Security
October 12, 2017
The arsenal of components you can use for securing your organisation’s digital assets is vast. The market offers a sheer endless supply of application level gateways (formerly know as „firewalls“), network intrusion detection/prevention systems, anti-virus filters for any kind of platform (almost down to the refrigerator in the office), security tokens, biometrics, strong cryptography (just […]
Tags: Adversary, DeepSec, SecInt, Security Intelligence, Workshop
Posted in Conference, Security Intelligence, Training
October 12, 2017
You have probably heard of Google. Well, you will be hearing more from them if you come to DeepSec 2017. They have agreed to support our conference. They will be on site, and you will be able to talk to them. Every year we aim to give you opportunities for a short-cut, for exchanging ideas, […]
Tags: Big Data, Cloud, DeepSec, Internet, Web
Posted in Conference, Internet
October 10, 2017
The SAP business suite is widespread among enterprises. It is the heart of the operation, at least in terms of business logic, administration, accounting, and many other cornerstones of big companies. SAP itself was founded in 1972. Its software has now grown up and lives with the Internet and cloud platforms next door. Due to […]
Tags: ABAP, DeepSec, Netweaver, PenTest, SAP, Workshop
Posted in Conference, Training
October 9, 2017
There is a famous thought experiment described in the book A Treatise Concerning the Principles of Human Knowledge. It deals with the possibility of unperceived existence; for example does a falling tree in the forest make a sound when no one is around to hear it? Given the many reports and mentions about zero-day exploits, […]
Tags: 0day, AES, DeepSec, Defence, Talk
Posted in Conference
October 8, 2017
Microsoft has introduced the Background Intelligent Transfer Service (BITS) into Windows 2000 and later versions of the operating system. Windows 7 and Windows Server 2008 R2 feature the version 4.0 of the protocol. BITS is designed to use idle bandwidth in order to transfer data to and from servers. BITS is an obedient servant, and […]
Tags: DeepSec, Hacking, MITM, Network, Talk
Posted in Conference, Internet, Security
October 7, 2017
“Our new tool XFLTReaT is an open-source tunnelling framework that handles all the boring stuff and gives users the capability to take care of only the things that matter”, says Balazs. “It provides significant improvements over existing tools. From now on there is no need to write a new tunnel for each and every protocol […]
Tags: DeepSec, Exfiltration, framework, Hacking, Talk
Posted in Conference, Security
October 6, 2017
A lot is expected of software developers these days; they are expected to be experts in everything despite very little training. Throw in the IT security team (often with little-to-no knowledge of how to build software) telling developers what to do and how to do it, and the situation is further strained. This silo-filled, tension-laced […]
Tags: DeepSec, Governance, Leadership, Mindset, Policies, Talk
Posted in Communication, Conference, Security
October 5, 2017
Everyone has firewalls or filters. They are now called application-level gateway (ALG) and have lots of features included. Algorithms, signatures, heuristics, protocol checks, verification; you name it. It’s all in there. But does it work? Obfuscation and evading technology has been around since the first filter was created. Anticipating what data might look like is […]
Tags: Hacking, Talk, WAFNinja, Web
Posted in Conference, Security