Become a Sponsor! Help the community and reap the rewards!
Tim Elrod, Founder, Ri0tnet Security
Tim has been an Information security professional for over 7 years but his passion for information security began when he first attached a 300 baud modem to a Commodore 64 and began this wild ride. Tim is the founder of Ri0tnet Security an independent research company that focuses on vulnerability discovery, penetration testing, and reverse engineering. Tim is also a member of the Bastard Labs Vulnerability Research Team as well as the OKC2600 and a regular speaker at the DC405. Tim has found and exploited vulnerabilities in most major network operating systems including AIX,HPUX,Tru64,Linux, and Microsoft Windows as well as many enterprise software packages. Tim is an open source advocate and a contributer to the Open Source Vulnerability Database and the Metasploit Exploitation Framework as well as many other open source projects. Tim was co creator of the DISE port scanner as well as many other open source hacking tools.
Reverse Engineering Security Patches
This talk is a in depth look at the process of reverse engineering a security patch to determine exploit vectors with the end result being a working exploit for the vulnerability. The talk begins with an overview of the process and motivation behind not only reverse engineering but vulnerability discovery in general. We then delve into the world for RCE (Reverse Code Engineering) with a look at the tools used by reverse engineers as well as some of the techniques employed. the talk ends with a live demo of reversing a QuickTime security Patch resulting in a full working exploit for the vulnerability. The purpose of this talk is to educate people on this often vague practice of reverse engineering in the hopes that they will take adequate steps to improve corporate patching policies.
COMikazi - The automated ActiveX fuzzing and Exploitation Framework
COMikazi is a tool that will fuzz activeX controls for common vulnerabilities and if found will automatically generate metasploit exploitation modules for those vulnerabilities. Combined with a webcrawler to find new ActiveX controls this represents a significant step forward in the field of automated vulnerability discovery and exploitation.