{"id":115,"date":"2010-03-20T23:00:40","date_gmt":"2010-03-21T03:00:40","guid":{"rendered":"http:\/\/blog.alanporter.com\/?p=115"},"modified":"2010-03-20T23:00:40","modified_gmt":"2010-03-21T03:00:40","slug":"carolinacon-day-2","status":"publish","type":"post","link":"https:\/\/alanporter.com\/blog\/2010\/03\/20\/carolinacon-day-2\/","title":{"rendered":"CarolinaCon &#8211; Day 2"},"content":{"rendered":"<p>The second day of CarolinaCon was packed from sunup to sundown &#8212; who am I kidding&#8230; hackers seldom rise before noon. \u00a0The festivities started at 10am.<\/p>\n<p><strong>Hacking with the iPhone &#8211; snide<\/strong><\/p>\n<p>No, not hacking the iPhone&#8230; but using the iPhone as a hacking tool.  This talk was a good slide into the morning, a chance to let the coffee sink in.  It could probably summarized with two main points:<\/p>\n<ul>\n<li>Since the iPhone OS is a distant cousin of BSD Unix, many open source (Linux) networking tools can easily be ported to run on it, so a jailbroken iPhone makes a decent platform for network sniffing and the like.<\/li>\n<li>A jailbroken iPhone provides a behind-the-scenes look at the user interface, and many things that are set on the main GUI can be changed by directly manipulating the underlying settings files.<\/li>\n<\/ul>\n<p>Neither of these ideas is too surprising, and so this talk was nothing new.  Still, for me, having never played with a jailbroken iPhone (honest), it was an eye-opening experience.  Or maybe that was just the coffee kicking in.<\/p>\n<p><strong>We Don&#8217;t Need No Stinking Badges &#8211; Shawn Merdinger<\/strong><\/p>\n<p>Shawn has spent some time evaluating campus-oriented badge reader door locks from a company called S2 Security.  He showed how they work, and how they are <em>advertised<\/em> to work &#8212; not necessarily the same thing.  An interesting glimpse into the world of distributed security systems, with several take-home lessons about what <strong>not<\/strong> to do.<\/p>\n<p><strong>It&#8217;s a Feature, Not a Vulnerability &#8211; Deral Heiland<\/strong><\/p>\n<p>This is the third time that I have seen Deral present at CarolinaCon.  In 2009, he showed us what a mistake it can be to &#8220;web-enable&#8221; your products, and in 2008, he showed us how he made friends at Symantec with &#8220;Format String Vulnerabilities 101&#8221;.<\/p>\n<p>This time, he continued his endorsement of Symantec&#8217;s products by demonstrating how their AMS product conveniently allows very easy access to a machine&#8217;s resources.  In fact, all it takes is a single packet to tell AMS to run any command on a target Windows box.  That&#8217;s <em>convenient<\/em>!  (PWNED)<\/p>\n<p><strong>Smart People, Stupid Emails &#8211; Margaret McDonald<\/strong><\/p>\n<p>Margaret came here all the way from Denver to tell us what we already knew&#8230; that otherwise intelligent people send the stupidest things in email.  This was a lively discussion that we could all relate to&#8230; yet I have this sinking feeling that our inboxes will still be filled with garbage when we get back to work on Monday.<\/p>\n<p><strong>Mitigating Attacks with Existing Network Infrastructure &#8211; Omar Santos<\/strong><\/p>\n<p>Omar was cursed with the dreaded 3:00 time slot&#8230; just in time for the after-lunch sleepies.  It did not help that his presentation was JAM-PACKED with very technical networking information.  So, for the most part, I sort of zoned out during this very informative presentation.<\/p>\n<p>I tried hard to stay awake by asking a question (about &#8220;bogons&#8221; &#8212; in this case, the newly-allocated and unfortunately-numbered 1.0.0.0\/8 address space).  But it did not help.<\/p>\n<p>Omar plans to give this same talk at &#8220;Hack in the Box&#8221; in Dubai later this year.  So if I start feeling regrets that I missed something, I guess I can always book a flight.<\/p>\n<p><strong>OMG, The World Has Come To An End! &#8211; Felonious Fish<\/strong><\/p>\n<p>Hackers are usually prepared for anything&#8230; or are they?  FF led a discussion on survival, what is needed when the rest of our infrastructure is gone.  We might have food and water and shelter, but when my iPhone battery dies, it&#8217;s game over!<\/p>\n<p><strong>You Spent All That Money and You Still Got Owned &#8211; Joe McCray<\/strong><\/p>\n<p>Joe&#8217;s talk was one of the highlights of the Con&#8230; even Stevie Wonder could see that it was awesome.  Joe told us his secret to success &#8212; he goes into companies,  totally pwns them in short order, tells them how they suck, and then they pay him.<\/p>\n<p>Apparently, corporate America makes Joe&#8217;s job very easy by following the worst practices.  And on the odd chance that they have their operational act together, he can always solicit a security slip-up by sending them a carefully-crafted email (pwn), or if that fails, by leaving a CD with provocative title for some nosy employee to find (serious PWN).<\/p>\n<p>What a life Joe leads &#8212; that &#8220;education&#8221; he got in prison has really paid off.<\/p>\n<p><strong>Locks: Past, Picking and Future &#8211; squ33k<\/strong><\/p>\n<p>The lovely and talented squ33k &#8212; 5th grade teacher by day, lock hacker by night &#8212; educated us on all things lock-related.  With assistance from the TOOOL crew, she taught us how modern pin tumbler locks work, and how they can be picked.  But being a full-time teacher, she made sure to frame her talk with some interesting background info on locks from as far back as 4000 years ago, and a glimpse into what locks may be like in the future.<\/p>\n<p>I am so proud that our youngsters are learning their skills and attitudes from this woman.  She&#8217;s a girl geek role model!<\/p>\n<p><strong>Hacker Trivia<\/strong><\/p>\n<p>What&#8217;s that?  Al was spotted in parking lot?  Someone allowed him back into the country?  I thought that call to the TSA would be enough to keep him detained in the airport until the Con was over.  I guess not.  HE&#8217;S BACK!<\/p>\n<p>Once again, Al Strowger took the stage and led us in a game of Hacker Trivia.  Loosely based on Jeopardy!, this game quizzed the inebriated audience on the topics of: Movie Quotes, x86 instructions, other (hacker) conferences, math, 2009 tech, and ccTLD&#8217;s.  John &#8220;Math for 400&#8221; Davis took home first prize, an iTunes gift card.  Many other contestants won spot-prizes: hacking books, some new geek toys, donated &#8220;vintage&#8221; equipment, Vic Vandal&#8217;s old CarolinaCon 3 t-shirt, and lots of cupcakes.<\/p>\n<p>Good night everybody.  Sleep well, we&#8217;ll see you at 10am tomorrow morning!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The second day of CarolinaCon was packed from sunup to sundown &#8212; who am I kidding&#8230; hackers seldom rise before noon. \u00a0The festivities started at 10am. Hacking with the iPhone &#8211; snide No, not hacking the iPhone&#8230; but using the iPhone as a hacking tool. This talk was a good slide into the morning, a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,12],"tags":[],"class_list":["post-115","post","type-post","status-publish","format-standard","hentry","category-geek","category-security","count-0","even alt","author-alan","last"],"_links":{"self":[{"href":"https:\/\/alanporter.com\/blog\/wp-json\/wp\/v2\/posts\/115","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/alanporter.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/alanporter.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/alanporter.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/alanporter.com\/blog\/wp-json\/wp\/v2\/comments?post=115"}],"version-history":[{"count":0,"href":"https:\/\/alanporter.com\/blog\/wp-json\/wp\/v2\/posts\/115\/revisions"}],"wp:attachment":[{"href":"https:\/\/alanporter.com\/blog\/wp-json\/wp\/v2\/media?parent=115"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/alanporter.com\/blog\/wp-json\/wp\/v2\/categories?post=115"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/alanporter.com\/blog\/wp-json\/wp\/v2\/tags?post=115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}