Skip to main content

hitb2016ams

Fear My $50 Charger, For It Controls Your Android Phone's Keyboard

posted onJuly 14, 2016
by l33tdawg

Take note: if I ever proposition you with some free mobile juice via a portable charger, don’t accept.

Over the last month, I’ve created chargers that try to brute force open Android phones by guessing the passcode. Then, with a handy bluetooth chip hidden inside, they let me control the compromised phone’s keyboard from my own Android.

VIDEO: #HITB2016AMS Forging a Wireless Time Signal to Attack NTP Servers

posted onJuly 5, 2016
by l33tdawg

Radio timing service, such as GPS, BPC, JJY, WWVB, DCF77, WWVH have been widely used as a basic time source for industry or individual systems. These signals are used by millions of people to synchronize consumer electronic products like wall clocks, clock radios, and wristwatches. NTP sever also use these signals to get a precise time.

VIDEO: Forcing A Targeted LTE Cellphone Into An Eavesdropping Network

posted onJune 23, 2016
by l33tdawg

LTE is a more advanced mobile network but not absolutely secure.

In this presentation, we will introduce a method which jointly exploits the vulnerabilities in tracking area update procedure, attach procedure, and RRC redirection procedure in LTE networks resulting in the ability to force a targeted LTE cellphone to downgrade into a malicious GSM network where an attacker can subsequently eavesdrop its voice calls and GPRS data.

VIDEO: Exploit Kits: Hunting The Hunters

posted onJune 22, 2016
by l33tdawg

Exploit kits are one of the threats that is ever present on the Internet. Indiscriminately compromising users that are simply surfing websites. As ransomware has exploded so has the proliferation of these exploit kits. This combination of ransomware, tor, and bitcoin has created a financially lucrative monster.

#HITB2016AMS Video - Beyond FBI vs Apple: What's Next For The Crypto Wars?

posted onJune 20, 2016
by l33tdawg

In a world where governments are demanding exceptional (and unprecedented) access to systems under the guise of national security and the looming specter of terrorism, recent events have resurfaced the conflict between privacy and security. While some believe this to be a new battle of the Internet age, it’s just a continuation of the unending crypto war between technologists and law enforcement.