Skip to main content

HITB

#HITB2017AMS Talks Have Been Announced and They Look Awesome!

posted onJanuary 20, 2017
by l33tdawg

The agenda for talks at this year's HITB Security Conference in Amsterdam have been announced! Taking place on the 13th and 14th of April, the conference is packed as always with a wide range of talks covering everything from attacks against medical devices to hands-on sessions on using machine learning for security applications to malicious document analysis and attacking Bluetooth locks!

Hacking mobile login tokens tricky but doable, says reverse-engineer

posted onSeptember 3, 2016
by l33tdawg

L33tdawg: The slides and whitepaper from Bernhard's #HITBGSEC talk is available here: http://gsec.hitb.org/sg2016/sessions/attacking-software-tokens/

Mobile apps that generate on-screen tokens for two-factor authentication can be examined and cloned by malware, a security researcher warns.

Fraudsters and crooks can take these clones and generate the codes necessary to login into bank accounts and other online services as their victims.

VIDEO: #HITB2016AMS Forging a Wireless Time Signal to Attack NTP Servers

posted onJuly 5, 2016
by l33tdawg

Radio timing service, such as GPS, BPC, JJY, WWVB, DCF77, WWVH have been widely used as a basic time source for industry or individual systems. These signals are used by millions of people to synchronize consumer electronic products like wall clocks, clock radios, and wristwatches. NTP sever also use these signals to get a precise time.

VIDEO: Forcing A Targeted LTE Cellphone Into An Eavesdropping Network

posted onJune 23, 2016
by l33tdawg

LTE is a more advanced mobile network but not absolutely secure.

In this presentation, we will introduce a method which jointly exploits the vulnerabilities in tracking area update procedure, attach procedure, and RRC redirection procedure in LTE networks resulting in the ability to force a targeted LTE cellphone to downgrade into a malicious GSM network where an attacker can subsequently eavesdrop its voice calls and GPRS data.

VIDEO: Exploit Kits: Hunting The Hunters

posted onJune 22, 2016
by l33tdawg

Exploit kits are one of the threats that is ever present on the Internet. Indiscriminately compromising users that are simply surfing websites. As ransomware has exploded so has the proliferation of these exploit kits. This combination of ransomware, tor, and bitcoin has created a financially lucrative monster.