ShmooCon 2008 Feb. 15, 2008 to Feb. 17, 2008, Washington DC, USA

Event Page

Notes : Data extracted from web archives

Tell us about missing data
Title Speakers Summary Topic Types
Keynote Edward W. Felten Security Keynote
Sipping Your Network Humberto J. Abdelnur , Radu State , Olivier Festor In this talk we will describe briefly a state of the art in current VoIP ... Security Fuzzing
Vulncatcher: Fun With Vtrace And Programmatic Debugging Atlas Many hours are spent researching vulnerabilities in proprietary and open source software for each bug ... Security Unix
They’Re Hacking Our Clients! Why Are We Focusing Only On The Servers? Jay Beale In the face of far stronger firewall and IPS-protected perimeters, attackers are compromising far more ... Security Web Firewall
When Lawyers Attack! - Dealing With The New Rules Of Electronic Discover John ( jur1st ) Benson The legal community is slowly accepting that the changes to the Federal rules which change ... Security Community Legal Compliance
Tl1 Device Security Rachel K. Bicknell Every SONET, TDM and optical device manufacturer uses the TL1 language as its management protocol ... Security
Active 802.11 Fingerpinting: Gibberish And “Secret Handshakes” To Know Your Ap Sergey Bratus , Cory Corneilius , Daniel Peebles Wireless devices that speak 802.11b/g differ, among other things, in their responses to non-standard and ... Security
Climbing Everest: An Inside Look At Voting Systems Used By The State Of Ohio Sandy Clark , Eric Cronin , Gaurav Shah , Micah Sherr , Pavol Cerny , Adam Aviv , Matt Blaze Hanging Chads, Hopping votes, Flipped votes, Tripled votes, Missing memory cards, Machine malfunctions, Software glitches, ... Security Infrastructure Analysis
Path X: Explosive Security Testing Tools Using Xpath Andre Gironda , Marcin Stracener This talk will cover what XPath is, how it is used to parse XML in ... Security Testing
Got Citrix? Hack It! Shanit Gupta Citrix is a widely used remote desktop application utilized in many major corporations around the ... Security Development
A Hacker Looks Past 50 G. Mark Hardy "But wait... there’s MORE!" Last year, G. Mark provided an entertaining look at hacking in ... Security
Intercepting Mobile Phone/Gsm Traffic David Hulton This talk is about GSM security. We will explain the security, technology and protocols of ... Security Monitoring
Why Are Databases So Hard To Secure Sheeri Kritzer Cabral In "Why are Databases So Hard To Secure", noted DBA Sheeri Kritzer Cabral discusses how ... Security Risk
Hacking Windows Vista Dan Griffin "Hacking Windows Vista" will demo various security tools I’ve been working on, addressing both attack ... Security Development Testing
Web Portals, Gateway To Information Or A Hole In Our Perimeter Defenses Deral Heiland If web portals can be used to aggregate information and resources from multiple locations, and ... Security Web
Forced Internet Condom Aaron Fuentes In a former life, Aaron Higbee and Jaime Fuentes, served as network abuse administrators for ... Security Risk
Hacking The Samurai Spirit Isaac Mathis This presentation hopes to shed some light into the not so well-known Japanese security scene. ... Security
Virtual Worlds - Real Exploits Charlie Miller , Dino Dai Zovi Virtual worlds serve as a new way to deliver exploits to the masses. Besides traditional ... Security Wireless
Flash Drives & Solid State Drives Data Recovery Comparison To Hard Drives: Animated! Scott Moulton ANIMATIONS Again! As we are all aware, solid state hard drives are going to overtake ... Security Forensics
Legal Issues For Bot-Net Researches And Mitigators Alexander Muentz Botnet research, mitigation and the law. Botnets are not only a novel technical problem to ... Security Legal
Practical Hacker Crypto Simple Nomad Encryption is one of those things everyone should be doing, and no one seems to ... Security Anonymity Privacy
New Countermeasures To The Bump Key Attack Deviant Ollam If you haven’t yet heard of the physical security risk known as "bump keying" there’s ... Security Others Risk
Voip Penetration Testing: Lessons Learned Jason Kindervag This session will explore a Case Study of a successful VoIP penetration test. A publicly ... Security Access
Baked Not Fired: Performing An Unauthorized Phishing Awareness Exercise. Syn Phishus This talk will illustrate how, without getting fired, to perform an unauthorized internal phishing exercise ... Security Phishing
On The Social Responsibility Of Hackers Simple Nomad , Johnny Long , Bruce Potter , Rick Dakan , Tbd What good is a hacker? Hell, what is a hacker? Over the years the hacker ... Security Wireless Panel Privacy Community
Malware Software Armoring Circumvention Danny Valsmith Software armoring techniques have increasingly created problems for reverse engineers and software security analysts. As ... Security Malware
How Do I Pwn Thee? Let Me Count The Ways Renderman The wonders of technology have given rise to a new breed of workforce, the mobile ... Security Business
Advanced Protocol Fuzzing - What We Learned When Bringing Layer2 Logic To Spike Land Daniel Mende , Enno Rey The talk is based on a research project whose goal was to evaluate the security ... Security Fuzzing
The Geek And The Gumshoe Or Can Mathematics And Computers Really Solve Crimes? Michael Thornton Twelve million people tune in every Friday night to catch the latest episode of NUMB3RS, ... Security Wireless Analysis
I Will Be Your Eyes And Hands: Colossal Cave, Adventure, And Reality Jason Scott During the process of filming his documentary on text adventures, GET LAMP, Jason Scott decided ... Security
Using Aspect Oriented Programming To Prevent Application Attacks Rohit Bhalla In this talk we will learn how to take existing code and add: -Input validation ... Security Web
Forensic Image Analysis For Password Recovery David C. Smith Last year I overheard a conversation about passwords being recovered from forensic images by searching ... Security Analysis
21St Century Shellcode For Solaris Tim Vidas Solaris shellcode has not really been publicly re-visited in > 5 years. Unlike most *nix ... Security Forensics
Smarter Password Cracking Matt Glodek Password cracking usually is portrayed as some arcane art read from a voodoo cookbook. Start ... Security Wireless Forensics
You Must Be This Tall To Ride The Security Ride Joel Caro Unless your organization is big enough (i.e. with enough budget to pay for and resource ... Security
Passive Host Characterization Matthew Wollenweber Passive Host Characterization is technology similar to IDS systems, but with several distinctions. The basic ... Security Testing
Peap: Pwned Extensible Authentication Protocol Josh Antoniewicz WiFi networks leverage various EAP types to authenticate wireless users. Many of these EAP installations ... Security Wireless