cosin-fahrplan/schedules/2008/track/Technology/2635.de.html

167 lines
5.3 KiB
HTML
Raw Permalink Normal View History

2024-04-07 00:57:09 +02:00
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8"/>
<meta name="generator" content="Pentabarf"/>
<meta name="DC.date" content="2009-02-26"/>
<title>Cosin08: The End of the Internet</title>
<link type="text/css" href="../../style.css" media="screen,print" rel="Stylesheet"/>
</head>
<body>
<div class="noprint" id="conference-logo">
<a href="http://cosin.chaostreff.ch">
<img alt="Chaos Singularity 2008" src="../../image/conference/55.128x128.png"/>
</a>
</div>
<div class="noprint" id="menu">
<ul>
<li>
<a href="../../index.de.html">
<span class="normal">Index</span>
</a>
</li>
<li>
<a href="../../day/2008-07-04.de.html">
<span class="normal">Freitag (2008-07-04)</span>
</a>
</li>
<li>
<a href="../../day/2008-07-05.de.html">
<span class="normal">Samstag (2008-07-05)</span>
</a>
</li>
<li>
<a href="../../day/2008-07-06.de.html">
<span class="normal">Sonntag (2008-07-06)</span>
</a>
</li>
<li>
<a href="../../speakers.de.html">
<span class="normal">Referenten</span>
</a>
</li>
<li>
<a href="../../events.de.html">
<span class="normal">Veranstaltungen</span>
</a>
</li>
<li>
<ul class="track">
<li class="track-assorted">
<a href="../Assorted/index.de.html">
<span class="normal">Assorted</span>
</a>
</li>
<li class="track-politics">
<a href="../Politics/index.de.html">
<span class="normal">Politics</span>
</a>
</li>
<li class="track-technology">
<a href="index.de.html">
<span class="normal">Technology</span>
</a>
</li>
</ul>
</li>
</ul>
</div>
<div id="content">
<p class="release">Cosin08 - 0.42</p>
<p class="intro">
<strong>Chaos Singularity 2008</strong>
<br/>
<em></em>
</p>
<div class="section" id="event">
<div id="infobox">
<table>
<tr>
<th colspan="2">Referenten</th>
</tr>
<tr>
<td>
<a href="../../speaker/1966.de.html">
<img width="32" height="32" src="../../image/person/1966.32x32.png"/>
</a>
</td>
<td>
<a href="../../speaker/1966.de.html">naxxatoe</a>
</td>
</tr>
</table>
<table>
<tr>
<th colspan="2">Programm</th>
</tr>
<tr>
<td class="keyword">Tag</td>
<td class="value">Samstag (2008-07-05)</td>
</tr>
<tr>
<td class="keyword">Raum</td>
<td class="value location">Konzertbar</td>
</tr>
<tr>
<td class="keyword">Beginn</td>
<td class="value dtstart" title="2009-02-26T15:00:00+01:00">15:00</td>
</tr>
<tr>
<td class="keyword">Dauer</td>
<td class="value duration" title="P00H45M00S">00:45</td>
</tr>
<tr>
<th colspan="2">Info</th>
</tr>
<tr>
<td class="keyword">ID</td>
<td class="value" title="2635@Cosin08@pentabarf.org">2635</td>
</tr>
<tr>
<td class="keyword">Veranstaltungstyp</td>
<td class="value">lecture</td>
</tr>
<tr>
<td class="keyword">Track</td>
<td class="value">Technology</td>
</tr>
<tr>
<td class="keyword">Sprache der Veranstaltung</td>
<td class="value">en</td>
</tr>
</table>
</div>
<h1 class="title">The End of the Internet</h1>
<p class="subtitle">Self replicating malware on home routers</p>
<img class="event-image" src="../../image/event/2635.128x128.png"/>
<div class="abstract">
<p>This talk is about devices that almost everybody has in their homes and
offices. So called Soho (Small home and office) routers have become extremely
popular in the last few years. While the good guys where busy trying to prevent
malware from infiltrating their desktop systems, the bad guys had gone one step
ahead of the game and started to experiment with these devices.</p> </div>
<div class="description">
<p>Close to nobody pays attention to the security of their routers and why should
they. These mystical devices have always been protected through security by
obscurity. This Talk is not about how to reverse engineer routers, or how to
get the best possible security out of the original firmware. This is the real
stuff. Participants will learn the fundamental basics how routers can be taken
over. After a few practical examples we will then move into the field of
malware -- self spreading of course. This talk will give the participants not
only a fundamental knowledge of Soho router hacking, but also a idea about
future threats and the ongoing research in this very interesting field of it
security. Some of this may be considered 'bleeding edge' <em>grin</em>.</p> </div>
<div id="navigation">
<a href="2619.de.html">
<span class="previous" title="Software Radios with GNU Radio">&lt;&lt;&lt;</span>
</a>
<a href="2543.de.html">
<span class="next" title="Using git">&gt;&gt;&gt;</span>
</a>
</div>
</div>
</div>
</body>
</html>