cosin-fahrplan/schedules/2009/event/3188.en.html

180 lines
5.5 KiB
HTML
Raw Normal View History

2024-04-07 00:57:09 +02:00
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8"/>
<meta name="generator" content="Pentabarf"/>
<meta name="DC.date" content="2009-07-09"/>
<title>Cosin09: Malware for Soho Routers</title>
<link type="text/css" media="screen,print" href="../style.css" rel="Stylesheet"/>
</head>
<body>
<div class="noprint" id="conference-logo">
<a href="http://cosin.ch">
<img alt="Cosin 2009" src="../image/conference/65.128x128.png"/>
</a>
</div>
<div class="noprint" id="menu">
<ul>
<li>
<a href="https://cccv.pentabarf.org/schedule/Cosin09">
<span class="normal">Index</span>
</a>
</li>
<li>
<a href="../day/2009-07-10.en.html">
<span class="normal">Freitag - 2009-07-10</span>
</a>
</li>
<li>
<a href="../day/2009-07-11.en.html">
<span class="normal">Samstag - 2009-07-11</span>
</a>
</li>
<li>
<a href="../day/2009-07-12.en.html">
<span class="normal">Sonntag - 2009-07-12</span>
</a>
</li>
<li>
<a href="../speakers.en.html">
<span class="normal">Speakers</span>
</a>
</li>
<li>
<a href="../events.en.html">
<span class="normal">Events</span>
</a>
</li>
<li>
<ul class="track">
<li class="track-assorted">
<a href="../track/Assorted/index.en.html">
<span class="normal">Assorted</span>
</a>
</li>
<li class="track-politics">
<a href="../track/Politics/index.en.html">
<span class="normal">Politics</span>
</a>
</li>
<li class="track-technology">
<a href="../track/Technology/index.en.html">
<span class="normal">Technology</span>
</a>
</li>
</ul>
</li>
</ul>
</div>
<div id="content">
<p class="release">Cosin09 - 1.2</p>
<p class="intro">
<strong>Cosin 2009</strong>
<br/>
<em>Chaos Singularity 2009</em>
</p>
<div class="section vevent" id="event">
<div id="infobox">
<table>
<tr>
<th colspan="2">Speakers</th>
</tr>
<tr>
<td>
<a href="../speaker/1966.en.html">
<img width="32" height="32" src="../image/person/1966.32x32.png"/>
</a>
</td>
<td>
<a href="../speaker/1966.en.html">naxxatoe</a>
</td>
</tr>
</table>
<table>
<tr>
<th colspan="2">Schedule</th>
</tr>
<tr>
<td class="keyword">Day</td>
<td class="value">Samstag - 2009-07-11</td>
</tr>
<tr>
<td class="keyword">Room</td>
<td class="value location">Dachstock</td>
</tr>
<tr>
<td class="keyword">Start time</td>
<td class="value dtstart" title="2009-07-09T20:00:00+02:00">20:00</td>
</tr>
<tr>
<td class="keyword">Duration</td>
<td class="value duration" title="P00H45M00S">00:45</td>
</tr>
<tr>
<th colspan="2">Info</th>
</tr>
<tr>
<td class="keyword">ID</td>
<td class="value" title="3188@Cosin09@pentabarf.org">3188</td>
</tr>
<tr>
<td class="keyword">Event type</td>
<td class="value">Lecture</td>
</tr>
<tr>
<td class="keyword">Track</td>
<td class="value">Technology</td>
</tr>
<tr>
<td class="keyword">Language used for presentation</td>
<td class="value">English</td>
</tr>
</table>
</div>
<h1 class="title summary">Malware for Soho Routers</h1>
<p class="subtitle">the war has begun</p>
<img class="event-image" src="../image/event/3188.128x128.png"/>
<div class="abstract">
<p>see descripton</p> </div>
<div class="description">
<p>Malware for soho routers has been a hot topic thru-out the last year and to this day
the trend continues. With new super worms like psyb0t and other yet unnamed fears on the rise, we will take a close look at the current
situation and discuss the things to come.</p>
<p>So called Soho (Small home and office) routers have become extremely popular in
the last few years. While the good guys where busy trying to prevent malware from
infiltrating their desktop systems, the bad guys had gone one step ahead of the
game and started to experiment with these devices.
With new possible cyber threads emerging from the web every day, this is your
chance to gain the necessary knowledge to protect yourself and your business.</p>
<p>Participants will learn the fundamental basics how routers can be taken over. After
a few practical examples we will then move into the field of malware.
You will not only gain the basic knowlege of router hacking and a bit of knowledge
about malware here. This is the real stuff, detailed analysis of current threads,
counter measures and a lot of cool shit. </p> </div>
<div class="links">
<h2>Links</h2>
<ul>
<li>
<a href="http://nicenamecrew.com" rel="bookmark">NNC Security Research</a>
</li>
<li>
<a href="http://naxxatoe.com" rel="bookmark">Naxxatoe's online VCard</a>
</li>
</ul>
</div>
<div id="navigation">
<a href="3275.en.html">
<span class="previous" title="Linux Shell Workshop / Austausch">&lt;&lt;&lt;</span>
</a>
<a href="3280.en.html">
<span class="next" title="meta programming language">&gt;&gt;&gt;</span>
</a>
</div>
</div>
</div>
</body>
</html>