<?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"/> <meta name="generator" content="Pentabarf"/> <meta name="DC.date" content="2009-02-26"/> <title>Cosin08: The End of the Internet</title> <link type="text/css" href="../style.css" media="screen,print" rel="Stylesheet"/> </head> <body> <div class="noprint" id="conference-logo"> <a href="http://cosin.chaostreff.ch"> <img alt="Chaos Singularity 2008" src="../image/conference/55.128x128.png"/> </a> </div> <div class="noprint" id="menu"> <ul> <li> <a href="../index.de.html"> <span class="normal">Index</span> </a> </li> <li> <a href="../day/2008-07-04.de.html"> <span class="normal">Freitag (2008-07-04)</span> </a> </li> <li> <a href="../day/2008-07-05.de.html"> <span class="normal">Samstag (2008-07-05)</span> </a> </li> <li> <a href="../day/2008-07-06.de.html"> <span class="normal">Sonntag (2008-07-06)</span> </a> </li> <li> <a href="../speakers.de.html"> <span class="normal">Referenten</span> </a> </li> <li> <a href="../events.de.html"> <span class="normal">Veranstaltungen</span> </a> </li> <li> <ul class="track"> <li class="track-assorted"> <a href="../track/Assorted/index.de.html"> <span class="normal">Assorted</span> </a> </li> <li class="track-politics"> <a href="../track/Politics/index.de.html"> <span class="normal">Politics</span> </a> </li> <li class="track-technology"> <a href="../track/Technology/index.de.html"> <span class="normal">Technology</span> </a> </li> </ul> </li> </ul> </div> <div id="content"> <p class="release">Cosin08 - 0.42</p> <p class="intro"> <strong>Chaos Singularity 2008</strong> <br/> <em></em> </p> <div class="section vevent" id="event"> <div id="infobox"> <table> <tr> <th colspan="2">Referenten</th> </tr> <tr> <td> <a href="../speaker/1966.de.html"> <img width="32" height="32" src="../image/person/1966.32x32.png"/> </a> </td> <td> <a href="../speaker/1966.de.html">naxxatoe</a> </td> </tr> </table> <table> <tr> <th colspan="2">Programm</th> </tr> <tr> <td class="keyword">Tag</td> <td class="value">Samstag (2008-07-05)</td> </tr> <tr> <td class="keyword">Raum</td> <td class="value location">Konzertbar</td> </tr> <tr> <td class="keyword">Beginn</td> <td class="value dtstart" title="2009-02-26T15:00:00+01:00">15:00</td> </tr> <tr> <td class="keyword">Dauer</td> <td class="value duration" title="P00H45M00S">00:45</td> </tr> <tr> <th colspan="2">Info</th> </tr> <tr> <td class="keyword">ID</td> <td class="value" title="2635@Cosin08@pentabarf.org">2635</td> </tr> <tr> <td class="keyword">Veranstaltungstyp</td> <td class="value">lecture</td> </tr> <tr> <td class="keyword">Track</td> <td class="value">Technology</td> </tr> <tr> <td class="keyword">Sprache der Veranstaltung</td> <td class="value">en</td> </tr> </table> </div> <h1 class="title summary">The End of the Internet</h1> <p class="subtitle">Self replicating malware on home routers</p> <img class="event-image" src="../image/event/2635.128x128.png"/> <div class="abstract"> <p>This talk is about devices that almost everybody has in their homes and offices. So called Soho (Small home and office) routers have become extremely popular in the last few years. While the good guys where busy trying to prevent malware from infiltrating their desktop systems, the bad guys had gone one step ahead of the game and started to experiment with these devices.</p> </div> <div class="description"> <p>Close to nobody pays attention to the security of their routers and why should they. These mystical devices have always been protected through security by obscurity. This Talk is not about how to reverse engineer routers, or how to get the best possible security out of the original firmware. This is the real stuff. Participants will learn the fundamental basics how routers can be taken over. After a few practical examples we will then move into the field of malware -- self spreading of course. This talk will give the participants not only a fundamental knowledge of Soho router hacking, but also a idea about future threats and the ongoing research in this very interesting field of it security. Some of this may be considered 'bleeding edge' <em>grin</em>.</p> </div> <div id="navigation"> <a href="2513.de.html"> <span class="previous" title="Suspect Nation"><<<</span> </a> <a href="2543.de.html"> <span class="next" title="Using git">>>></span> </a> </div> </div> </div> </body> </html>