This is a quick note to let you know that T2´08 Challenge will be published 2008-09-06 10:00 EEST here at: http://www.t2.fi/
For more information about the Challenge and its history please see: http://www.t2.fi/challenge/
This is a quick note to let you know that T2´08 Challenge will be published 2008-09-06 10:00 EEST here at: http://www.t2.fi/
For more information about the Challenge and its history please see: http://www.t2.fi/challenge/
As you might have noticed the schedule for T2´08 was already published a while ago. However, we’ve received such an unusual submission that we have decided to include it to the schedule. Effectively this means that we have replaced the second part of “Iceberg Incorporated – A Peek Under the Surface of the Criminal Enterprise” with this new talk. And now about this new talk …
Jack C. Louis and Robert E. Lee from Outpost24 will divulge new technical details about TCP state table manipulation vulnerabilities that affect availability.
Specifically this talk will showcase new attacks that will render a remote system unavailable using a very low bandwidth attack stream. Attacks against Windows, BSD, Linux, and embedded systems TCP/IP stack implementations will be discussed and demonstrated.
Please see the schedule for details.
This is just a quick note to let you know that we have updated the schedule to include more information about the talks and speakers.
We have received quite many emails asking whether we will publish T2´08 Challenge or not. The answer is yes – there will be a Challenge. We are going to have a very interesting Challenge this year 🙂
Stay tuned!
(Never heard about the Challenge? Check it out!)
The schedule for T2´08 has been published. We might sound like a broken record but T2 staff thinks that we have extremely good program for this year.
We would also like to thank all the people that sent in their talk proposals. Please remember that even if your presentation did not get approved it does not mean that we did not want it. In order to have an interesting event we try our best to make sure that the program has “something for everyone”.
Please see the schedule for details.
TiAMO from the Pirate Bay and OlleB from Toolcrypt will be talking about encrypting the Internet. The talk will describe the events that lead TiAMO to start the project, the rationale for bringing yet another network encryption protocol into the world and the gory technical details of the proposal that caused much debate on the Internet.
Please see the schedule for details.
Jarno Niemelä from F-Secure will be talking about mobile device analysis. The talk contains several hands on demos on how to investigate various phones with tools that are freely available over the internet.
Please see the schedule for details.
Peter Kruse from CSIS will be talking about eCrime and Anti-phishing. The presentation will cover how certain groups operate and what kind of tools they use.
Please see the schedule for details.
Adam Laurie will be talking about RFID security. The talk will present a roundup of attacks against RFID door entry systems, passports, human implants etc., including demonstrations and details of methods and tools used.
Please see the schedule for details.
Kimmo Kasslin from F-Secure will be talking about the evolution of Kernel-Mode Malware. Full-Kernel malware has lately entered the scene and this presentation will cover the most important developments with practical examples.
Please see the schedule for details.