t2'15 | t2 infosec conference https://t2.fi Sun, 15 Apr 2018 22:10:30 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.5 https://t2.fi/wp-content/uploads/2020/07/cropped-t2_web-icon-32x32.png t2'15 | t2 infosec conference https://t2.fi 32 32 Physical Penetration Testing https://t2.fi/2018/04/16/physical-penetration-testing/ Sun, 15 Apr 2018 22:10:30 +0000 https://t2.fi/?p=1377 An audience favorite from the archives – Walter Belgers with “Physical Penetration Testing”. This a great example of a presentation, which hasn’t aged a day since as updates to physical security controls rarely happen at regular predefined intervals. In addition to being good fun, covert entry can also save time and effort if you happen …

The post Physical Penetration Testing first appeared on t2 infosec conference.]]>
An audience favorite from the archives – Walter Belgers with “Physical Penetration Testing”. This a great example of a presentation, which hasn’t aged a day since as updates to physical security controls rarely happen at regular predefined intervals. In addition to being good fun, covert entry can also save time and effort if you happen to *krhm* forget your keys.

The content was tailored to include material specific to Finland.  Impatient viewers just wanting to see the Abloy Classic lockpicking can start the video from 47:07. Those watching the presentation more carefully might notice the mention of a familiar name who presented at t2’17.

The post Physical Penetration Testing first appeared on t2 infosec conference.]]>
Cosmic Duke https://t2.fi/2017/09/10/cosmic-duke/ Sun, 10 Sep 2017 00:26:36 +0000 https://t2.fi/?p=1306 In this video from t2’15 Artturi Lehtiö peers inside over 7 years of state sponsored malware operations. The presentation covers themes such as less glamorous side of APT research, tools and approaches, in addition to the challenges related to publishing this type of information. Those into offensive work can view the video as training material …

The post Cosmic Duke first appeared on t2 infosec conference.]]>
In this video from t2’15 Artturi Lehtiö peers inside over 7 years of state sponsored malware operations. The presentation covers themes such as less glamorous side of APT research, tools and approaches, in addition to the challenges related to publishing this type of information.

Those into offensive work can view the video as training material for improving tradecraft.

For additional information on the subject, here are the links for the whitepapers mentioned during the talk.

The post Cosmic Duke first appeared on t2 infosec conference.]]>
Physical Side-Channel Attacks on PCs https://t2.fi/2017/09/03/physical-side-channel-attacks-on-pcs/ Sun, 03 Sep 2017 20:19:21 +0000 https://t2.fi/?p=1276 A great way to steal someone’s secrets is often just listening carefully enough. At t2’15  Lev Pachmanov, Daniel Genkin, Itamar Pipman and Eran Tromer from Tel Aviv University demonstrated in practice how sensitive information can be pilfered with a sausage (or a Pita bread, if you’re vegetarian). In all seriousness, this has to be one of …

The post Physical Side-Channel Attacks on PCs first appeared on t2 infosec conference.]]>
A great way to steal someone’s secrets is often just listening carefully enough. At t2’15  Lev Pachmanov, Daniel Genkin, Itamar Pipman and Eran Tromer from Tel Aviv University demonstrated in practice how sensitive information can be pilfered with a sausage (or a Pita bread, if you’re vegetarian). In all seriousness, this has to be one of the funniest publicly delivered presentations on gathering electromagnetic emanations.

Whether you are into emission security or collecting signals intelligence, we’re sure you will enjoy this talk.

The post Physical Side-Channel Attacks on PCs first appeared on t2 infosec conference.]]>
Forging the USB Armory https://t2.fi/2017/05/05/forging-the-usb-armory/ Thu, 04 May 2017 22:29:32 +0000 https://t2.fi/?p=1177 We’re continuing with the theme of securing international travel by releasing Andrea Barisani‘s Forging the USB Armory talk from t2’15. Those enjoying international travel and/or operational situations, the dual-use capabilities of the platform might be something of interest. From safe USB charger, encrypted file storage and automated self-destruct, password manager, TOR access point to portable offensive …

The post Forging the USB Armory first appeared on t2 infosec conference.]]>
We’re continuing with the theme of securing international travel by releasing Andrea Barisani‘s Forging the USB Armory talk from t2’15.

Those enjoying international travel and/or operational situations, the dual-use capabilities of the platform might be something of interest. From safe USB charger, encrypted file storage and automated self-destruct, password manager, TOR access point to portable offensive toolkit, the opportunities are endless. Even if open source hardware design is outside your comfort zone, the video gives you a good glimpse into solving hard problems and the capabilities of USB Armory.

Again, as with all our curated releases, this is a must see – enjoy!

The code is available on GitHub, slides here and INTERLOCK code here.

The post Forging the USB Armory first appeared on t2 infosec conference.]]>
Building a Reasonably Safe Travel Burner Laptop https://t2.fi/2017/04/20/building-a-reasonably-safe-travel-burner-laptop/ Thu, 20 Apr 2017 20:00:59 +0000 https://t2.fi/?p=1160 International travel can be difficult, and for a security conscious person especially so. In this video from t2’15 Georg Wicherski demonstrates a way of solving many problems related to carrying a personal computing device with you. For a person crossing borders on a regular basis or otherwise in need of heightened security for their laptop, …

The post Building a Reasonably Safe Travel Burner Laptop first appeared on t2 infosec conference.]]>
International travel can be difficult, and for a security conscious person especially so.

In this video from t2’15 Georg Wicherski demonstrates a way of solving many problems related to carrying a personal computing device with you. For a person crossing borders on a regular basis or otherwise in need of heightened security for their laptop, this is a must see. Enjoy!

Do note that this has been actually implemented in practice instead of being just intellectual mastu^H^H^H a mental exercise. For more details about the setup, refer to the GitHub repository. The setup has been since updated to support TPM remote attestation.

The post Building a Reasonably Safe Travel Burner Laptop first appeared on t2 infosec conference.]]>
If Attackers Can Use Graphs, Then Why Can’t We? https://t2.fi/2017/04/11/if-attackers-can-use-graphs/ Mon, 10 Apr 2017 21:20:55 +0000 https://t2.fi/?p=1140 Those in the business of securing enterprises and organizations should definitely watch OlleB‘s presentation from t2’15. Moving from point-in-time <insert-product-name-here> scans to a more structured approach using graphs, attack models, understanding and eradicating vulnerability classes or using safety/assurance cases is a long-term security investment. Taking your defensive game to the next level requires trying out …

The post If Attackers Can Use Graphs, Then Why Can’t We? first appeared on t2 infosec conference.]]>
Those in the business of securing enterprises and organizations should definitely watch OlleB‘s presentation from t2’15. Moving from point-in-time <insert-product-name-here> scans to a more structured approach using graphs, attack models, understanding and eradicating vulnerability classes or using safety/assurance cases is a long-term security investment.

Taking your defensive game to the next level requires trying out new approaches to old problems and sometimes challenging the conventional wisdom. This video should give you food for thought – it’s one of our favorites!

The post If Attackers Can Use Graphs, Then Why Can’t We? first appeared on t2 infosec conference.]]>
t2’15 Challenge Solution https://t2.fi/2015/12/20/t215-challenge-solution/ Sun, 20 Dec 2015 19:34:58 +0000 http://t2.fi/?p=909 In real life, technical superiority is one thing and an ability to present your work is another. So, without further ado – best write-up for t2’15 Challenge: Solving the t2’15 Challenge – Juha Kivekäs Merry Christmas and Happy New Year!

The post t2’15 Challenge Solution first appeared on t2 infosec conference.]]>
In real life, technical superiority is one thing and an ability to present your work is another.

So, without further ado – best write-up for t2’15 Challenge:

Merry Christmas and Happy New Year!

The post t2’15 Challenge Solution first appeared on t2 infosec conference.]]>
t2’15 is over – Thank You! https://t2.fi/2015/10/31/t215-is-over-thank-you/ Sat, 31 Oct 2015 17:03:41 +0000 http://t2.fi/?p=901 To all those who contributed to the conference either as an attendee or as a speaker: Thank You! If you have any questions/comments/feedback please let us know – we would love to make the con even better.

The post t2’15 is over – Thank You! first appeared on t2 infosec conference.]]>
To all those who contributed to the conference either as an attendee or as a speaker: Thank You!

If you have any questions/comments/feedback please let us know – we would love to make the con even better.

The post t2’15 is over – Thank You! first appeared on t2 infosec conference.]]>
t2’15 Challenge winners https://t2.fi/2015/10/24/t215-challenge-winners/ Sat, 24 Oct 2015 17:41:22 +0000 http://t2.fi/?p=896 Richard Baranyi (Crypto wizard23) from Slovakia was the first one to solve the t2’15 Challenge. Well done! Congratulations! The elegant write-up trophy goes to Juha Kivekäs, Finland. His write-up will be published soon so you’ll have a change to evaluate the submission yourself. Congratulations to both winners! We would also like to thank each one of you who participated. …

The post t2’15 Challenge winners first appeared on t2 infosec conference.]]>
Richard Baranyi (Crypto wizard23) from Slovakia was the first one to solve the t2’15 Challenge. Well done! Congratulations!

The elegant write-up trophy goes to Juha Kivekäs, Finland. His write-up will be published soon so you’ll have a change to evaluate the submission yourself.

Congratulations to both winners! We would also like to thank each one of you who participated. Last but not least. if you have an interesting idea for t2’16 Challenge, please let us know – authors get a free admission to the conference among other perks 😉

The post t2’15 Challenge winners first appeared on t2 infosec conference.]]>
t2’15 Schedule now available in RSS and ICS formats https://t2.fi/2015/10/24/t215-schedule-now-available-in-rss-and-ics-formats/ Sat, 24 Oct 2015 17:29:05 +0000 http://t2.fi/?p=894 This is just a quick note to let you know that the schedule for t2’15 is now available in RSS and ICS formats.

The post t2’15 Schedule now available in RSS and ICS formats first appeared on t2 infosec conference.]]>
This is just a quick note to let you know that the schedule for t2’15 is now available in RSS and ICS formats.

The post t2’15 Schedule now available in RSS and ICS formats first appeared on t2 infosec conference.]]>