Your current filters are…
by Rob Gillen
In this session we'll discuss various wireless security techniques including common misconceptions and mis-configurations. We will demonstrate how easy it is to compromise even "secured" connections and what the implications are for you as an IT professional. Using free software and inexpensive hardware (~$30), we'll demonstrate a number of attacks and highlight the vulnerabilities that are present in the behavior of many wireless devices.
by Melinda Stephenson
Website security breaches have garnered a lot of attention recently. Two of the top vulnerabilities hackers are exploiting are Injection and Cross-Site Scripting. This session will discuss and demonstrate these vulnerabilities and various methods to address them. Attendees will leave with practical knowledge that they can apply immediately to improve website security.
by Rob Gillen
You've heard of "buffer overflows" and maybe you've even been the cause of a few, but do you understand why they are bad? Maybe you're a ".NET developer" and you've never really thought about them. In this session we'll discuss how attackers discover buffer overflows, how they interrogate them, and, finally, how they are exploited. We'll walk through a live demonstration from fuzzing through obtaining a remote shell. You'll leave with a better understanding of how they work, and why you should ensure your code is protected from them.
The best way to learn how to protect yourself is learn the techniques that will be used against you. This session is an intro to hacking using the tools that black-hat hackers use on a regular basis to detect and exploit vulnerabilities and how to protect yourself against them.
15th–16th June 2012