| 
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • You already know Dokkio is an AI-powered assistant to organize & manage your digital files & messages. Very soon, Dokkio will support Outlook as well as One Drive. Check it out today!

View
 

activities

This version was saved 12 years, 1 month ago View current version     Page history
Saved by Ofer Rivlin
on February 15, 2012 at 4:50:17 pm
 

התכנית באי-כנס נקבעת כולה בידי המשתתפים (וזאת אומרת את/ה).

וכך מוסיפים פעילות שלך לתכנית:

האפשרות הפשוטה ביותר היא להוסיף שורה בטבלה בעמוד זה.

 

למתקדמים, ניתן גם ליצור דף חדש לפעילות, ולקשר אליו מדף הפעילויות.

 

ולמי שעדיין מתקשה - פשוט שילחו את תיאור הפעילות במייל לאיציק קוטלר,

והוא יוסיף עבורכם את הפעילות..

 

The program of an Un-Conference is set by its participants

meaning you

To add your new activity to the program,simply add a row to the table below.

 

Advanced users can also create a new page, and link to it

from the this page

 

If you're still having problems, just send your actiivty by email to

Itzik Kotler , and he will add the activity for you

 

Activities

 

Activity Name  Description  Activity Leader  Comments 
Build your own Fuzzer  Jump start your fuzzing experience by building your own fuzzer in your favourite language, though I am knowledgeable in Perl, Python, Ruby and C++, I can help you start building your own fuzzer in any other language you want (bash anyone?) Noam Rathaus 

Requirements:

1) A laptop (Linux preferred)

2) Some programming language (JavaScript will also do)

3) Some background knowledge of security, for example, read about Fuzzing, Vulnerabilities, etc

 

What you will get from the activity:
1) Knowledge of what fuzzer are about

2) You will be able to fuzz one or more products with what you built

3) You will be able to find a vulnerability in a product I will bring to the activity

 
 
 

 

הצפנה קיסרית תוך שיתוף מפתחות באלגוריתם דיפי-הלמן
הסבר קצר + הדגמה של שמוש באלגוריתם דיפי הלמן לצורך תיאום מפתחות להעברת מסר בהצפנה קיסרית
גיא דפני

1. הבנה בסיסית של עקרונות הצפנה - מה זה מפתח הצפנה סימטרי

2. הכרות בסיסית עם JavaScript - בשפה זו תהיה ההדגמה

Encryption is not security
Enterprise security fundamentals
Yuval Kashtan
Security by design, Networking issues, Authentication, Trust issues, infrastructure related issues and more
כספות קודגורו אקסטרים
נבנה "כספות" (שורדים בשפת סף) ונתרגל פריצה שלהן
עודד מרגלית
דרוש ידע בסיסי באסמבלי 8086
lecture about mobile security 

The lecture will enable a rare glimpse into the workings of hackers, when moving rapidly through a wide range of topics by using examples and stories of personal experience -
All in a wild and fun atmosphere but with a serious, in-depth and “out-of-the-box” perspective.

We will discuss and show updated android related attacks, reversing tools and malware analysis methodology, android internals and terminology, android forensics methdology and cool stuff you can do with your phone.

 
Elad Shapira  right now this is what i have in mind.  
Embedded Security - Security aspect inside embedded devices 

A fast lecture and a discussion (hopefully) about security aspects in embedded device, the lecture will include discussion regarding techniques used in their design, open source integration, outside vendors such as web servers infrastructures that may contain vulnerabilities that can be used by an attacker. 

Idan Livni   
Anonymous - you me and the APT?

The Anonymous movement is part of the modern globalization and hacktivism movements that have been making great progress around the world. More often than not though, in the recent month, the Anonymous brand has been used to lead and conduct "rogue" operations that may not fit within the "original" Anonymous concepts.

In this workshop we'll quickly go over a brief history of how Anonymous came to be, some of the activities associated with it, and will then spend some time creating an "op" for the unconference which will include a video message which will be anonymously uploaded to YouTube. Hopefully this will show modern media the ease of how such messages can be taken the wrong way, and why traditional journalistic integrity and fact checking is still needed (i.e. - "it was on the Internet, thus it must be true" does not cut it as journalistic work...)

Iftach Ian Amit  Participation is REQUIRED. An Anon video template, a laptop with a webcam and editing software are recommended. 
Live demo of a working botnet  I will demonstrate a working botnet, both from the victim's point of view (infected Windows PC, client side code injection, etc) and from the fraudster's point of view (exploit kit and botnet C&C panel, stolen data, screenshots from the victim's desktop, etc).  Uri Fleyder   
Threat Modeling - A practical approach 

presentation, examples and discussion

Ofer Rivlin   
       
       
       
       
       
       
       
       
       

 

 

 

 

 

 

 

Comments (0)

You don't have permission to comment on this page.