- Security specialist, still in the army. Caught and investigated. See last "documented hack".
+ guests from Israeli authorities
Panel 2 - Full disclosure
should information be restricted?
can information be restricted?
Oren Tirosh - Imagineer and entrepreneur
Haim Ravia - Lawyer specializing in cyber law - www.law.co.il
and guests from Israeli Police
Panel 3-Blue Box vs. Mobile hacking
John Draper (Cap'n Crunch)
Alan Bishoff - PacketStorm/Securify
This forum will discuss and examine the historical progression of
the "Blue box" technology, and it's race with the newer enhancements
to "in-band" (TONE) signalling. Will cover some historical aspects of
the early R2 signalling, covering lightly into the C5 methods in use
today.
The second part will focus on Mobile hacking, and some of the
trends, but will be less technical then the earlier sections.
PCS and GSM systems will be discussed in general. Also, the technology of Stacking Tandoms, and Guard banding that makes it possible.
Panel 4 - Y2sKan
Survey results of the Israeli auditing project
Neora, Oren Tirosh, Liraz Siri
The entire IP address space of Israel was scanned as part of a security survey. The automatic scanner performing the survey detected the presence of several well-known security vulnerabilities. Detected vulnerabilities were not exploited in any way.
The purpose of this public survey is to raise the awareness of security issues and improve the overall security of the network. It is performed with the cooperation of our service providers Tevel and Netvision. The collected information is in statistical form only - information about specific sites will not be available.
This survey is a local version of the more comprehensive Internet Auditing Project.
WorkShop 1 - Virus/Trojan Horses
David M.
All about trojan horses and viruses. Learn more about viruses and how the
most sophisticated ones can invade your privacy. The history of malicious code
and self-distributing programs, their current state and a fascinating look at
what may be waiting for us in the future. See why our computing environments
are so vulnerable and make it so simple to implement a virus.
WorkShop 2 - Linux kernel hacking
Ury Segal - Kernel phreak
Since the Linux kernel is open-sourced, it is a heaven for the everyday
kernel hacker. You can easily understand what's going on and make Gadgets,
Widgets and loan ornaments from it easily. I will give a brief overview
of the file structure, and the kernel structure. Then I'll go over the
open() system call and see how it goes from the user to the kernel
implementation.
Target audience : People who know some C. This is minimum.
SpooksDemo 1: SpyCams
Arie Rudich
You have to SEE it to belive -
come see what you shouldn't: Spy Cams!