We’re proud to announce a preliminary list of talks that we’ve accepted for ToorCon 17. We’ll be working on posting additional talk details and schedule information in the next couple weeks. In the meantime, the CFP is still open until September 25th, so submit a talk today!
We have some great workshops this year. Once again, Michael Ossmann will be teaching his best selling Software Defined Radio Workshop based on the HackRF. New workshops for this year include Dmitry Nedospasov teaching Hardware Hacking using FPGAs and Ubertooth hackers, Mike Ryan & Dominic Spill teaching their first ever Bluetooth Hacking Workshop. Tickets are selling fast, so register today!
ToorCon San Diego 17 is now officially accepting talk submissions for it’s upcoming event on October 21st-25th. The first round of talks will be announced August 7th, so get your talks submitted soon! Submission can be done online at http://sandiego.toorcon.net/cfp.
Hey Gang! Despite a late start, ToorCon 2015 Registration is now open. We’ve been busy literally making the next generation of Hackers. Pre-Reg at $80 now. We’ll see you at the show!
Despite being widely distributed and deployed in nearly every modern home and small office, SOHO networking equipment has received surprisingly little attention from security researchers. Yet, these devices facilitate the connectivity and protection (we hope) of millions of end-systems. The critical vulnerabilities that persist in these widely used devices demonstrate an urgent need for deeper scrutiny.
SOHOplessly is a no-holds-barred router hacking competition. There will be three (3) tracks that focus on exploiting vulnerabilities.
Track 0 is a pre-con contest. Track 1 is a capture the flag style contest. Track 2 is a surprise contest that will take place at random times throughout the conference.
Please see the contest page for more information!
If you are brave enough to wake early Sunday, October 26 from 8:30 to 11 am, join us at the 1st Annual PancakeCon! PancakeCon is hell-bent on offering the three best hours of eating gourmet pancakes in an interesting atmosphere of demonstrating technology exploitation, inventive software and hardware solutions, and open discussions of critical InfoSec issues. PancakeCon will be hosted at CyberHive, a nearby incubator and shared workspace dedicated to the building the next generation of cybersecurity products.
More information will be in the program and announced during the conference! PancakeCon.
Join us as San Diego 2600 Presents a Team Fortress 2 LAN Party, Friday, October 24th, at 9PM. Join other hackers in Team Fortress 2 madness, either in the structured team server or on the free-for-all server. Bring your laptop/gaming rig with Team Fortress 2 (available for free on Steam) and join in the fun.
Interested? Please fill out the following form. You do not have to provide your real name or handle, but we would appreciate a count so we can anticipate the number of people interested in playing.
We’re proud to announce our preliminary lineup for ToorCon San Diego 16. We’ll be posting additional talks and more details over the next week as we finish up the Call for Papers. Also, our Workshops are selling fast so don’t wait too long to register!
Advanced ANDROID & iOS Exploitation Workshop
Instructor: Aditya Gupta, Attify Security
Software Defined Radio Workshop
Instructor: Michael Ossmann, Great Scott Gadgets
MS-SQL Post-exploitation In-depth Workshop
Instructors: Rob Beck & Noelle Murata, Neohapsis
MS-SQL Post-exploitation In-depth Workshop:
The MS-SQL Post-exploitation In-depth workshop demonstrates the tactics an attacker can employ to maintain persistence in a Microsoft SQL Server database, while harnessing the available facilities to expand their influence in an environment. Plenty of resources exist today that show methods for compromising SQL and SQL-dependent applications to achieve access to the environment, very few provide methods for maintaining control of a SQL instances or performing attacks against the host and environment from within the SQL service.
This course will offer attendees an understanding of the various facilities that are available for executing system level commands, scripting, and compiling code… all from inside the SQL environment, once privileged access has been acquired. Students will walk away from this two-day course with a greater understanding of:
- MS-SQL specific functionality
- Stored procedures
- Extended stored procedures
- SQL assemblies
- SQL agent
- SQL internals
- Conducting attacks and assessments from inside the SQL environment
- Methods employed for stealth inside of SQL
Upon the completion of this workshop, attendees will:
- Be familiar with multiple facilities in the SQL Server environment for executing system commands.
- Understand ways to execute arbitrary code and scripts from within the database.
- Understand methods for operating with stealth in the SQL service.
- Know ways an attacker can rootkit or backdoor the SQL service for persistence.
- Be familiar with hooking internal SQL functions for data manipulation.
- Harvest credentials and password hashes of the SQL server.
- Have familiarity with the extended stored procedure API.
- Be able to create and deploy SQL assemblies.
- Have the ability to impersonate system and domain level users for performing escalation in the environment.
Attendee requirements for this workshop:
- Modern laptop with wired or wireless networking capabilities.
- Ability to use Microsoft remote desktop from their system.
- Basic understanding of the T-SQL language and syntax.
- Ability to follow along with coding/scripting concepts (coding experience a plus, but not required – languages include: C, C++, C#, vbscript, jscript, and powershell)
- Ability to navigate Visual Studio and OllyDBG (previous experience a plus, but not required.)
Attendees will be provided with:
- Hosted VMs for testing and workshop labs.
- Training materials – presentation materials and lab examples.
Who should attend this workshop?
- SQL administrators and security personnel.
- Professional pen-testers and corporate security team members.
- Incident response analysts for new methods of attack detection.
- Forensic team members unfamiliar with SQL related attack patterns.
- Anyone interested in furthering their understanding of SQL Server.
Hey everyone! Thanks for your patience. We’ve been busy preparing this years ToorCon San Diego. Online registration will be opening on Aug 17th. Thanks for all the years of support and see you at the Con!