ToorCon Seattle 2011

As I mentioned in the previous post, just after Source Seattle some days ago, the ToorCon (also in Seattle) began. Some speakers took advantage of this to present the same or different presentations at both conferences. Friday the 13th was the opening day, with a small party, but the presentations didn’t begin until the following day. There were thirty talks in total, each delivered in a 15 minute period of time, with a short break for lunch. It was an entire day of presentations, from 8:30 till 10:30, quite a day!
 
The subject of the talks was very varied, from hacktivism themes through to hard disk recuperation. During the morning we could attend, amongst others, presentations about the use of concurrence in Python for the creation of stronger security tools, an appeal for the real securing of communications, exploit kits, details of the fall of the Rustock botnet by Julia Wolf, how to physically recover a hard drive (a real surgical intervention of a hard disk) and it ended with some interesting thoughts about Bitcoin from Dan Kaminsky: if a normal user does not have the capacity to generate a large amount of bitcoins, because it depends on the capacity of the calculation, who will end up having them all?

bitcoin
The afternoon sessions were no less interesting. In my opinion, the highlights were the discovery of exploitable vulnerabilities in the kernel through emulation, a practical example of telephone social engineering, where you could hear how they obtained data from a real secretary, and one that dealt with the compromise of a domain through a PBX telephone system. Without a doubt, this last one brought more than one person to their feet and received the best applause of all, as its staring point was a telephone system and they managed to query sensitive data from the network systems.

owning_phone_system
Finally, the closing event took place at a club in the city where people could socialize in the best possible way ;) This wasn’t a conference where you could go and put up a company stand, but a place where you could meet people with a wide knowledge of IT security and share a beer. There is a risk that by the last speech you wouldn’t be paying full attention to the platform, but nothing is perfect, is it? It is another type of conference, very different from Source, but equally recommendable. In summary, the best thing to do is to attend them both ;)

Post new comment

The content of this field is kept private and will not be shown publicly.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Allowed HTML tags: <a> <em> <strong> <cite> <code> <ul> <ol> <li> <dl> <dt> <dd>
  • Lines and paragraphs break automatically.

More information about formatting options

Type the characters you see in this picture. (verify using audio)
Type the characters you see in the picture above; if you can't read them, submit the form and a new image will be generated. Not case sensitive.