This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
Mad Scientist Goggles? Check! Workshops Engage!
If you've attended Black Hat in the past, perhaps you've checked out one of our applied knowledge workshops? Workshops are two or three times longer than a standard briefing, and let you roll up your sleeves and get your hands dirty alongside the workshop's presenter. We supply the desks and power, you bring your hands and laptop, and magic happens.
We're still working on that final schedule, but the plan is to always have two workshops running concurrently alongside the more typical briefings. Here are three workshops you'll want to scope.
Wi-Fi and cellular are cool, but the real fun's below the gigahertz line: medical, manufacturing, industrial, and power systems...it's all in there! With the cc1111usb project, Atlas and friends have turned kiddie toys into functional power-systems-attack tools. With a $50 USB dongle, the world of ISM (Industrial, Scientific, and Medical) sub-GHz is literally at your fingertips. These may be toys, but they're not playing around.
It's hard to overstate the importance of having the right tools for the job, so being able to create those tools on the fly is invaluable. In the fast-paced Ruby for Pentesters, three probably-friendly experts will dazzle you with the power and flexibility of Ruby, then teach you how to use it to rapidly prototype solutions for real-world problems like reversing binaries, hacking together network clients, and building debuggers. You bring a laptop and they'll supply the virtual test environment.
When it comes to your most important info, are you ready to trust that iPhone app? All too often iOS apps give the illusion of security when your candy's open for grabbin' with just a modicum of an attackers effort. Jonathan Zdziarski knows. He'll show you how iOS apps are infected, logic checks are bypassed, and data is compromised. Numerous demos will show you what your apps are up against and (hopefully!) how to avoid many all-too-common mistakes.