bmanahan188at November 10,2015 It’s awesome to see the different components behind the randomization of session tokens being broken down. I thought this was a great Defcon talk, especially with how he ended it by not only being able to take over someone else’s website session, but also showing how to learn the location of someone’s home! This video is a great demonstration of why you must audit the methods you utilize to create session IDs for websites. Strong examples like this talk are excellent ways to incite change.
brober15at November 25,2015 This was some impressive stuff, especially the geolocation. I've watched a few of the defcon videos, and the presenters all seem to take some leaps to get what they need to make their attack work. For example, to acquire the epoch time used for the cookie you need to be able to see when the target logs on to chat, but you wouldn't be able to do that unless you were friends with rsnake, and if rsnake was as savvy as he's supposed to be he's not going to be accepting friend requests from random people. Maybe you decided to take over the account of a third person who is already friends with the target. Then you'd need the target to visit your website to get his ip address. Some pretty slick social engineering would be needed to get that far. That's 64 bits that you are highly unlikely to actually get in real life, unless you're dealing with someone who will probably be vulnerable to other types of attacks anyway, like a spear phishing email. The technical skill to weave all these exploits together is seriously impressive, though.
Beggsseat November 28,2015 Very interesting topic and the speaker is obviously well versed in his subject since he lost computer privileges via the secret service. His ability and tenacity are front and center as well as his youth. While he has common young adult interests, his way of infiltrating and obtaining information is not common. Nearly everything he described relating to the indirect attack on social network was a challenge for me to follow, but I clearly understood the end result and his ability to glean more and more information by sending his target to his malicious site and using geo-location to find the targets location is impressive. His assertion that the camera-car from Google Street View is in reality triangulating our location through our network is sobering.
aholcom2at November 30,2015 This was a very cool video explaining the different ways to attack a user through their web browser. Its always interesting listening to the exploits and research Samy Kambar publishes. As others have mentioned he is incredibly smart and knowledgeable in cyber security. I liked how he was able exploit the cookie string in PHP by reducing the entropy value from 160 bits. Even though it’s a difficult attack to pull off its amazing that he was able to research and figure out a way to perform the attack.
sliu23at December 01,2015 The port overflow is quite impressive. I have seen some codes would do some port filter to protect our own system. However, they are seems to not handle the overflow situation. Just plus the 65536, the hacker would open the port and penetrate to the victim system. The idea is not complicated, but it is quite powerful. As for XPS attack and XXXSS scan, I am not familiar with them, combined together to complete the whole serial attack is indeed amazing job. Reducing cookie values from 160bits to 20bits step by step is also a sparkling point of this attack.