Proceedings 25C3 Datenpannen Solar-Powering Your Geek Gear First
Total Page:16
File Type:pdf, Size:1020Kb
Proceedings 25C3 Datenpannen Solar-powering your Geek Gear first open source PLC tool Hackerparagraph 202c StGB Security Failures in Smart Card Payment Systems Building hackerspaces.org About Cyborgs and Gargoyles ... Terrorist All-Stars Der Staat als Virenprogrammierer? Just Estonia and Georgia? Das Grundrecht auf digitale Intimsphäre Chip Reverse Engineering Erich Mühsams Tagebücher in der Festungshaft Hacking the iPhone foo Beyond Asimov Cracking the MSP430 BSL Advanced memory forensics: Cold Boot Attacks Locating Mobile Phones using SS7 Collapsing the European security to the DNS vulnervulner-- ability? coreboot Messing with Garage Doors Kurt Gödel Jahresrückblick Post-Privacy Climate Change Full-Disk-Encryption Attacking Rich Internet Applications Hacking the Atmosphere and Symbian Vulnerability in closed source PHP applications Music in a Box Handschellen hacken Anatomy of smartsmart- phone hardware Security of MICA*-based wireless sensor TCP Denial of Service Vulnerabilities Short Attention Span Security The Trust Situation Scalable Swarm Robotics Prototype Your Life foo All your base(s) are to us Banking Malware 101 The Infinite Library Console Hacking 2008: Wii Fail Tricks: makes you smile Fnord News Show Blinkenlights Stereoscope Life is a Holodeck! Soviet Unterzoegersdorf your own GSM network Spuren eVoting the TI EZ430U Big Brother Awards Neusprech im Überwachungsstaat Privacy in the social semantic web new stream cipher designs Commodore 64 Talk Hacking into Botnets Security and anonymity vulnerabilities in Tor Squeezing Attack NFC mobile phones OnionCat A TOR-based Anonymous VPN SWF and the Malware Targeted Attacks with Office Documents Der Personalausweis Cisco IOS attack Revolution Wikileaks Hacker Jeopardy We got owned get a lessons learned Why technology sucks The Privacy Workshop Project La Quadrature du Net Predictable RNG in the vulnerable Debian OpenSSL package Crafting and Hacking the theoretical possible Mining social contacts with active RFID Pflanzenhacken Security Nightmares 2009 Peter Fnord Für Wolfgang. ......................................... Proceedings . ......................................... Proceedings of the 25th Chaos Communication Congress December, 27th - 30th 2008, Berlin Congress Center, Alexanderplatz. 25C3: An event of the Chaos Computer Club. https://events.ccc.de/congress/2008/ Cover: Evelyn Schubert Data-Gardening: Sven Klemm Editor: Matthias 'wetterfrosch' Mehldau Publisher: Art d’Ameublement Marktstraße 18 in 33602 Bielefeld Vertrieb: FoeBuD e.V. Unterstützungsbedarf Marktstraße 18 in 33602 Bielefeld, https://shop.foebud.org/ Font-Family: Myriad Pro ISBN: 978-3-934636-06-4 ISSN: 1867-8556 Program planning under the patronage of the Wau Holland Foundation. 1st edition, 400 copies Last update: December, 15th 2008 Printer: Druckerei Wollenhaupt Unter dem Felsenkeller 30 in 37247 Großalmerode Paper: Printed on FSC-certi ed paper by a FSC-certi ed printer. Environment: Climate-neutral print. The for the production this book emitted carbon-dioxide was compensated in cooperation with the natureOffi ce.de-program which supports IMO-COC-028075 facilities for renewable energy in developing countries. Strömchen! License: c Creative Commons Attribution-Noncommercial-No Derivative Works 2.0 Germany As long as not otherwise noticed, you are free to copy, distribute and transmit the work under the following conditions: b Attribution. You must attribute the work in the manner specifi ed by the author or licensor (but not in any way that suggests that they endorse you or your use of the work). n Noncommercial. You may not use this work for commercial purposes. d No Derivative Works. You may not alter, transform, or build upon this work. c Full license-text: http://creativecommons.org/licenses/by-nc-nd/2.0/de/deed.en C ......................................... Index . ......................................... Day 2008-12-27 11:30 CET Datenpannen ... p. 19 Forderungen nach dem Jahr der Datenverbrechen Saal 1: Society with 46halbe, Patrick Breyer Solar-powering your Geek Gear ... p. 20 Alternative and mobile power for all your little toys ... see paper on p. 225 Saal 2: Making with script 12:45 CET U23 ... p. 21 The Hackerspace's Junior Academy Saal 2: Community with fd0, Lars Weiler, red_hood FAIFA: A first open source PLC tool ... p. 22 PowerLineCommunications has now their open source tool Saal 3: Hacking with Nicolas Thill, Florian, Xavier Carcelle 14:00 CET Der Hackerparagraph 202c StGB ... p. 23 Bestandsaufnahme und Auswirkungen Saal 1: Hacking with Felix von Leitner, lexi, Jan Münther, Jürgen Schmidt Security Failures in Smart Card Payment Systems ... p. 24 Tampering the Tamper-Proof Saal 3: Hacking with Steven J. Murdoch 16:00 CET Building an international movement: hackerspaces.org ... p. 25 What we did so far. What will happen in the future. Saal 1: Community with Nick Farr, Enki, Jens Ohlig, Bre, Jake About Cyborgs and Gargoyles ... ... p. 26 State of the Art in Wearable Computing ... see paper on p. 235 Saal 2: Science with kai_ser 17:15 CET Terrorist All-Stars ... p. 28 Some cases of terrorism around the world that are not terrorist at all Saal 1: Society with Anne Roth Der Staat als Virenprogrammierer? ... p. 29 Die Steueridentifikationsnummer als Gefahr der informationellen Selbstbestimmung Saal 2: Society with Sven Lüders Just Estonia and Georgia? ... p. 30 Global-scale Incident Response and Responders Saal 3: Culture with gadi 18:30 CET Das Grundrecht auf digitale Intimsphäre ... p. 31 Festplattenbeschlagnahme in neuem Licht Saal 1: Society with Ulf Buermeyer, 46halbe Chip Reverse Engineering ... p. 32 Saal 2: Hacking with Karsten Nohl, starbug ... see paper on p. 155 Erich Mühsams Tagebücher in der Festungshaft ... p. 33 Ein Idylle aus der Analogsteinzeit der Überwachung Saal 3: Society with Johannes Ullmaier 20:30 CET Hacking the iPhone ... p. 34 Pwning Apple's Mobile Internet Device Saal 1: Hacking with pytey, MuscleNerd, planetbeing Beyond Asimov - Laws for Robots ... p. 35 Developing rules for autonomous systems Saal 2: Society with Frank Rieger Cracking the MSP430 BSL ... p. 36 Part Two ... see paper on p. 165 Saal 3: Hacking with Travis Goodspeed 21:45 CET Advanced memory forensics: The Cold Boot Attacks ... p. 37 Recovering keys and other secrets after power off ... see paper on p. 133 Saal 1: Hacking with Jake Locating Mobile Phones using SS7 ... p. 38 Saal 2: Hacking with Tobias Engel Collapsing the European security architecture ... p. 39 More security-critical behaviour in Europe! ... see paper on p. 263 Saal 3: Society with Gipfelsoli 23:00 CET Why were we so vulnerable to the DNS vulnerability? ... p. 46 Saal 1: Hacking with Effugas coreboot: Beyond The Final Frontier ... p. 47 Open source BIOS replacement with a radical approach to boot. Saal 2: Hacking with Peter Stuge Messing Around with Garage Doors ... p. 48 Breaking Remote Keyless Entry Systems with Power Analysis Saal 3: Hacking with Timo Kasper, Thomas Eisenbarth 24:00 CET Kurt Gödel – I do not fit into this century ... p. 49 Ein audiovisuelles Live-Feature Saal 1: Culture with 46halbe, Marcus Richter, Ina Kwasniewski, Kai Kittler Day 2008-12-28 11:30 CET Jahresrückblick ... p. 52 Die Themen des CCC im Jahr 2008 Saal 1: Community with 46halbe, andy, Frank Rieger, frankro, Erdgeist Lightning Talks 1 ... p. 54 5 mins of fame Saal 2: Community with SvenG Embracing Post-Privacy ... p. 55 Optimism towards a future where there is 'Nothing to hide' Saal 3: Society with Christian Heller / plomlompom 12:45 CET Climate Change - State of the Science ... p. 56 Saal 2: Science with Rahmstorf ... see paper on p. 243 Full-Disk-Encryption Crash-Course ... p. 57 Everything to hide ... see paper on p. 171 Saal 3: Hacking with Juergen Pabel 14:00 CET Attacking Rich Internet Applications ... p. 58 Not your mother's XSS bugs Saal 1: Hacking with kuza55, Stefano Di Paola Hacking the Atmosphere ... p. 59 How to exploit the weather and fly for free Saal 2: Science with Martin Ling Exploiting Symbian ... p. 60 Symbian Exploit and Shellcode Development Saal 3: Hacking with Collin Mulliner 16:00 CET Vulnerability discovery in encrypted closed source PHP applications ... p. 61 Saal 1: Hacking with ionic Algorithmic Music in a Box ... p. 62 Doing music with microcontrollers ... see paper on p. 219 Saal 2: Making with wesen Handschellen hacken ... p. 63 Essentielles Grundwissen für alle, die nichts zu verbergen hatten Saal 3: Hacking with Ray 17:15 CET Anatomy of smartphone hardware ... p. 64 Dissecting contemporary cellphone hardware Saal 1: Hacking with Harald Welte Security of MICA*-based wireless sensor networks ... p. 65 Saal 2: Hacking with Dan Cvrcek ... see paper on p. 183 TCP Denial of Service Vulnerabilities ... p. 66 Accepting the Partial Disclosure Challenge Saal 3: Hacking with Fabian Yamaguchi 18:30 CET Short Attention Span Security ... p. 67 A little of everything Saal 1: Hacking with Ben Kurtz The Trust Situation ... p. 69 Why the idea of data protection slowly turns out to be defective ... see paper on p. 309 Saal 2: Society with Sandro Gaycken Scalable Swarm Robotics ... p. 70 Formica: a cheap, open research platform Saal 3: Making with Jeff Gough 20:30 CET Rapid Prototype Your Life ... p. 72 The time is now to make anything you can imagine Saal 1: Making with Bre All your base(s) are belong to us ... p. 73 Dawn of the high-throughput DNA sequencing era Saal 2: Science with Magnus Manske Banking Malware 101 ... p. 74 Overview of Current Keylogger Threats Saal 3: Hacking with tho 21:45 CET The Infinite Library ... p. 75 Storage and Access of Pornographic Information Saal 1: Society with Rose White Console Hacking 2008: Wii Fail ... p. 77 Is implementation the enemy of design? Saal 2: Hacking with bushing, marcan Tricks: makes you smile ... p. 78 A clever or ingenious device or expedient; adroit technique: the tricks of the trade. Saal 3: Hacking with Francesco `ascii` Ongaro 23:00 CET Fnord News Show ... p. 79 Wir helfen Euch, die Fnords zu sehen Saal 1: Society with Felix von Leitner, Frank Rieger Blinkenlights Stereoscope ... p. 80 Behind the scenes of the new light installation Saal 2: Hacking with Tim Pritlove Life is a Holodeck! ..