Submit :
News                      Photos                     Just In                     Debate Topic                     Latest News                    Articles                    Local News                    Blog Posts                     Pictures                    Reviews                    Recipes                    
  
Hackers demonstrate ways to attack smartphones
Sensing the times, and the need to talk to look for solutions four bright cyber security analysts - Jiten Jain, Mohit Kumar, Prabhjot Singh and Kishlay Bhardwaj - organized this international hackers' conference on July 29 at India Habitat Centre in New Delhi.

ON SUNDAY, the Capital hosted an international hackers’ conference where blackhat hackers discussed the challenges of cyber safety with govt. security agencies. The conference showcased new security solution ideas that will help consumers, small and large businesses as well as the Government to secure and manage their information against risks more completely and efficiently than any other.


The day was divided into two parts the morning session and afternoon session. Both had Keynote addresses by renowned names in the world on Internet Security and Technical sessions by galaxy of renowned technical speakers. Also for the first time ever in India the Conference brought on platform some black-hat Hackers who shared their technical skills and knowledge.

Starting the day was Mr. Pranav Lal, a Consultant-Information Security Services at Mahindra SSG. Mr Lal spoke on Moving to the Cloud: Key Security Considerations. Cloud brings real benefits to an organization – but with even the simplest organizational change there are impacts. People often look at the move to the cloud as a before and after situation. That ignores the very real issues about cloud migration, infact moving to the cloud can create some thorny issues. As with any chance management process however, forewarned is forearmed. The most key consideration being the security implications. By doing so, and by planning for those impacts, organizations can do their very best to ensure a smooth and successful migration process.

Then there was Ann Smith, Executive Editor of the Hacker News who spoke on the various malfeasance that the information in the Cyber space is prone to in today's world.

Moving on, there was Mr. Sina Hatef Matbue and Arash Shirkhorshidi who travelled all the way from Iran for the Conference. Mr Hatef is the co-founder and SVP at Challenge Security Co, and funder of GraVitoN project. While Mr. Arash is co-founder and CEO at Challenge Security. He has also co-founded Farhad Miri and is a pentest leader, Metasploit specialist and CEH. They introduced audience to the world of 'graviton'. As many of you may not know the purpose of 'graviton' is to become an artificial creature in the cyber world which can move between world of windows, world of apples, and world of emperor penguins and remain stealth! This project grows, security professionals will have a better and deeper understanding of how viruses, Trojans, etc work, so they can fight and protect themselves against those, and they can even create 'white viruses', to spread and fight against malicious viruses, effectively.

A unique one technical session was from Aneesh Dogra, the 17-year-old whiz kid, with a passion for computing. He is fascinated by the Cyber world around him and loves to hack and make things happen. His interest areas are Web Development, Security Research and Automating. He mainly codes in C,Python and some PHP. A Google Code-in 2011 winner, Aneesh spoke on : How to make a Linux ELF Virus (That works on your latest linux distribution). He will be looking at the ELF headers and demonstrating how the virus works.

Mobile devices such as Smartphones and Tablet PCs are being widely used globally for both consumer and business purpose. Consequently, we are witnessing a spurt in the wide variety of services being offered on the mobile platforms. Applications on platforms such as iOS, Android, Windows, i Phone 7 and so on are being developed without proper security implementation. Such insecure mobile applications can cause serious information security and data privacy issues. In the the next technical session Anurag Kumar Jain and Devendra Shanbhag decode the Mobile Application malware.

Next was Gopal Shankar Narayanan- advocate of the Supreme Court of India who spoke on the Indian Information Technology Act and govt's role in Internet censorship.

Post lunch session started with The Organizers of The Hackers Conference presented a session on the current state of Cyber warfare in the world, Emerging Cyber threats and threats of future. In this session organizers presented their research finding about Cyber espionage around the world. The session also had some practical demonstration of increasing influence of Social Engineering into innovative ways of hacking in present times. The organisers hacked into several mobile through a public mobile charging station.

The objective of The Hackers Conference was to provide a common platform to hackers along with govt. official and policymakers wherein both could showcase their expertise. And the knowledge of hackers get recognition and be used by cyber crime specialists not just to check crime but also to generate positive ideas in the field of internet security. Following this belief there were next keynote speakers like Vineeta Thakur DIG, Economic Offense cell CBI. To give us a clear perspective on Cyber crime and policies to curb it there was none other than Dr. S. C Mishra, Additional DCP, Delhi Police.

The there was a session on Androids titled All your Droids belong to me: A look into Mobile Security in 2012. And to present this we have Aditya Gupta and Subho Halder. Aditya Gupta- a well known Mobile Security Researcher and Penetration Tester. His main expertise includes Exploiting Web Applications, Evading Firewalls and Exploit Research. Aditya is responsible for the discovery of serious vulnerabilities in websites such as Google, Apple, Microsoft, Skype, Adobe, and a variety of other major software technologies. Aditya has worked on many Android security projects and has been a frequent speaker at many conferences. While Subho is a Programmer, Security Researcher and Penetration Tester. He loves writing exploits and programming in PHP, Java, Perl and Python. He is well equipped and has a deep understanding of Android and Blackberry frameworks. Together they gave an inside view on how the black-hat underground hackers use this, to earn 5-6 digit income per month!

Next was a technical session. Titled: Browser Kung-Fu. Web browsers started off with a single process, single thread model. However, the web has evolved from being document-centric to becoming application-centric. This gave rise to problems of stability, performance and security. Dev Kar: A security researcher and the Co-Founder of XYsecurity- demonstrated use of a browser bug using which could steal all the contacts in a users Google talk gadget profile.

Going forward on the technical session. There was Android Spy Agent and to present it was Mahesh Rakheja. With the Android spy agent application he demonstrated how one can remotely access the entire victim’s personal information and even the confidential data available in the android cell phone like contacts, call logs, messages, browser’s history, GPS location and many more. For all smart phone users that was goose-bump stuff as he hacked into audience's gmail accounts.


COMMENTS (0)
Guest
Name
Email Id
Verification Code
Email me on reply to my comment
Email me when other CJs comment on this article
}
Sign in to set your preference
Advertisement
merinews for RTI activists
In This Article
google
(951 Articles)
microsoft
(1999 Articles)


Advertisement
Not finding what you are looking for? Search here.