Vergeten presentatie JP Mens toegevoegd in NJ2018
Talks VJ2018 toegevoegd
This commit is contained in:
parent
4f1b3d3c03
commit
4c8f91573a
|
@ -10,7 +10,7 @@ title: "Jan-Piet Mens - The Story of OwnTracks"
|
||||||
speakers:
|
speakers:
|
||||||
- jan-piet-mens
|
- jan-piet-mens
|
||||||
presentation:
|
presentation:
|
||||||
filename:
|
filename: 2018-11-15-jan-piet-mens-the-story-of-owntracks.pdf
|
||||||
recording:
|
recording:
|
||||||
platform: youtube
|
platform: youtube
|
||||||
url: https://www.youtube.com/watch?v=ZOkit8TVUd8
|
url: https://www.youtube.com/watch?v=ZOkit8TVUd8
|
||||||
|
|
|
@ -3,7 +3,7 @@ categories:
|
||||||
- conferenties
|
- conferenties
|
||||||
- evenementen
|
- evenementen
|
||||||
date: 2018-05-15T20:17:47+02:00
|
date: 2018-05-15T20:17:47+02:00
|
||||||
description: "De NLUUG voorjaarsconferentie heeft plaatsgevonden op dinsdag 11 mei 2018. Bekijk hier het programma, de presentaties, opnames en foto's."
|
description: "De NLUUG voorjaarsconferentie heeft plaatsgevonden op dinsdag 15 mei 2018. Bekijk hier het programma, de presentaties, opnames en foto's."
|
||||||
is_event: true
|
is_event: true
|
||||||
tags:
|
tags:
|
||||||
- conferenties
|
- conferenties
|
||||||
|
@ -165,12 +165,12 @@ event_schedule:
|
||||||
talk:
|
talk:
|
||||||
speaker: James Bottomley
|
speaker: James Bottomley
|
||||||
title: "Enhancing Linux Security with the TPM"
|
title: "Enhancing Linux Security with the TPM"
|
||||||
link:
|
link: talks/james-bottomley-enhancing-linux-security-with-tpm/
|
||||||
- column:
|
- column:
|
||||||
talk:
|
talk:
|
||||||
speaker: Walter Belgers
|
speaker: Walter Belgers
|
||||||
title: Gigatron TTL Computer
|
title: Gigatron TTL Computer
|
||||||
link:
|
link: talks/walter-belgers-gigatron-ttl-computer/
|
||||||
- row:
|
- row:
|
||||||
columns:
|
columns:
|
||||||
- column:
|
- column:
|
||||||
|
@ -190,7 +190,7 @@ event_schedule:
|
||||||
talk:
|
talk:
|
||||||
speaker: Adrianus Warmenhoven
|
speaker: Adrianus Warmenhoven
|
||||||
title: Port Knocking
|
title: Port Knocking
|
||||||
link:
|
link: talks/adrianus-warmenhoven-port-knocking/
|
||||||
- column:
|
- column:
|
||||||
talk:
|
talk:
|
||||||
speaker: Kevin McPeake
|
speaker: Kevin McPeake
|
||||||
|
@ -213,12 +213,12 @@ event_schedule:
|
||||||
talk:
|
talk:
|
||||||
speaker: Ralph Dolmans en Martin Hoffmann
|
speaker: Ralph Dolmans en Martin Hoffmann
|
||||||
title: "DNSSEC: Rollin', Rollin', Rollin'"
|
title: "DNSSEC: Rollin', Rollin', Rollin'"
|
||||||
link:
|
link: talks/ralf-dolmans-martin-hoffmann-dnssec-rollin-rollin-rollin/
|
||||||
- column:
|
- column:
|
||||||
talk:
|
talk:
|
||||||
speaker: Rogier Spoor
|
speaker: Rogier Spoor en François Kooman
|
||||||
title: "Let's Connect - Open Source VPN Solution"
|
title: "Let's Connect - Open Source VPN Solution"
|
||||||
link:
|
link: talks/rogier-spoor-francois-kooman-lets-connect-open-source-vpn-solution/
|
||||||
- column:
|
- column:
|
||||||
talk:
|
talk:
|
||||||
speaker: Ilja van Sprundel
|
speaker: Ilja van Sprundel
|
||||||
|
@ -238,7 +238,7 @@ event_schedule:
|
||||||
talk:
|
talk:
|
||||||
speaker: Willem Westerhof
|
speaker: Willem Westerhof
|
||||||
title: Beveiliging van PV-installaties
|
title: Beveiliging van PV-installaties
|
||||||
link:
|
link: talks/willem-westerhof-how-an-intern-hacked-the-power-grid/
|
||||||
- column:
|
- column:
|
||||||
talk:
|
talk:
|
||||||
speaker: Howard Chu
|
speaker: Howard Chu
|
||||||
|
|
|
@ -0,0 +1,36 @@
|
||||||
|
---
|
||||||
|
categories:
|
||||||
|
- presentaties
|
||||||
|
date: 2018-11-15T10:31:43+02:00
|
||||||
|
description: ""
|
||||||
|
layout: event-talk
|
||||||
|
tags:
|
||||||
|
- hacking
|
||||||
|
- port-knocking
|
||||||
|
- single-packet-authentication
|
||||||
|
title: "Adrianus Warmenhoven - Port Knocking"
|
||||||
|
speakers:
|
||||||
|
- adrianus-warmenhoven
|
||||||
|
presentation:
|
||||||
|
filename: 2018-11-15-adrianus-warmenhoven-port-knocking.pdf
|
||||||
|
recording:
|
||||||
|
platform: youtube
|
||||||
|
url:
|
||||||
|
---
|
||||||
|
|
||||||
|
## Abstract
|
||||||
|
|
||||||
|
Using SPA for profit and fun, or, a zero-cost solution to getting your fridge out of Shodan.
|
||||||
|
|
||||||
|
Port knocking has been around for quite a while; send a sequence of packets to seemingly closed ports and Sesame opens up. This is, however, not so very secure. Single Packet Authentication port knocking, involving a signed packet with an timestamp, is a lot more secure and works quite well.
|
||||||
|
|
||||||
|
I want to make the case that, just like firewalling (IPTables), SPA port knocking should be a default mechanism in any modern OS, especially the IoT OSes. It is easily implemented (both on server and on client side) and is readily available. It takes the stress out of getting every underpaid worker on the same security page whilst still enabling access when needed.
|
||||||
|
|
||||||
|
|
||||||
|
And finally, it can be used (a hobby of mine) to waste tremendous amounts of time and resources of (wannabe) attackers; your server can be a Decepticon too!
|
||||||
|
|
||||||
|
## Biography
|
||||||
|
|
||||||
|
Adrianus Warmenhoven has been involved in pioneering endeavors in IT since the early 1990’s. Collaborated in setting up firsts in Dutch anti-cybercrime, branch organization for ISP’s as well as being CTO for one of the first free ISP’s in the Netherlands, co-designer of supercomputing hardware and running projects for Dutch governmental organizations.
|
||||||
|
|
||||||
|
For various international companies, he has done security reviews and given advice on how to deal with active threats and extortion. He is now affiliated with RedSocks as security evangelist and develops academic classes in hacking.
|
|
@ -0,0 +1,35 @@
|
||||||
|
---
|
||||||
|
categories:
|
||||||
|
- presentaties
|
||||||
|
date: 2018-11-15T10:31:43+02:00
|
||||||
|
description: ""
|
||||||
|
layout: event-talk
|
||||||
|
tags:
|
||||||
|
- linux
|
||||||
|
- security
|
||||||
|
- tpm
|
||||||
|
title: "James Bottomley - Enhancing Linux Security with TPM"
|
||||||
|
speakers:
|
||||||
|
- james-bottomley
|
||||||
|
presentation:
|
||||||
|
filename: https://www.hansenpartnership.com/Impress-Slides/NLUUG-2018/#/begin
|
||||||
|
recording:
|
||||||
|
platform: youtube
|
||||||
|
url:
|
||||||
|
---
|
||||||
|
|
||||||
|
## Abstract
|
||||||
|
|
||||||
|
Thanks to Microsoft requiring version 2 of a TPM for Windows, the Linux drivers for this technology have been making great strides: We now have an in-kernel resource manager an in-kernel trusted TPM based keys which can give the user the same protection as two factor authentication. This now allows us to build a functional secrets guarding ecosystem around TPM2 with Linux both for personal and Cloud Container use.
|
||||||
|
|
||||||
|
This talk will first of all explain how a TPM2 guards secrets and keys, look at the in-kernel technology and how it works, including a brief digression into the TPM Genie security breach and how we countered it in linux and end with a survey of the current state of Linux ecosystem support for TPM based keys.
|
||||||
|
|
||||||
|
Note this talk is entirely about TPM2 (TPM1 and trousers will not be mentioned, neither will measurement except for key sealing).
|
||||||
|
|
||||||
|
## Biography
|
||||||
|
|
||||||
|
James Bottomley is a Distinguished Engineer at IBM Research where he works on Cloud and Container technology. He is also Linux Kernel maintainer of the SCSI subsystem. He has been a Director on the Board of the Linux Foundation and Chair of its Technical Advisory Board.
|
||||||
|
|
||||||
|
He went to university at Cambridge for both his undergraduate and doctoral degrees after which he joined AT&T Bell labs to work on Distributed Lock Manager technology for clustering.
|
||||||
|
|
||||||
|
In 2000 he helped found SteelEye Technology, a High availability company for Linux and Windows, becoming Vice President and CTO. He joined Novell in 2008 as a Distinguished Engineer at Novell's SUSE Labs, Parallels (later Odin) in 2011 as CTO of Server Virtualization and IBM Research in 2016.
|
|
@ -0,0 +1,43 @@
|
||||||
|
---
|
||||||
|
categories:
|
||||||
|
- presentaties
|
||||||
|
date: 2018-11-15T10:31:43+02:00
|
||||||
|
description: ""
|
||||||
|
layout: event-talk
|
||||||
|
tags:
|
||||||
|
- dnssec
|
||||||
|
- root-key-rollover
|
||||||
|
- rfc5011
|
||||||
|
title: "Ralf Dolmans & Martin Hoffmann - DNSSEC: Rollin', Rollin', Rollin'"
|
||||||
|
speakers:
|
||||||
|
- ralf-dolmans
|
||||||
|
- martin-hoffmann
|
||||||
|
presentation:
|
||||||
|
filename: 2018-11-15-ralf-dolmans-martin-hoffmann-dnssec-rollin-rollin-rollin.pdf
|
||||||
|
recording:
|
||||||
|
platform: youtube
|
||||||
|
url:
|
||||||
|
---
|
||||||
|
|
||||||
|
## Abstract
|
||||||
|
|
||||||
|
This is a talk about the status of the planned DNSSEC root key rollover. The first part of the presentation is an introduction to DNSSEC and will cover how DNSSEC works and which keys are involved, why keys are rolled in DNSSEC, and how keys in DNSSEC are updated and retrieved by DNSSEC validators.
|
||||||
|
|
||||||
|
The second part of the presentation will cover the scheduled root key rollover, including the original time-line, the new methods to get an insight in the current status (and its limitations) and the reason why the key roll is postponed.
|
||||||
|
|
||||||
|
The last part will cover a study performed by Open Netlabs on the state of the RFC5011 implementation in various open source DNSSEC validators. RFC5011 describes a method to update DNSSEC keys and a proper implementation is crucial for the root key rollover.
|
||||||
|
|
||||||
|
## Biography Martin Hoffmann
|
||||||
|
|
||||||
|
Martin is a systems architect at NLnet Labs. There, he is involved in various projects aiming to improve the stability, security, and privacy of the Internet.
|
||||||
|
|
||||||
|
While most of his current work revolves around the DNS, he previously lived further up the stack, developing and operating the server side of real-time communication and VoIP services.
|
||||||
|
|
||||||
|
|
||||||
|
## Biography Ralph Dolmans
|
||||||
|
|
||||||
|
Ralph is a software developer at NLnet Labs and one of the core developers of Unbound and the internet.nl Internet standards compliance test website (DNS, DNSSEC, DANE, IPv6, TLS, DMARC/DKIM/SPF).
|
||||||
|
|
||||||
|
Ralph completed his MSc study System and Network Engineering at the University of Amsterdam. After his study, he started as a system and software engineer at NLnet Labs. At NLnet Labs his tasks are various, including writing code (implement RFCs), review Internet Drafts and send feedback to mailing lists.
|
||||||
|
|
||||||
|
Ralph is programme committee member for DNS-OARC and member of expert groups on usage of TLS and secure email (national and international fora).
|
|
@ -0,0 +1,38 @@
|
||||||
|
---
|
||||||
|
categories:
|
||||||
|
- presentaties
|
||||||
|
date: 2018-11-15T10:31:43+02:00
|
||||||
|
description: ""
|
||||||
|
layout: event-talk
|
||||||
|
tags:
|
||||||
|
- wifi
|
||||||
|
- vpn
|
||||||
|
- lets-connect
|
||||||
|
title: "Rogier Spoor & François Kooman - Let's Connect! - Open Source VPN solution"
|
||||||
|
speakers:
|
||||||
|
- rogier-spoor
|
||||||
|
- francois-kooman
|
||||||
|
presentation:
|
||||||
|
filename: 2018-11-15-rogier-spoor-francois-kooman-lets-connect-open-source-vpn-solution.pdf
|
||||||
|
recording:
|
||||||
|
platform: youtube
|
||||||
|
url:
|
||||||
|
---
|
||||||
|
|
||||||
|
## Abstract
|
||||||
|
|
||||||
|
Public WiFi hotspots in a hotel, restaurant or train are generally unsafe. There is a risk of being eavesdropped or tracked by someone on the same network or by malicious software. A virtual private network (VPN) sends all data over an encrypted connection and offers a safe and secure path to the internet.
|
||||||
|
|
||||||
|
There are hardly any Internet Service Providers (ISP) that provide VPN services to their customers and setting it up yourself is rather cumbersome. The few ones that do offer VPN haven’t been able to offer a modern and user-friendly experience to their users. There are a lot of other VPN solutions around, but most of them do not provide sufficient security en privacy to their users.
|
||||||
|
|
||||||
|
Let’s Connect! provides an open source VPN solution allowing ISPs, hosters and bussinesses to easily setup a secure VPN service. Even security minded people will be able to deploy it in a home environment. After deployment, users have a safe path from all generic devices.
|
||||||
|
|
||||||
|
What is unique about Let's Connect! It is fully open-source (server management, client, gui etc) and integrates nicely via SAML with identity management systems. It allows you to rebrand the apps and run large scale VPN services.
|
||||||
|
|
||||||
|
## Biography
|
||||||
|
|
||||||
|
Rogier Spoor, manager bij SURFnet en innovator pur sang. Tijdens zijn studententijd in 1997 medeoprichter van het reizende DNA-lab dat vervolgens landelijk is geadopteerd. Bij SURFnet heeft Rogier in 2004 SURFids, een gedistribueerd detectiesysteem, ontwikkeld dat een internationaal succes was.
|
||||||
|
|
||||||
|
Daarnaast heeft Rogier aan de wieg gestaan van SURFnet's eigen 'dropbox' dienst, Filesender geïntroduceerd, DNSsec geïnitieerd, IPv6 adoptie en IaaS dienstontwikkeling getrokken. Op dit moment trekt Rogier de internationale ontwikkeling en adoptie van eduVPN, een VPN standaard voor onderwijs en onderzoek.
|
||||||
|
|
||||||
|
Rogier is voorzitter van stichting HoneyNED, waarin security experts van Nederlandse organisaties samenwerken. Bestuurder bij the Commons Conservancy, een software governance orgaan.
|
|
@ -0,0 +1,38 @@
|
||||||
|
---
|
||||||
|
categories:
|
||||||
|
- presentaties
|
||||||
|
date: 2018-11-15T10:31:43+02:00
|
||||||
|
description: ""
|
||||||
|
layout: event-talk
|
||||||
|
tags:
|
||||||
|
- wifi
|
||||||
|
- vpn
|
||||||
|
- lets-connect
|
||||||
|
title: "Rogier Spoor & François Kooman - Let's Connect! - Open Source VPN solution"
|
||||||
|
speakers:
|
||||||
|
- rogier-spoor
|
||||||
|
- francois-kooman
|
||||||
|
presentation:
|
||||||
|
filename: 2018-11-15-rogier-spoor-francois-kooman-lets-connect-open-source-vpn-solution.pdf
|
||||||
|
recording:
|
||||||
|
platform: youtube
|
||||||
|
url:
|
||||||
|
---
|
||||||
|
|
||||||
|
## Abstract
|
||||||
|
|
||||||
|
Public WiFi hotspots in a hotel, restaurant or train are generally unsafe. There is a risk of being eavesdropped or tracked by someone on the same network or by malicious software. A virtual private network (VPN) sends all data over an encrypted connection and offers a safe and secure path to the internet.
|
||||||
|
|
||||||
|
There are hardly any Internet Service Providers (ISP) that provide VPN services to their customers and setting it up yourself is rather cumbersome. The few ones that do offer VPN haven’t been able to offer a modern and user-friendly experience to their users. There are a lot of other VPN solutions around, but most of them do not provide sufficient security en privacy to their users.
|
||||||
|
|
||||||
|
Let’s Connect! provides an open source VPN solution allowing ISPs, hosters and bussinesses to easily setup a secure VPN service. Even security minded people will be able to deploy it in a home environment. After deployment, users have a safe path from all generic devices.
|
||||||
|
|
||||||
|
What is unique about Let's Connect! It is fully open-source (server management, client, gui etc) and integrates nicely via SAML with identity management systems. It allows you to rebrand the apps and run large scale VPN services.
|
||||||
|
|
||||||
|
## Biography
|
||||||
|
|
||||||
|
Rogier Spoor, manager bij SURFnet en innovator pur sang. Tijdens zijn studententijd in 1997 medeoprichter van het reizende DNA-lab dat vervolgens landelijk is geadopteerd. Bij SURFnet heeft Rogier in 2004 SURFids, een gedistribueerd detectiesysteem, ontwikkeld dat een internationaal succes was.
|
||||||
|
|
||||||
|
Daarnaast heeft Rogier aan de wieg gestaan van SURFnet's eigen 'dropbox' dienst, Filesender geïntroduceerd, DNSsec geïnitieerd, IPv6 adoptie en IaaS dienstontwikkeling getrokken. Op dit moment trekt Rogier de internationale ontwikkeling en adoptie van eduVPN, een VPN standaard voor onderwijs en onderzoek.
|
||||||
|
|
||||||
|
Rogier is voorzitter van stichting HoneyNED, waarin security experts van Nederlandse organisaties samenwerken. Bestuurder bij the Commons Conservancy, een software governance orgaan.
|
|
@ -0,0 +1,31 @@
|
||||||
|
---
|
||||||
|
categories:
|
||||||
|
- presentaties
|
||||||
|
date: 2018-11-15T10:31:43+02:00
|
||||||
|
description: ""
|
||||||
|
layout: event-talk
|
||||||
|
tags:
|
||||||
|
- gigatron
|
||||||
|
- ttl-chips
|
||||||
|
title: "Walter Belgers - Gigatron TTL Computer"
|
||||||
|
speakers:
|
||||||
|
- walter-belgers
|
||||||
|
presentation:
|
||||||
|
filename: 2018-11-15-walter-belgers-gigatron-ttl-computer.pdf
|
||||||
|
recording:
|
||||||
|
platform: youtube
|
||||||
|
url:
|
||||||
|
---
|
||||||
|
|
||||||
|
## Abstract
|
||||||
|
|
||||||
|
What happens when a hacker gets his hands on a heap of 7400-series TTL chips, an oscilloscope and a soldering iron? In 1975 Wozniak famously made Breakout out of 44 such chips. When the MOS 6502 and Zilog Z80 were launched one year later, his Apple 1 started the microcomputer revolution. But were these processor ICs really necessary for that?
|
||||||
|
|
||||||
|
|
||||||
|
One year ago we ordered a bunch of such ICs, bought an oscilloscope and started hacking. The result is a fully functional microcomputer from 36 TTL chips, ROM, RAM, some diodes, etcetera, but most importantly: no microprocessor.
|
||||||
|
|
||||||
|
This talk explores the hardware design, the software stack and the capabilities of our result we now call “the Gigatron”. It will give you a good understanding of how a CPU works and what interesting design decisions we have made to keep our CPU small, yet powerful.
|
||||||
|
|
||||||
|
## Biography
|
||||||
|
|
||||||
|
Walter Belgers is a hacker, having worked in IT security for all his life, the majority as a penetration tester and currently as a security officer at Philips. He is also the chairman of Toool, the Open Organisation of Lockpickers. He has been soldering since the 1970s but never before has he built a complete computer.
|
|
@ -0,0 +1,34 @@
|
||||||
|
---
|
||||||
|
categories:
|
||||||
|
- presentaties
|
||||||
|
date: 2018-11-15T10:31:43+02:00
|
||||||
|
description: ""
|
||||||
|
layout: event-talk
|
||||||
|
tags:
|
||||||
|
- power-grid
|
||||||
|
- hacking
|
||||||
|
title: "Willem Westerhof - How an intern hacked the power grid"
|
||||||
|
speakers:
|
||||||
|
- willem-westerhof
|
||||||
|
presentation:
|
||||||
|
filename: 2018-11-15-willem-westerhof-how-an-intern-hacked-the-power-grid.pdf
|
||||||
|
recording:
|
||||||
|
platform: youtube
|
||||||
|
url:
|
||||||
|
---
|
||||||
|
|
||||||
|
## Abstract
|
||||||
|
|
||||||
|
The Horus scenario, is a scenario describing a large scale cyber attack targeting the vital electrical infrastructure. This scenario was both theoretically and practically proven to exist during the thesis of Willem Westerhof.
|
||||||
|
|
||||||
|
Horus is an ancient Egyptian god, referred to in many different ways, which is in most cases related to the heavens or the sun. In mythology, one of his eyes stands for the sun, the other one of his eyes stands for the moon. The Horus scenario focuses on a cyber attack on PhotoVoltaic-installations (solar energy systems) and “recreates” the impact that a Solar eclipse has on the stability of the power grid, hence the reference to the old god.
|
||||||
|
|
||||||
|
In essence, this means that a scenario was created and proven where a malicious hacker targets the electrical grid by focusing on PV-installations and succeeds in causing large scale (Nation-wide or even continental) power outages. If this attack is ever truly executed in the wild, it is expected to cost billions of euros and have a direct and severe impact on everybody’s lives.
|
||||||
|
|
||||||
|
## Biography
|
||||||
|
|
||||||
|
As a graduate with honours this (former)student performed serious ethical hacking work on PV-installations. He ended up disclosing a large number of vulnerabilities to the specific vendor, and mathematically proving that it was possible to cause large scale (nation-wide/continental wide) power outages using the discovered vulnerabilities.
|
||||||
|
|
||||||
|
Following his study he has worked as an ethical hacker/security specialist and done work on a large number of companies, different sectors, and specific products. He was also requested to advise the dutch national government (2e kamer) department of justice and safety regarding cyber security issues and how to deal with them.
|
||||||
|
|
||||||
|
He currently leads a small team of ethical hackers for the offensive security centre at ITsec security services. In addition, he provides workshops and trainings, performs penetration tests/vulnerability assessments, does research on password cracking and public speaking from time to time.
|
Reference in a new issue