April 13, 2019
Jeff TothImprovised Physical Security Tools
Ever start unpacking your kit on a physical security assessment and then you realize you left your under door tool at home? This talk will teach you how to head into the hardware store and make whatever tools you need. I'll demonstrate live on stage how to build several physical security tools on the fly!
Trevor HartmanCertificate Cataloging for Target Footprinting
The purpose of this project was twofold, to build parallelized code to quickly scan the vast IP ranges of the Internet utilizing a stack of Raspberry PIs, and secondly to catalog those IPs with useful information contained within SSL certificates for data mining and foot-printing purposes. The aim was to garner SSL information and cull it to reveal date like hidden Origin IPs, active servers with no DNS records but identifiable SSL subject or subject alternative names, and to reveal unadvertised vendor relationships.
Will CaputCash in the Isles: How Gift Cards are Easily Hacked
It is commonly thought that gift cards must be activated to have any monetary value. Often displayed on countertops and lining grocery store aisles, seemingly worthless unactivated gift cards are free for anyone to grab a handful. However, weaker security features than the average credit card makes these gift cards nearly as valuable as cash. Mass produced, their numbers follow a predictable pattern and have limited built-in security, such as chip and pin, to prevent fraud.
Do you have ipv6 enabled on your network? Are you actively managing it like you would ipv4? This talk focuses on ipv6 attack tools and how hackers are using them to MITM your clients.
Zach MinnekerNational Cyber Security Challenge
Every semester Chico State Computer Science students participate the National Cyber League security challenge, a jeopardy style CTF. For the past three semesters, a Chico State team has placed in the top ten out of over 250 teams nationwide. Members of the Chico State NCL team will demonstrate tools and techniques for reverse engineering using an example from the NCL, and show how exposure to new challenges can lead team members to develop new skills.
Sean WorthingtonBeyond Bitcoin
Sean Worthington is the author of Beyond Bitcoin: The Future of Digital Currency. He serves as the President of the CloudCoin Consortium and is the inventor of a new privacy technology called the RAIDA (Redundant Array of Independent Detection Agents). Sean is a candidate for a Ph.D. Computer Information Systems and works as a Tenured Computer Science Instructor at Butte College California.
Stephen PhillipHacking Human Perception - The Next Wave of Virtual Reality
There are a lot of "realities" being talked about these days, like virtual reality, augmented reality, and mixed reality. At risk of sounding like an overly intellectual philosopher, it raises the question of "What is reality?" Reality is what you perceive to be real, and we all have the privilege of living during a time where we can witness the progression of technologies that ultimately change what we perceive.