This year’s LayerOne Hacking and Security Conference is right around the corner. But it’s not too late to attend. You can still get a block-rate hotel room if you register by the end of April, and registration for the two-day event only costs a hundred bucks. It’s scheduled for May 26th and 27th in Anaheim California.
As usual, the Speaker lineup is quite impressive. Everything from Android Malware to embedded exploits and botnet adventures will be discussed. And then there’s the perennial favorite lock picking and hardware hacking villages. Did we mention badges? We’d bet it was this pick-and-place machine which helped assemble this year’s pile of badges. We haven’t seen any word on what they might include, but there’s a hacking contest so plan to pack your tools.
Why build a pick and place machine from the ground up when you can start with a full featured, but non-functional unit, and bring it back to life. That’s exactly what [Charliex] is doing with this Juki 360 rebuild.
A bit of background is in order here. [Charliex] is working alongside other hackers at Null Space Labs to restore this hardware. The Los Angeles based hackerspace sponsored the hardware badges at this year’s LayerOne, each of which was hand assembled. They’d like to avoid that tedium next year, which led to this project.
The seller of the used Juki 360 listed it in working condition, but it seems that they were polishing a turd since it is basically non-functional. The link at the top of this post is the second testimonial of their work so far. It covers the use of an Arduino board as a replacement interface, as well as a bunch of sensor repair, pneumatic testing, and motor driver firmware tweaking. If you’d like to see the initial teardown and hardware diagnostics don’t miss the first post in their adventure.
Annual hacker conference LayerOne will be held May 23-24th in Anaheim, CA. They’ve completed the speaker lineup and have quite a few interesting talks. [David Bryan] Will be focusing on practical hacking with the GNU Radio. It’s a software defined radio that we’ve covered in the past for GSM cracking. [Datagram] will present lockpicking forensics. While lockingpicking isn’t as obvious as brute force entry, it still leaves behind evidence. He’s launched lockpickingforensics.com as a companion to this talk. LayerOne is definitely worth checking out if you’re in the Los Angeles area.
Almost every security conference we’ve attended in the last year has uploaded videos from their speaker tracks. Explore the archives below, and you’re bound to find an interesting talk.
- Defcon 15, Las Vegas, NV
- ToorCon 9, San Diego, CA
- 24C3, Berlin, Germany
- ShmooCon 2008, Washington D.C.
- Notacon 5, Cleveland, OH
- LayerOne 2008, Pasadena, CA
One of the best tools we saw at LayerOne was the Exploit-Me series presented by [Dan Sinclair]. Security Compass created these tools to help developers easily identify cross site scripting (XSS) and SQL injection vulnerabilities.
Continue reading “Exploit-Me Firefox XSS And SQL Scanning Addon”