The official hash tag for HITBSecConf2010 - Amsterdam is #HITB2010AMS
Come see your tweets fly around our on-site Twitter wall!

HITB Labs

Introduced in 2008, the HITB Labs form the third track in our triple-track line up. Catering for only 60 attendees, these sessions are intensive, hands-on presentations that require audience interaction so please bring your own laptops if you intend to attend. Seats are given out on a first come first serve basis so be sure to be at the room at least 10 minutes before the session commences.

Lab Schedule

1st July 2010

10:30 – 12:30 – LAB 1 – METASM LAB
Alexander Gazet (Sogeti ESEC Research & Development) & Yoann Guillot (Sogeti ESEC Research & Development)

13:30 – 15:30 – LAB 2 – ADVANCED LOCK PICKING & PHYSICAL SECURITY BYPASS
TOOOL.nl

2nd July 2010

10:30 – 12:30 – LAB 3 – MALWARE ANALYSIS WORKSHOP (TOOLS & METHODOLOGIES)
Wes Brown (Principal Consultant, IOActive)

13:30 – 15:30 – LAB 4 – ARDUINO LAB
Barry van Kampen (ITQ / HITB Crew .NL)


LAB 1 – METASM LAB

Malware code gets more and more sophisticated, requiring always more powerful tools to handle. Metasm is a framework to manipulate binary code, and it is well adapted to work on this kind of programs. The framework is full-ruby, which means you can script, automate or replace any part of it. This course will introduce you to the basics of the framework, and will also introduce some advanced features, so that you are well armed to face binary protected code.

LAB 2 – TOOOL .NL ADVANCED LOCK PICKING & PHYSICAL SECURITY BYPASS

Toool is the The Open Organisation Of Lockpickers, a growing group of enthusiasts interested in locks, keys and ways of opening locks without keys. On this site you will find information about us getting together to practice our skills, about the conventions and championships we organize and lots and lots of information about our hobby

LAB 3 – MALWARE ANALYSIS WORKSHOP (TOOLS & METHODOLOGIES

Wes Brown, a Principal Security Consultant with IOActive, has spoken in the past about automating malware. Now that a framework has been established to analyze malware, a workshop will be conducted on methodologies and techniques used to conduct this process manually but aided by automated tools. A LiveCD will be provided to workshop attendees containing a full malware analysis environment. This environment is a further evolution of the prototype that was shared in the past, and is user-extendable should you desire to add your own tools and modifications to it.

Among the techniques reviewed will be memory inspection, debugging, hooking, as well as PE file examination. Techniques that malware use to avoid being inspected will be discussed along with ways to work around them. The malware workshop environment will also be walked through and each tool demonstrated so that the workshop attendee would leave with a good grasp of how and when to use them.

LAB 4 – ARDUINO LAB

Arduino is an open-source electronics prototyping platform based on flexible, easy-to-use hardware and software. It’s intended for artists, designers, hobbyists, and anyone interested in creating interactive objects or environments. This workshop will give you an impression what Arduino is, what the hardware platform and extensions does, how you can work with the hardware and interface. Finally we will show you step by step how we made one (may-be more) of our projects like Blinky (our LED board), the Garduino (for Garden automation) or our Hackerspace automation system. Afterwards you are able to do some hands-on in the Hackerspaces village.

Each lab session can only accommodate a maximum of 60 attendees! Please bring your own WiFi enabled laptops!