HyperSec Consulting Group Presentations & Press Info


    As HyperSec Consulting (G-Con Security).
 
 
Date: 02-12-2002
Place: G-CON One
Conference: Advanced PE steganographic infection [Proof Concept Parasites/Infection]
Speaker: Luis Guillermo Castañeda Estañol
Resume: Memory Usurpation bypassing Permises
Arbitrary under Windows 2000/NT/XP, Steganographical
Box Making, Parasitary Infection, Deploy of the
steganographic Machine by security common Failures
under windows kernel.
Details: http://www.g-con.org/eng/expo.php
Download: http://www.g-con.org/speakers/Proof_concept_parasites/
 
Date: 02-12-2002
Place: G-CON One
Conference: Taking over a corporative network in less than 50 lines of C code
Speaker Enrique Alfonso Sanchez Montellano
Resume: Taking over a corporative network in less than 50 lines of C code
Details: http://www.g-con.org/eng/expo.php
Download: http://www.g-con.org/speakers/50_Lines_Code/Pres4.ppt
   
 
Date: 02-12-2002
Place: G-CON One
Conference: WarDriving in Mexico City
Speaker Eduardo Ruiz Duarte / Rommel Sanchez Verdejo
Resume: Wardriving for wireless networks on Mexico city.
Details: http://www.g-con.org/eng/expo.php
Download: http://www.g-con.org/speakers/Wardriving/Pres1.ppt
 
  Date: 03-12-2002
  Place: G-CON One
  Conference: Beating the forensics analizis (Stego tool)
  Speaker Enrique Alfonso Sanchez Montellano
  Resume: Beating The forensics Analisis.
  Details: http://www.g-con.org/eng/expo.php
  Download: http://www.g-con.org/speakers/Stego/Pres9.ppt
     
 
Date: 03-12-2000
Place: G-CON One
Conference: Project Sunglasses
Speaker: Tiago Assumpçao
Resume: In less words... breaking burneye
Details: http://www.g-con.org/eng/expo.php
Download: http://www.g-con.org/speakers/Project_Sunglasses/Pres6.ppt
   
 
Date: 18-12-2003  
Place: G-CON Two  
Conference: Lea: Design, Implementation and altivec cryptographic implementations  
Speaker: Eduardo Ruiz Duarte  
Resume: Eduardo will show us how to implement your own encryption and steganography, don't get caught and get jailed for not encripting your stuff!  
Details: http://www.two.g-con.org/eng/?display=10  
Download: http://www.hypersec.co.uk/press/cipher.ppt  
 
 
Date: 18-12-2003  
Place: G-CON Two  
Conference: Hacker targeting, getting to your pray no matter what  
Speaker: Diego Bauche Madero / Enrique Alfonso Sanchez Montellano  
Resume: Eduardo will show us how to implement your own encryption and steganography, don't get caught and get jailed for not encripting your stuff!  
Details: http://www.two.g-con.org/eng/?display=10  
Download: http://www.hypersec.co.uk/press/targeting.ppt  
 
 
Date: 19-12-2003
Place: G-CON Two
Conference: Advanced Polymorphic 'engines' - theorical and practical analisis, Metamorphism Exposed.  
Speaker: Luis Guillermo Castañeda
Resume: Researching about the most advanced computer virus stealth technique, metamorphism.  
Details: http://www.two.g-con.org/eng/?display=10
Download: http://www.hypersec.co.uk/press/meta.ppt
 
 
Date: 19-12-2003  
Place: G-CON Two  
Workshop: How to write and disassemble malware code.  
Speaker: Luis Guillermo Castañeda  
Resume: Writing your own viruses you could understand how to defeat against them, and disassembling malware code you understand everything about new viruses, rare binaries, etc.  
Details: http://www.two.g-con.org/eng/?display=10  
Download: http://www.hypersec.co.uk/press/writingvirus.ppt  
 
 
Date: 19-12-2003  
Place: G-CON Two  
Workshop: How to implement your own encryption algorithm  
Speaker: Eduardo Ruiz Duarte  
Resume: In this workshop you are going to adquire the skills to write your
own encryption algorithm.
 
Details: http://www.two.g-con.org/eng/?display=10  
Download: http://www.hypersec.co.uk/press/cipher2.ppt  
 
 
Date: 10-02-2004
Place: CONSOL (Congreso Nacional de Software Libre).
Conference: Analisis Forense Criminalistico con OSS
Speaker: Luis Guillermo Castañeda / Eduardo Ruiz Duarte
Resume: Researching about the most advanced computer virus stealth technique, metamorphism.  
Details: https://www.consol.org.mx/2004/comas/general/proposals/101
Download: http://www.hypersec.co.uk/press/anal-oss.ppt

    As KelsiSiler
 
 
Date: 01-04-2002  
Place: Contrainteligencia y Seguridad Logica  
Conference: The ViruSNORT Project  
Speaker: Luis Guillermo Castañeda  
Resume: Introducing, the virusnort project.  
Details: http://www.ci.kelsisiler.com  
Download: http://www.research.kelsisiler.com/press/virusnort.ppt  
 
 
Date: 01-04-2002  
Place: Contrainteligencia y Seguridad Logica  
Conference: Integer Overflows Exposed  
Speaker: Enrique Alfonso Sanchez Montellano  
Resume: Exposing integer overflow exploitaition  
Details: http://www.ci.kelsisiler.com  
Download: http://www.research.kelsisiler.com/press/iover.ppt  
 
 
Date: 01-04-2002
Place: Contrainteligencia y Seguridad Logica
Conference: LEA, not Load Efective Address
Speaker: Eduardo Ruiz Duarte
Resume: LEA, not Effective Load Address.  
Details: http://www.ci.kelsisiler.com
Download: http://www.research.kelsisiler.com/press/cipher.ppt
 
 
Date: 03-04-2003  
Place: AMIS(Asociacion Mexicana de Instituciones de Seguros)
Hewlet Packard Mexico
 
Conference: KelsiSiler Security  
Speaker: Enrique Alfonso Sanchez Montellano  
Resume: Explanations about security services and products  
Details: Null  
Download:
Press:
http://www.research.kelsisiler.com/press/sec2.ppt
http://www.research.kelsisiler.com/press/amis-press.jpg
 
 
 
Date: 30-04-2003  
Place: Universidad del Valle de Mexico  
Conference: Seguridad un mito alcanzable?  
Speaker: Enrique Alfonso Sanchez Montellano  
Resume: A chat about computer security  
Details: Null  
Download: http://presentaciones.kelsisiler.com/  
 
 
Date: 06-05-2003  
Place: Presidencia de la Republica  
Conference: Seguridad un mito alcanzable?  
Speaker: Enrique Alfonso Sanchez Montellano  
Resume: A chat about computer security  
Details: Null  
Download: http://www.research.kelsisiler.com/press/sec.ppt  

    As KasperskyLab Latin America
 
 
Date: Every 3 months.
Place: ITESM (DEGREE)
Conference: A journey Into Virii Programers Life
Speaker: Luis Guillermo Castañeda / Eduardo Ruiz Duarte
Resume: Detailed description about virii making, virii research (types) and the virii stuff indeed.  
Details: Null
Download: http://www.research.kelsisiler.com/press/virii-1.ppt 
 
 
Date: 20-07-2002  
Place: ITESM CEM MASTER DEGREE  
Conference: Steganographic analisis "the rupture of the *crypt*"
& Steganographic Memory Usurpation.
 
Speaker: Luis Guillermo Castañeda / Eduardo Ruiz Duarte  
Resume: El analisis esteganografico es una tecnica para romper
con codigos esteganograficos, se basa en la deteccion y la ruptura
de las llavez esteganograficas de los algoritmos en los que se
encuentran codificados ciertos tipos de datos.
Para este existen ciertas clases de ataques las cuales
definiremos, asi como los ataques que por medio de ....
 
Details: 1.-Steganographic Immage Diathering [SIT]. Ataque a ruptura de codigo esteganografico en imagenes. [Deteccion y ruptura]
2.-Watermark Rupture [WR]. Ataque de ruptura de watermarks en imagenes. Deteccion y ruptura, asi como verificacion de certificados en Watermarks.
3.-Steganographic Bruteforce Attack. [SBA].Ataque de ruptura a código por señales esteganográficas basadas en diccionarios.
4.-Steganographic Bruteforce Memory Attack [SBMA]. Ataque de ruptura de máquinas esteganograficas por ataques de denegacionde servicio a aplicaciones o rupturas de offsets.
5.-Steganographic Binary Code Detection [SBCD] Deteccion y determinacion de código esteganografico en binarios y medios cifrados.

The Steganalisis FrameWork Exposed

**********************************************
1.-Steganographic PE Memory infection. Ataque de usurpación de memoria por ejecución de un binario PE [Portable Executable] por medio de una máquina steganográfica.
2.-Steganographic ELF Memory infection. Ataque de usurpacion de memoria en sistemas unix que pueden correr binarios ELF [Executable Linking Format].
 
Download: Null  
 
 
Date: Every 3 months.  
Place: ITESM (DEGREE)  
Conference: Virus Detection and Prevention [How the antivirus works]  
Speaker: Luis Guillermo Castañeda Estañol  
Resume: Detailed description of virus detection techniques.    
Details: Null  
Download: http://www.research.kelsisiler.com/press/virii.ppt  
 
 
Date: 28-08-03  
Place: IPN [ESIME]  
Conference: Promiscuous Mode virus Detection and Prevention  
Speaker: Luis Guillermo Castañeda  
Resume: Exposing ViruSNORT Project  
Details: Segunda semana de la seguridad informatica  
Download: http://www.research.kelsisiler.com/press/pmvd.ppt  
 
 
Date: 28-10-03  
Place: INFOSEC (Costarica)  
Conference: Promiscuous Mode virus Detection and Prevention  
Speaker: Luis Guillermo Castañeda  
Resume: Exposing ViruSNORT Project  
Details: Null  
Download: http://www.hypersec.co.uk/press/pvmd.ppt  

   Press



Latest Presentations and Shows
 
 

HyperSec is a trademark of HyperSec Consulting Group UK. All the logos, images, code and information
are property of his owners. HyperSec Consulting Group does not approve any illegal practice that
uses information contained within this site, for more information, please read the EULA of this page.
HyperSec Consulting Group UK.

Profile::

  Public-20040226

DataBase::

  HyperSec Consulting Gr.

Engine::

  1.0-stable