Pwn Your Own: Difference between revisions

From Noisebridge
Jump to navigation Jump to search
No edit summary
 
(4 intermediate revisions by one other user not shown)
Line 1: Line 1:
== Pwn Your Own ==
== Pwn Your Own ==
Every day we enact in activities online that are a danger to our privacy and even the security of our valuable or privet information. In 2008 vice presidential candidate Sarah Palin's Personal email was hacked using information publicly available online, closer to home every day tech savvy computer users grant themselves access to restricted internet access points owned by nabbers and local businesses. PYO is designed to help attendees become aware of tricks of the trade used by professionals to gain access to "secure information" and quickly bypass counter masures that the average individual or small business owner will put in place. This meeting will consist of a lecture and live demo of potentially malicious and in some cases semi-illegal (not in our context) practices showing just how little todays tech users are concerned about security, followed by an explanation of how to better protect ones self from the attack. flowing the live demo will be a workshop on how to preform the attack to give participants a better understanding of how process works.<br><br>
Every day we engage in activities online that are a danger to our privacy and even the security of our valuable or private information. In 2008 vice presidential candidate Sarah Palin's personal email was hacked using information publicly available online. Closer to home, every day tech savvy computer users grant themselves access to restricted internet access points owned by nabbers and local businesses. PYO is designed to help attendees become aware of tricks of the trade used by professionals to gain access to "secure information" and quickly bypass countermeasures that the average individual or small business owner will put in place. This meeting will consist of a lecture and live demo of potentially malicious and in some cases semi-illegal (not in our context) practices showing just how little today's tech users are concerned about security. The lecture is followed by an explanation of how to better protect oneself from an attack. Following the live demo will be a workshop on how to perform an attack to give participants a better understanding of how process works.<br><br>


== About the Speaker ==
== About the Speaker ==
In the future there will be a more diverse speaker line up with guest speakers from around the Info-Sec world the first few months will feature Carl Sue as the main speaker as we build a following.<br><br>
In the future there will be a more diverse speaker line up with guest speakers from around the Info-Sec world. The first few months will feature Carl Sue as the main speaker as we build a following.<br><br>
'''Carl "Cobolt" Sue'''<br>
'''Carl "Cobolt" Sue'''<br>
A formally San Diego hacker Sue was a quick study of published documents and books from industry defining security professionals with a background in translating technical principals into layman terms and examples. Arias of expertise include Wireless security, lock picking, and network attack strategies. Other experience includes cryptology and study of protocols such as shared key and social network security validation. An up and comer in the security field new to the IRL community with over 12 years of underground training and growth in field.<br><br>
Formerly a San Diego hacker, Sue was a quick study of published documents and books from industry defining security professionals with a background in translating technical principals into layman terms and examples. Areas of expertise include wireless security, lock picking, and network attack strategies. Other experience includes cryptology and study of protocols, such as shared key and social network security validation. He is an up-and-comer in the security field new to the IRL community with over 12 years of underground training and growth in field.<br><br>
'''More Speakers to come'''
'''More Speakers to come'''

Latest revision as of 01:05, 7 February 2011

Pwn Your Own[edit]

Every day we engage in activities online that are a danger to our privacy and even the security of our valuable or private information. In 2008 vice presidential candidate Sarah Palin's personal email was hacked using information publicly available online. Closer to home, every day tech savvy computer users grant themselves access to restricted internet access points owned by nabbers and local businesses. PYO is designed to help attendees become aware of tricks of the trade used by professionals to gain access to "secure information" and quickly bypass countermeasures that the average individual or small business owner will put in place. This meeting will consist of a lecture and live demo of potentially malicious and in some cases semi-illegal (not in our context) practices showing just how little today's tech users are concerned about security. The lecture is followed by an explanation of how to better protect oneself from an attack. Following the live demo will be a workshop on how to perform an attack to give participants a better understanding of how process works.

About the Speaker[edit]

In the future there will be a more diverse speaker line up with guest speakers from around the Info-Sec world. The first few months will feature Carl Sue as the main speaker as we build a following.

Carl "Cobolt" Sue
Formerly a San Diego hacker, Sue was a quick study of published documents and books from industry defining security professionals with a background in translating technical principals into layman terms and examples. Areas of expertise include wireless security, lock picking, and network attack strategies. Other experience includes cryptology and study of protocols, such as shared key and social network security validation. He is an up-and-comer in the security field new to the IRL community with over 12 years of underground training and growth in field.

More Speakers to come