Pwn Your Own

From Noisebridge
(Difference between revisions)
Jump to: navigation, search
(Pwn Your Own)
(About the Speaker)
 
(2 intermediate revisions by one user not shown)
Line 1: Line 1:
 
== Pwn Your Own ==
 
== Pwn Your Own ==
Every day we engage in activities online that are a danger to our privacy and even the security of our valuable or private information. In 2008 vice presidential candidate Sarah Palin's personal email was hacked using information publicly available online. Closer to home, every day tech savvy computer users grant themselves access to restricted internet access points owned by nabbers and local businesses. PYO is designed to help attendees become aware of tricks of the trade used by professionals to gain access to "secure information" and quickly bypass counter measures that the average individual or small business owner will put in place. This meeting will consist of a lecture and live demo of potentially malicious and in some cases semi-illegal (not in our context) practices showing just how little today's tech users are concerned about security. The lecture is followed by an explanation of how to better protect oneself from an attack. following the live demo will be a workshop on how to perform an attack to give participants a better understanding of how process works.<br><br>
+
Every day we engage in activities online that are a danger to our privacy and even the security of our valuable or private information. In 2008 vice presidential candidate Sarah Palin's personal email was hacked using information publicly available online. Closer to home, every day tech savvy computer users grant themselves access to restricted internet access points owned by nabbers and local businesses. PYO is designed to help attendees become aware of tricks of the trade used by professionals to gain access to "secure information" and quickly bypass countermeasures that the average individual or small business owner will put in place. This meeting will consist of a lecture and live demo of potentially malicious and in some cases semi-illegal (not in our context) practices showing just how little today's tech users are concerned about security. The lecture is followed by an explanation of how to better protect oneself from an attack. Following the live demo will be a workshop on how to perform an attack to give participants a better understanding of how process works.<br><br>
  
 
== About the Speaker ==
 
== About the Speaker ==
In the future there will be a more diverse speaker line up with guest speakers from around the Info-Sec world the first few months will feature Carl Sue as the main speaker as we build a following.<br><br>
+
In the future there will be a more diverse speaker line up with guest speakers from around the Info-Sec world. The first few months will feature Carl Sue as the main speaker as we build a following.<br><br>
 
'''Carl "Cobolt" Sue'''<br>
 
'''Carl "Cobolt" Sue'''<br>
A formally San Diego hacker Sue was a quick study of published documents and books from industry defining security professionals with a background in translating technical principals into layman terms and examples. Arias of expertise include Wireless security, lock picking, and network attack strategies. Other experience includes cryptology and study of protocols such as shared key and social network security validation. An up and comer in the security field new to the IRL community with over 12 years of underground training and growth in field.<br><br>
+
Formerly a San Diego hacker, Sue was a quick study of published documents and books from industry defining security professionals with a background in translating technical principals into layman terms and examples. Areas of expertise include wireless security, lock picking, and network attack strategies. Other experience includes cryptology and study of protocols, such as shared key and social network security validation. He is an up-and-comer in the security field new to the IRL community with over 12 years of underground training and growth in field.<br><br>
 
'''More Speakers to come'''
 
'''More Speakers to come'''

Latest revision as of 01:05, 7 February 2011

[edit] Pwn Your Own

Every day we engage in activities online that are a danger to our privacy and even the security of our valuable or private information. In 2008 vice presidential candidate Sarah Palin's personal email was hacked using information publicly available online. Closer to home, every day tech savvy computer users grant themselves access to restricted internet access points owned by nabbers and local businesses. PYO is designed to help attendees become aware of tricks of the trade used by professionals to gain access to "secure information" and quickly bypass countermeasures that the average individual or small business owner will put in place. This meeting will consist of a lecture and live demo of potentially malicious and in some cases semi-illegal (not in our context) practices showing just how little today's tech users are concerned about security. The lecture is followed by an explanation of how to better protect oneself from an attack. Following the live demo will be a workshop on how to perform an attack to give participants a better understanding of how process works.

[edit] About the Speaker

In the future there will be a more diverse speaker line up with guest speakers from around the Info-Sec world. The first few months will feature Carl Sue as the main speaker as we build a following.

Carl "Cobolt" Sue
Formerly a San Diego hacker, Sue was a quick study of published documents and books from industry defining security professionals with a background in translating technical principals into layman terms and examples. Areas of expertise include wireless security, lock picking, and network attack strategies. Other experience includes cryptology and study of protocols, such as shared key and social network security validation. He is an up-and-comer in the security field new to the IRL community with over 12 years of underground training and growth in field.

More Speakers to come

Personal tools