The SSH host key has changed on 8 April, 2022 to this one: SHA256:573uTBSeh74kvOo0HJXi5ijdzRm8me27suzNEDlGyrQ
Sources of the site gergely.polonkai.eu, Jekyll version
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 

1.4 KiB

Ethical Hacking 2012

date

2011-05-12T20:54:42Z

category

blog

tags

conference

url

blog/2011/5/12/ethical-hacking-2011.html

save_as

blog/2011/5/12/ethical-hacking-2011.html

status

published

author

Gergely Polonkai

Today I went to the Ethical Hacking conference with my boss. It was my first appearance at such conferences, but I hope there will be more. Although we just started to redesign our IT security infrastructure with a 90% clear goal, it was nice to hear that everything is vulnerable. I was thinking if we should sell all our IT equipments, fire all our colleagues (you know, to prevent social engineering), and move to the South Americas to herd llamas or sheep, so the only danger would be some lurking pumas or jaguars. Or I simply leave my old background image on my desktop, from the well-known game, which says: Trust is a weakness.

Anyways, the conference was really nice. We heard about the weaknesses of Android, Oracle, and even FireWire. They showed some demos about everything, exploited some free and commercial software with no problem at all. We have seen how much power the virtualisation admin has (although I think it can be prevented, but I’m not sure yet). However, in the end, we could see that the Cloud is secure (or at least it can be, in a few months or so), so I’m not totally pessimistic. See you next time at Hacktivity!