. Military Space News .
Hackers hacked at infamous DefCon gathering

Hackers shared ways to crack everything from mobile telephones, computer games and social networking websites to electronic hospital records and high security locks used at the White House.
by Staff Writers
Las Vegas, Nevada (AFP) Aug 11, 2008
In the end, it was hackers at DefCon that got hacked. After three days of software cracking duels and hacking seminars, self-described computer ninjas at the infamous gathering in Las Vegas found out Sunday that their online activities were hijacked without them catching on.

A standing-room crowd cheered admiringly as Tony Kapela and Alex Pilosov showed them how they were "pwned" by a simple technique that could be used to "steal the Internet."

"Pwned" is popular computer and video game culture slang playing off the word "owned" and is used to describe someone being totally dominated or humiliated online or in-game.

"It's a nearly invisible exploitation," Kapela said while revealing a hack that exploits fundamental Internet routing procedure to hijack online traffic unnoticed. "A level of invisibility that is unparalled."

The beauty of the technique presented by Alex Pilosov and Kapela is that hackers don't need to break into websites or plant malicious computer code to control and tamper with data travelling the Internet, the presentation showed.

Instead, the Internet is duped into sending people's data to hackers.

"Someone can passively intercept traffic," Kapela explained. "We can store, drop, filter, mutilate, grope, or modify data heading to you."

The tens of thousands of networks handling traffic on the Internet are programmed to trust each other for the best routes for data.

The choice of optimal routes is made instantly; decided by a network claiming the longest numerical Internet addresses for data destination.

A hacker can hijack traffic to and from websites of choice by adding enough numbers to computer addresses to have his or her network automatically deemed the best path for the data.

"We construct the man-in-the-middle attack on the Internet," Kapela said, referring to a classic hack in which someone gets between a computer user and their online destination.

"Internet routing is inherently trust based. We told the route that we know the best way to an address. A hacker could blast a lot of spam or launch a lot of phishing attacks."

Kapela and Pilosov proved their point by displaying for the rapt audience email, online searches and other online activity conducted that afternoon on the Internet connection used by DefCon attendees.

Hackers could use the attack to block access to websites or send traffic to bogus Web pages crafted to look like legitimate websites such as Twitter or Google, according to Kapela.

"Imagine all the wonderful stuff you could insert," Kapela said. "You can hijack stuff from China or the opposite. It may already be happening. Who could tell?"

The presentation capped a DefCon gathering attended by more than 8,000 people.

Hackers shared ways to crack everything from mobile telephones, computer games and social networking websites to electronic hospital records and high security locks used at the White House.

One seminar included a way to remotely turn off pacemakers regulating people's heartbeats.

A cavernous room was devoted to a non-stop "capture the flag" contest in which players hunched over laptop computers battled to seize and keep control of a network set up for the game.

Nightly "Hacker Jeopardy" drinking games required teams of players to correctly answer geeky computer questions with those giving wrong responses punished by having to guzzle beer.

Another contest challenged hackers to slip malicious software code past increasingly sophisticated anti-virus programs.

Hackers also faced off in lock picking contests; Guitar Hero video game competitions, and computer simulated shooting used by police for firearms training.

Hackers also competed in making spy balloons that floated above the casinos.

Community
Email This Article
Comment On This Article

Share This Article With Planet Earth
del.icio.usdel.icio.us DiggDigg RedditReddit
YahooMyWebYahooMyWeb GoogleGoogle FacebookFacebook



Related Links
Cyberwar - Internet Security News - Systems and Policy Issues



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


US subway card hackers targeted with lawsuit
Las Vegas, Nevada (AFP) Aug 9, 2008
Operators of a US city transit system were in court Saturday trying to stop hackers from showing thousands of their peers how to get free rides by cracking its fare "smart cards."







  • Pentagon confirms cancellation of naval exercise
  • US launches Georgia aid mission, mulls how to help the military
  • World lashes Russia over Georgia conflict
  • Russian jets stage Georgia raids as Moscow-US tensions worsen

  • US blacklists five Iranian entities citing nuclear, missile ties
  • New air force chiefs promise to raise nuclear standards
  • US against any Israeli strike on Iran: defence minister
  • Iran nuclear work will go on: Ahmadinejad

  • Indian Army Orders Additional BrahMos Cruise Missiles
  • ATK Conducts Successful AARGM Flight Test
  • New AMRAAM Variant Destroys Target During Recent Test
  • Raytheon AMRAAM Contract Enables Warfighters To Maintain Air Superiority

  • LockMart Achieves 12 Successful MDA Missions In A Row
  • Poland hoping to seal US missile deal: foreign minister
  • Turkey Set To Create Missile Shield In Ankara, Istanbul
  • LockMart Team Completes Testing Of Propulsion Component On MKV-L

  • NASA evaluates new wing sensor
  • Russia And China May Co-Design New Passenger Plane
  • China Southern Airlines managers take paycut due to oil prices
  • Air China says it is to buy 45 Boeing aircraft

  • One Dollar Headset Fix Improves Predator Mission
  • Elbit to Equip Australia With Additional Skylark I UAVs
  • Boeing Team Test Short-Wave Infrared Camera On ScanEagle
  • Germany denies Pentagon claim of seeking armed drones

  • Analysis: Oversight of contractors lags
  • Airlift of Georgian troops from Iraq near complete: Pentagon
  • Dogs of War: Contractors vs. genocide?
  • Georgia to withdraw all of its troops from Iraq

  • Switzerland Puts Gripen To The Test
  • Boeing's Forst P-8A Poseidon Moves From Final Assembly To Preflight
  • QinetiQ Awarded DARPA Contract For New Sensor System
  • Sniper ATP-Equipped B-1B Has Combat First

  • The content herein, unless otherwise known to be public domain, are Copyright 1995-2007 - SpaceDaily.AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement