Pumpcon 2012 Speakers:

Travis Muthafuckin' Goodspeed

A PHY Layer Exploit for Digital Radio

Abstract
And the Lord spake to all the Neighbors, saying ``SQL injection hast offended mine heart, for it is only used in hacking websites. I, in my infinite wisdom, have already seen every way in which one might fail to properly escape strings.''

And, Lo!, the Pastor Manul Laphroaig spake back to the Lord, saying ``In 802.11b, 802.15.4, and many other digital radios, you can remotely inject a PHY Layer packet by including it in the payload of a larger packet.''
And the Lord rebuked the Pastor, asking ``Why is that useful?''
And the Pastor bragged, ``I can email a wifi beacon.''
And the Lord asked, ``How the Hell?''
And the Pastor said, ``Read the fucking paper.''

http://travisgoodspeed.blogspot.com/2011/09/remotely-exploiting-phy-layer.html http://www.usenix.org/events/woot11/tech/final_files/Goodspeed.pdf


Cr1t1c4l ma55

Pirate Radio: a proposed man in the middle attack for commercial broadcast radio.

Abstract
This talk will reveal some dirty little secrets that broadcast engineers don't want you to know. We will explore how radio stations can be re-purposed (if only temporarily) to do our evil bidding by leveraging an RF based man-in-the-middle style attack against the Studio Transmitter Link.

Cr1t1c4l ma55 has been playing with electronics for the better part of his life. He has been a licensed ham radio operator for 20 years, and enjoys blending his knowledge of two radio communications and electronics with his need to break things and make them better (or bury the failures and erase all evidence of having tried.) His friends transcend any one group label, but like him, are always sharing their knowledge with each other to eventually end up as one critical mass of knowledge.


Grecs

Disruptive Security Chaos ... for Good

Abstract
Typically as organizations become more successful they often leave behind the agile and innovative methods that got them there and become more bureaucratic to protect the success they've achieved. Often this protection involves the implementation of strict policies meant to control the otherwise uncontrollable in a desperate attempt obtain conformity. One of these policies usually addresses organizational IT solutions such as standard workstation or laptops as well as an agreed upon statement of how those resources should be used. As "hacking" has become more prominent organizational leadership has updated these IT policies to include statements limiting experimentation of this practice on the internal network even for curiosity purposes. Is this the right approach? Does it really make the internal network more secure? One possible thought experiment is to permit, and actually encourage, employees who are passionate about security to use security tools and techniques to test the internal environment. Similar to Google and Facebook, even reward employees for bugs or vulnerabilities discovered instead of limiting them. Instead of a small team testing periodically in a limited scope, the organization gains an ongoing and unlimited crowd-sourced testing group that in certain ways mimics the NetFlix Chaos Monkey. Yeah, these employees could take a production system down by accident but on the other hand this could point out flaws that could be fixed and result in a more resiliency.


WarezJoe

How to Own a Building: Commanding the Physical World with BacNET

Abstract
Synopsis: The integration of computer technology to monitor the inner works of large office buildings, factories and plants has been evolving for years. These types of systems are often referred to as Building Automation or Building Management Systems (BMS). Companies uses these systems to monitor a myriad of sensors, gauges and alarms that provide statistics about equipment usage as well as inform technicians when a system is not functioning correctly. What use to be simple alerting has morphed into highly complex network enabled systems that provide complete operational control over such things as HVAC, elevators, electrical & water supply and even fire suppression systems. That.s right, imagine being able to control a company.s elevators or electrical systems from the comfort of your PC! But wait! these systems wouldn.t be Internet accessible, would they....? In this talk we.ll take a closer look at how these systems work as well as a hacker.s view into the BacNET protocols. I.ll be introducing a collection of tools that pentesters and system admins could use to help identify BacNET enabled systems as well as test their solvency against attack, spoofing and denial of service. .These machines are keeping us alive ... While others are coming to kill us!!!!.


Law-Talking-Guy

Some legal crap

Abstract / Bio
Because we all know Al3x will get up and ramble on about some legall shit to kill time while we wait for the other speakers to sober up enough to give their talks.





PLUS Special Surprise Guests!!! (might be Josh...)