Registrujte se

Otevřený a svobodný software

Otevřené operační systémy a programy, webové technologie, databáze, virtualizace, kontejnery

Hledáme cestu v budově

Přednáška | D0206 | Sobota 17:00 - 17:45 |

OpenStreetMapy nám otevřely mapy po celém světe, ale budovy jsou jiná pohádka. Nefunguje tam GPS a jediný plán budovy je často požární evakuační plán. Nakreslení mapy budovy je více či méně snadný úkol, ale zjistit kde jsem v budově už může být oříšek. V této prezentaci se chci zaměřit na to, jak se najít v budově. Jaké jsou postupy? Co vše je k tomu potřeba? Jak náročné to je? Je to už použitelné? Je to vůbec proveditelné?

Otevřený a svobodný software Hardware Otevřený a svobodný software Teorie Lokalizace Bezdrátové sítě Wireless
avatar

Dominik Matoulek

Ruby developer

Pokročilejší síťování v Linuxu

Přednáška | D0207 | Neděle 14:00 - 14:45 |

Nastavit IP adresu, masku a bránu není žádný velký problém, když je ale počítač připojen do více než jedné sítě, situace se stává trochu složitější a často si s obyčejnou směrovací tabulkou nevystačíme – třeba když konfigurujeme připojení do VPN, nebo dokonce do více VPN současně. V přednášce si ukážeme, k čemu jsou dobré a jak se v Linuxu konfigurují technologie jako Policy Based Routing, nebo Network Namespaces.

Požadavky:
Zhruba tuší, jak funguje internet

Otevřený a svobodný software Otevřený a svobodný software Linux Internet IPv4 IPv6 Policy routing VPN
avatar

Ondřej Caletka

administrátor a vývojář
CESNET, z. s. p. o.

IoT a Hnutí tvůrců

DIY, coworking, hackathon, tuning, 3D tisk, Internet of things (IoT), Arduino, ESP32, ESP8266, Raspberry Pi

Jak bootuje Turris MOX

Přednáška | E112 | Sobota 13:00 - 13:45

Turris MOX je modularni opensource router, ktery muze bootovat i po siti z Omnie. Uz samotna modularity predstavuje hromadu problemu, ale jak k tomu jeste zaridit bezpecne sitove bootovani? O tom bude tato prednaska - samozrejme ve vysledku snadno a rychle pomoci opensource :-)

IoT a Hnutí tvůrců Embedded ARM Network Turris Security Boot
avatar

Michal Hrusecky


CZ.NIC

Balíčkování pro OpenWrt

Workshop | E105 | Neděle 10:00 - 12:45

Úvod do tvorby OpenWrt balíkčů pro úplné začátečníky. V první části workshopu si vyzkoušíte vytvořit balíček pro vybraný program. Ukážeme vám triky a balíčkovací best practices. K testování vám půjčíme routery Turris Omnia. V druhé části si budete moct vytvořit balíček pro vámi zvolenou aplikaci. Po workshopu byste měli být schopni vytvořit funční balíček, který bude možno poslat do upstreamu.

Požadavky:
Vlastní notebook s předinstalovaným OS Linux

IoT a Hnutí tvůrců Network Turris OpenWrt Packaging
avatar

Jan Pavlinec


CZ.NIC / Turris
avatar

Josef Schlehofer


CZ.NIC/Turris

Bezpečnost a soukromí

Soukromí, šifrování, sledování, záloha dat, monitoring, audit, hesla, hacking, cracking, malware, phishing

Bezpečnosť v DNS

Přednáška | D105 | Neděle 10:00 - 10:45 |

DNS bol jeden z posledných protokolov, ktorý nemal možnosť bezpečného prenosu dát a aj napriek tomu nim prenášame citlivé údaje. V prednáške sa pozrieme, co sa v tomto smere zmenilo a aké máme možnosti - z pohľadu užívateľa a administrátora.

Bezpečnost a soukromí Security Bezpečnost a soukromí HTTPS TLS Network Security DNS
avatar

Ľubor Jurena


skHosting.eu

Saving the World: Increasing Efficiency and Accuracy of Encrypted Traffic Analysis of People at Risk

Přednáška | D105 | Neděle 11:00 - 11:45 |

Activists, journalists and human rights defenders are in hostile environments and in constant danger as they deal with sensitive information. They are often exposed to targeted and sophisticated attacks. We designed the Emergency VPN which allows us to help people in danger by analyzing their mobile traffic. This way we can identify if a device is infected or find its vulnerabilities that may put the user at risk. However, the biggest challenge for the network analyst is to quickly and accurately detect malicious encrypted traffic. The speed of the analysis is a critical factor in this work. To improve the speed of the analysis of HTTPS traffic, we combine specific features extracted from HTTPS traffic with state of the art machine learning methods. In this talk we will show how this combination allowed us to increase the efficiency and accuracy of Encrypted traffic analysis of people at risk. In a live demo, we will demonstrate a detection of malicious traffic in a mobile device.

Bezpečnost a soukromí Security Data Bezpečnost a soukromí HTTPS TLS Network Security Malware TLS 1.2 TLS 1.3 Machine Learning Traffic Civil society Hacktivity
avatar

František Střasák

výzkumník
Centrum Umělé Inteligence FEL ČVUT
avatar

Jan Fajfer

Výzkumník
Centrum Umělé Inteligence ČVUT
avatar

Veronica Valeros

Výzkumník
Centrum Umělé Inteligence ČVUT

Fantastic Attacks and How Kalipso can Find Them

Přednáška | D105 | Neděle 13:00 - 13:45 |

Detecting attacks in a network is very hard due to the huge amount of information, and the similarity between attacks and normal traffic. Knowing the traffic of your computer is hard enough, more so in a large network. An analyst has to decide and block infected computers without being aware of all the details. A company may afford a large detection system based on big data, but what about you? Slips is a network intrusion detection system that uses flows, behaviors, and machine learning to detect attacks in a network. Based on Zeek and with a modular structure it is easy to extend the system with new models of your design, leaving the final decision to an internal ensembling algorithm. From flow-based port scan detection to anomaly detection, threat intelligence, VirusTotal integration, geolocation and machine learning profiling, slips includes modules that can give a comprehensive high-level view of your security. However, it is very hard to show this information clearly and to include the analyst in the process. Enter Kalipso. Kalipso is a nodejs-based terminal interface designed to display the complexity of the information produced by Slips. This interface helps traffic analysts to quickly get a superficial understanding of what is going on in the network. With animated graphs and charts based on the blessed and the blessed-contrib libraries, it is possible to configure and connect data from Slips meaningfully. After slips filled the redis database, Kalipso is ready to display the information. It creates a tree with all IP addresses in the traffic, separating the data in time windows. For every IP and time window, it shows a timeline, detections, and a map with the geolocation of all the destination IPs contacted. Each IP address is modeled using stacked bars and tables based on the destination ports contacted, destination IPs contacted, source ports used, and ports opened as a server. Different windows are accessed with hotkeys, and important information is highlighted with several font types and colors. Distinctive outgoing connections are displayed together with their VirusTotal information and behavioral model. Complete with the ability to copy information to the clipboard or save it into a file, Kalipso allows the analyst to rapidly overview what is happening in a network.

Bezpečnost a soukromí Security Bezpečnost a soukromí Attacks machine learning nodejs Interface Python Free software malware OWASP
avatar

Sebastian Garcia

Director
Stratosphere
avatar

Kamila Babayeva

Reseacher
Civilsphere

Ludus: Securing your router with Game Theory

Přednáška | D0207 | Neděle 15:00 - 15:45 |

The rising number of attacks against home network routers brings up the importance of securing these devices better. However, the range of available means of defense for home routers is limited. Additional constraints, such as performance of the devices has to be considered when designing a defense strategy. In our talk we will present project Ludus, which is the result of almost 3 years of research in this collaboration with CZ.NIC - a manufacturer of Turris routers. It brings the idea of collaborative defense for a large groups of users. That means users can join forces to defend against attackers, and help each other to better secure their devices. Our open-source tool, Ludus allows users to utilize our research and improve the security of their Turris routers and other OpenWRT devices right out of the box. With the help of this tool each individual can improve their own router security by joining together with the whole community of users. The primary defense mechanism in our tool is the honeypot: a trap which is designed to stop or stall the attacker while extracting information about the intruder and the course of the attack. There are dozens of types of honeypots, but bearing in mind the technical limitations of the devices, users have to choose where to deploy them. Even though the concept of honeypots dates back more than 20 years, nowadays the development of the technology seems to be somehow stalling. The proposed method is a new approach to automatic honeypot deployment based on Game Theory and explained in detail in the talk. Moreover, we discuss the problem of objective measurement of the defense strategy efficiency. For that, we propose a combination of security metrics as well as an overall measure of the security. This is intended to give the users and analysts a numerical value on the state of security enabling them to act on this information and further adjust the defense mechanisms. By comparing the metrics through time users can see whether their security is improving or not, as well as comparing their own security to the overall aggregated security of other routers utilizing Ludus. The aggregated and anonymized data as well as the metrics are available for further research for anyone interested.

Bezpečnost a soukromí Turris Security Bezpečnost a soukromí Network Security Routers Suricata Game Theory Honeypots
avatar

Ondřej Lukáš

Developer
Stratosphere Research Laboratory
avatar

Sebastian Garcia

Director
Stratosphere
avatar

Kalin Ivanov