Balancing the Pwn Trade Deficit

Black Hat USA 2010

Presented by: Colin Ames, Anthony Lai (Darkfloyd), Val Smith
Date: Wednesday July 28, 2010
Time: 11:15 - 12:30
Location: Florentine
Track: Cyber War & Peace

China has become a major player in the security community in recent years. From numerous news articles regarding government, military and commercial spying, to high profile cases such as the recent attack on Google, the tools, research and hacking groups coming out of China are are high on everyone's radar. This talk will provide an analysis of the Chinese hacking community, including its capabilities, goals, and cultural differences as well as similarities. A deep technical analysis and reverse engineering of prominent Chinese tools and techniques will be provided as well. We will highlight specifics such as binary obfuscators, encryption, and specific stealth techniques in order to round out an, up til now, spotty picture about this formidible member of the security community.

Colin Ames

Colin Ames is a security researcher with Attack Research LLC where he consults for both the private and public sectors. He's currently focused on Pen testing, Exploit Development, Reverse Engineering, and Malware Analysis.

Val Smith

Attack Research Val Smith has been involved in the computer security community and industry for over ten years. He currently works as a professional security researcher on a variety of problems in the security community. He specializes in penetration testing (over 40,000 machines assessed), reverse engineering and malware research. He works on the Metasploit Project development team as well as other vulnerability development efforts. Most recently Valsmith founded Attack Research which is devoted to deep understanding of the mechanics of computer attack. Previously Valsmith founded Offensive Computing, a public, open source malware research project.

Anthony Lai

Anthony Lai has worked on code audit, penetration test, crime investigation and threat analysis and acted as security consultant in various MNCs. After attending to Blackhat and Defcon since 2007, Anthony is inspired and has set up a research group, lining up various hackers in Hong Kong and studying exploit, reverse engineering, analyse threat and join CTFs. After dissecting a content censorship software called Green Dam made by China, it would be good for him boost this China-made security wind in malware analysis and advanced persistent threat areas.


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats