John Torakis

IT Security Researcher, Engineer Census S.A.

BIOGRAPHY

Working as a PenTester for a living. While 8 out of 10 projects are about testing mobile applications. Enjoying it anyway! Pythonista with a chance of C programming. Loves to develop stuff. In IT Security the last 4 years, worked as a SOC analyst in the past. Tried to enjoy that too, failed to do so and quitted because life is not only finite, but also short. Still an Undergraduate Student, for the same reason.

Main research topic is backdoors and covert/alternative Communication Channels. Proud owner of the securosophy.com blog, that projects human behaviours in IT Security situations – the whole “people are hackable” hype exaggerated to the point of nonsensical deductions!

Unexpected Shells with “covertutils”

The presentation is about using covert channels to maintain access in compromised hosts. All that with sole purpose I[D|P]S/Firewall evasion and censoring/DLP bypassing. Under this context the covertutils Python Package will be introduced and a brief “what is a backdoor anyway” topic will arise for modelling purposes.

There also will be code slides with covertutils usage examples, to create functional backdoors. The final step will be to create a network steganography backdoor as presented in:

  • https://www.exploit-db.com/docs/40891.pdf
  • https://www.exploit-db.com/docs/40897.pdf

Be prepared for 45’ of a noir presentation full of nostalgical references to things like Godfather and South Park that could very well be omitted without affecting the content at all.

Disclaimer:

No philosophical arguments will be placed during the presentation. It is a promise. We are technical – be prepared.

Reference:
  • https://github.com/operatorequals/covertutils

Are you the next cyber security superstar?

If you are passionate about an information security topic or you have strong technical skills developing researches on your own, you should definitely Apply at Call for Papers. By submitting you will have the chance to showcase your work to +2000 attendees.

Other speakers joining this year

Mohamed Bedewi

Senior Security Researcher and Penetration Tester

SPEAKER INTERVIEW AVAILABLE

Lucian Sararu

InfoSec Team Lead SecureWorks

Gabriel Cirlig

Senior Software Engineer Ixia, a Keysight business

Ready for this year's presentations?

By registering you will unlock access to 60+ speakers and two full days with cyber security news & showcases from worldwide leaders.

SPEAKERS
0
COUNTRIES
0
ATTENDEES
0
HACKING
COMPETITIONS
0
COMPANIES
0

Sponsors & Partners

They help us make this conference possible.

POWERED BY

Orange Romania is part of the Orange Group, one of the largest global telecommunications operators that connects hundreds of millions of customers worldwide. With over 11 million local customers and an annual turnover exceeding 1.5 billion euros, Orange Romania connects 1 in 2 Romanians and offers an extensive range of communication solutions for both individual and corporate customers, from basic connectivity services to complete mobile, fixed internet, TV packages, and complex IT&C solutions through Orange Business

Orange Romania is the number 1 operator in terms of network performance, and also holds nine consecutive Top Employer certifications, which confirm that Orange Romania, in addition to the remarkable products and services it offers, pays special attention to its employees and working environment. In the past 3 years Orange has launched two 5G Labs in Bucharest and Iasi, that aim to support researchers, startups and companies to test their 5G solutions in advance. 

In addition, Orange is a long-term supporter of the startup ecosystem through the Orange Fab accelerator program designed to support entrepreneurs in the development of innovative products and their distribution locally and internationally.

Gold Partners

Silver Partners

Bronze Partner

HACKING VILLAGE PARTNERS

COMMUNITY & MEDIA PARTNERS