Feeds

Delegate hacks into Black Hat streaming video

What happens in Vegas...

SANS - Survey on application security programs

Security shortcomings in Black Hat's newly established streaming media service allowed a security consultant to hack into the system and see presentations for free.

Michael Coates, head of web security at Mozilla, discovered he was able to use an account on a test login page to view videos without paying. Normally the service would cost $395. Coates came across the hole after he began exploring oddities he noticed during the sign-up process, as he explains in a blog post here.

"To be fair, Black Hat didn't operate this video service themselves," Coates wrote. "But it's still a bit ironic that the largest hacking conference in the world has this security hole in their video streaming service."

Coates describes the vulnerability as "a combination of logic flaws and misconfigured systems which provided access to a testing login page that could be used with user credentials that were not fully 'registered' [no payment received]."

Black Hat's inaugural video streaming services was supplied by Inxpo. Coates said he notified Inxpo about the problems and waited until it fixed the security flaws before writing up the attack.

Running any service for delegates to Black Hat and its companion conference Defcon are always fraught with difficulties. In the past, casino VoIP systems been hacked to make free calls, for example.

The same has happened over the years with hotel TV services. Over the years improvements have been made to lock down systems.

Although venues wind up getting arguably the world's most effective penetration testing services in the process, it's difficult to think any organisation other than a Vegas hotel would put up with such hacker hijinks year after year.

Black Hat director Jeff Moss told IDG that it selected Inxpo on a recommendation but that the firm had never previously run live streaming services for a security conference. "It's kind of like their trial by fire: Welcome to Black Hat," Moss said. ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Arts and crafts store Michaels says 3 million credit cards exposed in breach
Meanwhile, Target investigators prepare for long process in nabbing hackers
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.