Websec at Campus Party 2010

Websec at Campus Party 2010

Posted on August 19, 2010


WebSec was proud to participate in Campus Party Mexico 2010, held from August 10th–16th in Mexico City. Campus Party has evolved into one of the premier events each year for thousands of technology professionals, information age aficionados, and computer enthusiasts to come together, share new ideas, and demonstrate cutting-edge computer technologies, as well as a host of other learning and information-themed events.

Among the highlights are the online activities, which has become the world's largest event of its kind. This year's festivities attracted more than 7,000 participants, marking one of the most successful events yet.

The Campus Party motto sums it up best: “The Internet is not a network of computers... it's a network of people!”


The WebSec Modem Security Conference

Our well-attended 'Vulnerabilities in Modems of Mexico' conference was presented by our security researcher Pedro Joaquín. Pedro specializes in modem security, and he has been working diligently for years tracking & examining the exploitation of vulnerabilities among Mexico's plethora of residential modem brands, including 2Wire, Thomson, Huawei, Motorola, Arris, CMTS, and others.

2Wire routers are are the brand of choice throughout much of Mexico and at Campus Party Mexico 2010 and in prior conferences (including as a featured speaker at DEFCON 17 2009), Pedro revealed numerous high-impact vulnerabilities targeting these routers. Most pressing was his discovery of a vulnerability that allowed DNS poisoning via a cross site forgery request, resulting in authentication bypass and drive-by router pharming.

Pedro's work was also critical to uncovering flaws inherent in the patch designed to remedy this vulnerability – in fact, the patch contained the additional, more severe problem of another authentication bypass vulnerability. Utilizing the results of Pedro's investigation, security of residential systems that utilize the 2wire router has been greatly enhanced.

Pedro debuted several brand new results last week, including three exploits and six vulnerabilities for Thomson routers, including ones that allowed authentication bypass and privilege escalation. Also revealed were new exploits of popular Arris, Motorola, and Huawei routers, as well as advice detailing how to close these gaps in network security.

Our conference was enthusiastically-received, and Campus Party Mexico 2010 was a great event. We look forward to returning next year with another informative program, and our latest network security update.


Latest Blog Entries

Downloading an Application's Entire Source Code Through an Exposed GIT Directory
Website administrators sometimes inadvertently leave an exposed .git directory, from which it is possible to download the entire source code of the web application using just wget and a common server misconfiguration.

credmap: The Credential Mapper
An overview of credmap, an open source penetration testing tool that automates the process of testing for credential reuse. It does so by testing supplied user credentials on known websites and verifies if the password has been reused on any of these.

New publication: Mastering the Nmap Scripting Engine
We invite you to learn more about the latest publication from our team, "Mastering the Nmap Scripting Engine".

Latest News

Blackhat EU 2015
Websec participated with two tools at the Blackhat, EU Arsenal held in Amsterdam, NL from the 10-13 of November, 2015. During this event, we introduced our brand new tool "credmap: The Credential Mapper" and also presented an amped-up version of Panoptic.

BSides Vancouver 2015
Websec is proud to announce that we will be attending the 3rd annual edition of BSides Vancouver, a local non-profit information security conference held in the heart of Vancouver, BC on March 16 and 17.