Cláudio Caracciolo

Claudio Caracciolo is Chief Security Ambassador at Eleven Paths and is the local chapter coordinator at Centro de Ciberseguridad Industrial of Argentina (a Centro de Ciberseguridad Industrial de España Subsidiary - CCI-Es.org).Claudio is the Former President at ISSA Argentina (through periods 2011-2013 and 2013-2015) and was an Information Security specialist consultant and professor of "Computer Forensics" and "Information Security" classes at Instituto Superior de Seguridad Pública (ISSP). He is an active member of several information security associations such as: ISSA International, OWASP, Usuaria, Argentina Cibersegura. Claudio is a member of Segurinfo's academic comitee from 2007 to date and is a guest speaker at several international information security conferences and events. He is an instructor on Ethical Hacking related issues such as: Defense Methodologies, Platform Hardening, Web Security, and Anti-Forensic Techniques. Claudio is passionate about social engineering and is the co-author of "Ethical Hacking, un enfoque metodológico" (Editorial Alfaomega - 2010) and is the co-organizer of MS Doing Blue event.

PALESTRAS:

Hunting the CiberCriminals (or not)

Millions of malicious applets (.jar files) and apps exist out there. You know that, but what about trying to understand who's behind this attack? 
Where do the malicious applets come from? From which country? At least, from what time zone?  
It’s possible to find some singularity into an applets and use this to get information about CyberCrimen organizations?
This talks is about our research and our experiences fighting with CyberCrimen in the mobile apps. I’ll finish this talk showing you an analysis that we have made over mobile applications security best practice (or not) of the biggest twenty five banks in Latin America.

The Bicho, an advance CAN Backdoor Maker

Have you ever thought about the possibility of your car being automatically attacked based on its GPS coordinates, its current speed or any other set of parameters? Through out our investigation, we have successfully developed a backdoor hardware for the CAN bus, called “The Bicho”, which makes all of the above mentioned possible. The “magic” is within the developed firmware for a PIC18F2580 microcontroller. Additionally, “The Bicho” counts with a software named “Car Backdoor Maker” that allows the customization of attack payloads through a very intuitive graphical interface. The backdoor supports multiple payloads and can be used against any vehicle supporting CAN, unlimitedly regardless manufacturer or model. Each payload is associated with a command that can be executed via SMS, allowing attacks remotely, while being anywhere in the world. Besides, as an advanced feature, the attack payload can be set up so as to be automatically executed, once the victim´s vehicle is near a specific GPS location. The execution can also be activated by detecting a particular CAN frame trasmition that could be associated with the vehicle´s speed, its fuel level and some other agents, providing the means to design highly sofisticated attacks and execute them remotely.