Penetrating B1 Trusted Operating Systems

Presented at DEF CON 8 (2000), July 29, 2000, 5 p.m. (50 minutes)

If you have attended the Newbie B1 talk, or have previous experience with B1 systems then you will find this talk enlightening. Typically, B1 systems can only be penetrated due to misconfigurations. We will take a whirlwind tour of all of the areas to check for security misconfigurations and develop a methodology for attacking B1 Trusted Operating Systems. You are going to find B1 Trusted Operating Systems in increasing use, and you owe it to yourself to understand how to penetrate these systems and how to lock them down.


Presenters:

  • Mythrandir
    Mythrandir, Software Evangelist and Visionary, Argus Systems Group, Inc.

Links:

Similar Presentations: