Announcement

Collapse
No announcement yet.

laptop set up for a dc

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • #16
    I've brought my laptop to many Def / cons.
    Always have your OS install discs and drivers. (I've had to reload before while at con, this was covered above, but I think it can be said again.)

    Windows machines, if your machine isnt patched for exploits or viruses because its normally behind a firewall or router, you most deffinately will be exploited or infected before you leave.

    I picked up a 0-Day virus at one con.

    I prefer dual booting OS's just because I never know whats going to be demo'd. Some talks demo windows apps, others linux apps.

    Comment


    • #17
      Bring it in case you need it, don't use it unless you have to.

      Year after year, I see people sitting in the same spot in the hallway all weekend long with their laptops and wonder why they bothered even coming. They're surrounded by 5000 people hanging out, partying, having a good time, and they sit there doing exactly the same damn thing they do the other 362 days of the year at home.

      Recommendations:

      - Patch and harden the OS per relevant guidelines.

      - Bring a USB key (1GB is a good size, since that'll hold a full ISO CD image plus other bits & bobs) for transferring anything interesting that someone wants to give you. This is a lot safer than doing it over the network (though still risky).

      - Have plenty of storage space, because...

      - If you don't have a VM environment on your laptop that you can run stuff you've been given in, you're going to want to wait until you can get to one - or at least a fully-isolated (i.e., NO network connection whatsoever) sacrificial box.

      But, again: don't go to Defcon to use a computer.

      Comment


      • #18
        i really dont plan too but i do thank you for the suggestions. i already have a lot of things i want to do while at dc14 so i may not need it after all. but in any case ill have it incase thiers someone who wants to give me a few gigs of music.

        ever have about 150+cds in a case in a secure location? well obviosely my secure location wasnt very secure. only cd they missed was a linkin park cd that fell under the chair in my house.
        Soulidium (So-li-de-um) The place within us that contains the mystical spirit and soul of our creative artistry. A place where the fabric of our lives and experiences are transformed into their artistic equivalents; A housing for the very voice of our souls...

        Comment


        • #19
          I'm going to bring my laptop, but I plan to leave it at the hotel. I might bring it out to demonstrate something or trade files but otherwise it's like a ball and chain. If you do plan to bring yours, you might want to consider running a secure OS i.e. Anonym.OS .
          All your base are belong to .

          Comment


          • #20
            Librertto to the rescue.

            Hello.

            I take a libretto with me, small enough to carry but close enough to a full laptop to be useful.
            On the EMP toy.
            A briefcase with a coil running around the inside edge, a few hundred turns will do, and a bank of capacitors, the kind used to "stiff" the power of car audio work well, can do wonders.
            What you do is charge the caps and discharge into the coil, simple enough?
            You are talking several hundred amps for a split second, so the switch and everything connected to it must be rugged or it may explode.
            A briefcase works well, as it does not seem odd as you put it next to the object you want to attack.

            Comment


            • #21
              Originally posted by astcell
              Rats, and I ran here thinking you wanted to set up a laptop for a domain controller. That is a fun project I'll tell ya.

              What laptop for Defcon? Something you know. Preferably with a wireless network card.

              Plan on it getting wiped while you are there by a script kiddie. If it survives, plan on wiping it yourself when you get home.

              With that in mind, save your install CDs.
              Harhar, I too was thinking domain controller, great advice btw, right on the spot

              Comment


              • #22
                Wehntrust is good to have in yuor windows toolkit..

                If you want to add another layer of protection the free (or commercial) version of Wehntrust is cool. Makes life a bit more difficult for all the overflow writers.

                From their web site: http://www.wehnus.com/
                WehnTrust implements Address Space Layout Randomization (ASLR) for Windows. While ASLR is a common security measure for UNIX-based operating systems thanks to the PaX Team, it has not been widely implemented for, or deployed on, Windows. When implemented properly, ASLR mitigates nearly all exploitation techniques. The commercial version of WehnTrust also provides other security mechanisms that help to augment ASLR.
                PGP key: dtangent@defcon.org valid 2020 Jan 15, to 2024 Jan 01 Fingerprint: BC5B CD9A C609 1B6B CD81 9636 D7C6 E96C FE66 156A

                Comment


                • #23
                  See I had the idea of just running a live eval of linux of a cd and a 2 gb hard drive for date if any

                  what you all think about that?

                  Comment


                  • #24
                    runtime for defcon wireless

                    Originally posted by loki151
                    See I had the idea of just running a live eval of linux of a cd and a 2 gb hard drive for date if any

                    what you all think about that?
                    a good idea. at dc13 i had one friend remove his hard drive from the laptop and boot knoppix from cd. a different friend used his XP SP1 on hdd.*

                    knoppix user lasted whole con without exploit or crash. (once booted it ran fine until shutdown)

                    win user lasted aprox 60 seconds before rootkit'ed and running trojan zoo...

                    moral: ephemeral instances of linux (auditor/knoppix/etc) and patching/securing your windows/$os is a good idea.

                    and if you absolutely have to connect persistant services over wireless use IPsec or a VPN strongly keyed.

                    * i didn't have a live disc ready for him in time so he decided to risk it. i'm sorry Z!

                    </$0.02>

                    Comment


                    • #25
                      Originally posted by coderman
                      win user lasted aprox 60 seconds before rootkit'ed and running trojan zoo
                      that person, sir, was an idiot. i'm not saying windows is some security beast that you can harden against everything under the sun, but anyone who gets 0wned that fast is not only running an unpatched system, but they're also more than likely not running any kind of personal firewall. that's just foolishness, in my opinion, if your system is out in the wild. if you're behind a private network's firewall maybe you don't need ZoneAlarm or TPF up and running... but still. gah, that's just silly to me.
                      "I'll admit I had an OiNK account and frequented it quite often… What made OiNK a great place was that it was like the world's greatest record store… iTunes kind of feels like Sam Goody to me. I don't feel cool when I go there. I'm tired of seeing John Mayer's face pop up. I feel like I'm being hustled when I visit there, and I don't think their product is that great. DRM, low bit rate, etc... OiNK it existed because it filled a void of what people want."
                      - Trent Reznor

                      Comment


                      • #26
                        Originally posted by Deviant Ollam
                        ... but still. gah, that's just silly to me.
                        there were three of us at the table when he started to boot his laptop. one of us asked what he was doing.

                        "using the wireless"

                        '... in windows, without a firewall or services disabled?'

                        "i need to wipe it when i get back anyway, i'll be fine."

                        'you're fucking crazy!'

                        [ ... 20 seconds ... ]

                        "hmm, i got hacked."


                        (moral of this story: learn from the mistakes of others :)

                        Comment


                        • #27
                          WOW, I didn't think it would be that ruthless. It seems like a lot of script kid's and crackers go to Defcon. What ever happend to Hacker ethics. I can understand a hacker hacking into a system just to say he did it. But leave something behind to help that person learn. I thought the whole thing behind defcon was to learn.

                          Thanks for all the good info, I was going to bring my laptop as-is dual boot gentoo/xp full updated. But I think I should blast my windows and reinstall then make a image of the install. That way if my windows get's hacked I can be back up and running in 30min instead of an hour+.

                          I never been to one of these before. Does anyone ever setup honeypots?

                          I know I was wardriving one day and hit a honeypot and mess up my computer BAD. I connected to what I thought was a cool network (open network) and in seconds (to this day I have no idea how) My laptop shutdown and when I booted up I was missing the system files.
                          (note: the place I was at, was a linux/super computer factory. My friend worked there for a little while I guess they setup 3,000+ node super computers and ship them off.)

                          So I guess online banking is not a good idea. :)
                          The only thing that burns in Hell is the part of you that won't let go of life, your memories, your attachments.
                          They burn them all away. But they're not punishing you, he said. They're freeing your soul. So, if you're frightened of dying and... and you're holding on, you'll see devils tearing your life away. But if you've made your peace, then the devils are really angels, freeing you from the earth.

                          Comment


                          • #28
                            Sometimes a laptop (or other device with a *DB9* port) can be useful~
                            *cough* *cough**cough*

                            Not that that is a hint or anything.


                            LosT

                            Comment


                            • #29
                              I say bring your laptop but don't drag it around with you everywere. I pretty much just used it when I went back to the room and wanted to relax abit.

                              Comment

                              Working...
                              X