24
[front page] I-Hack 2010 I-HACK COMPETITION 2010 HACKING FOR SECURITY

Buku Program I-Hack2010 Booklet

Embed Size (px)

Citation preview

Page 1: Buku Program I-Hack2010 Booklet

[front page]I-Hack 2010

I-HACK COMPETITION 2010HACKING FOR SECURITY

Page 2: Buku Program I-Hack2010 Booklet

SPONSOR

LOGO

LOGO

LOGO

Page 3: Buku Program I-Hack2010 Booklet

[ message by Chairman of MCMC, Tan Sri Khalid Ramli ]

ASSALAMUA’LAIKUM WARAHMATULLAHI WABARAKATUH

Praise to Allah SWT, The Almighty for His Blessings and Kindness that enable us to assemble at this historical event. On behalf of MCMC, I indeed delighted and honored to join UiTM in organizing such an informative event that would furnish all of us with the important of ICT security. This is in line with the objective of MCMC to ensure the reliability and the security of the Malaysian networks.

I would like to take this opportunity to congratulate all especially to the organizers and sponsors, for their endeavor in making this fruitful event. Hopefully this event can narrow down the gap between industries and higher education institutions.

Today, i-HACK Competition 2010 had shown to the public that UiTM is capable in generating productive and efficient graduates as this event is organized by students. Conducting such an event will promise the growth of ICT security awareness and defense against various malicious activities and technologies.

Lastly, I hope this program will be continuously organized as the contents produced can be used in facing more challenging and competitive environments in the future.

Thank You.

Tan Sri Khalid RamliChairmanMalaysian Communications and Multimedia Commission (MCMC)

Page 4: Buku Program I-Hack2010 Booklet

[ message by VC of UiTM, Dato' Prof. Ir. Dr. Sahol Hamid Abu Bakar ]

ASSALAMUA’LAIKUM WARAHMATULLAHI WABARAKATUH

Thanks to Almighty Allah SWT, The Self-sufficient and Worthy of All Praise. Congratulations to the organizer of i-HACK Competition 2010, especially to the Faculty of Computer and Mathematical Sciences, in making sure this program runs smoothly.

i-HACK Competition year 2010 is moving in line with the mission and vision of UiTM to produce a significant number of Bumiputera professionals who are skilled in a broad spectrum of industry. I am with full of pride believe that this event is capable of developing and expanding the perspective of UiTM academics. i-HACK Competition is undoubtedly serves as a platform that generate and disseminate knowledge particularly related to the computer security issues. In UiTM, we would like our students to take the challenge of ever-changing multicultural and technological advancement of the world. With this event, students are able to obtain precious knowledge and advanced technical skill from security experts for the growth of their intellectual aspects. It is undeniably that this kind of collaboration is increasingly required to instill the sense of security awareness.

On behalf of UiTM, I would like to convey my gratitude to all sponsors, co-organizers and security experts who always give their valuable support for this event. My appreciation also goes to my beloved students for being able to organize such knowledgeable event. It is my hope that this event would be a long lasting tradition and trademark of UiTM to the world.

Thank You.

Dato' Prof. Ir. Dr. Sahol Hamid Abu BakarVice ChancellorUniversiti Teknologi MARA

Page 5: Buku Program I-Hack2010 Booklet

[ message by Dean of FCMS, Prof. Dr. Zainab Abu Bakar ]

ASSALAMUA’LAIKUM WARAHMATULLAHI WABARAKATUH

We are grateful to Allah SWT, The Almighty and His Divine, on this glorious day we can meet under one roof to ensure the success of i-HACK competition 2010. Congratulations! A deepest appreciation should go to the Faculty of Computer and Mathematical Sciences, Co-organizers, Sponsors and all committee members in making this prestige event comes to reality.

As the world is rapidly developing and expanding the Information Computer Technology (ICT), we are now threatened by cyber terrorism due to wide exposure of our personal information via Internet technology. Today, cyber terrorism is the biggest security threat to all countries. Therefore, it is important for us to be concerned with the computer security issues so that we can protect ourselves from being the victim of cyber threats. As we all know the computer security awareness is an essential element that should be known by all ICT users. By having this program, I wish everybody can learn about information of cyber security and be able to ensure the confidentiality, integrity and accessibility of the information.

This event also helps to enhance student’s knowledge and experience as a preparation for a more challenging world ahead. An event like this has certainly fulfilled the mission of UiTM in producing competent, global and ethical graduates. It also provides a valuable experience to students in building a bridge and makes a closer gap between the academic institutions and the industrial sectors.

I once again wish to congratulate and thank especially to all the sponsors and organizers for their valuable supports given to this program. I sincerely give full support to this program and hope it will continue as one of the annual activities by this faculty. InsyaALLAH. Lastly, I would like to welcome everyone to i-HACK Competition 2010.

Thank You.

Prof. Dr. Zainab Abu BakarDeanFaculty of Computer and Mathematical Sciences

Page 6: Buku Program I-Hack2010 Booklet

[ message by Dr. Fakariah Hani Mohd Ali, Head Advisor of i-HACK 2010 ]

ASSALAMUA’LAIKUM WARAHMATULLAHI WABARAKATUH

Alhamdulillah, praise to Allah SWT for His Blessings and Kindness that enables us to gather for this grand event. Ultimately, I am proud to announce and give my appreciation to all committee members of i-HACK 2010 for their effort in making this event success for this year.

As we know i-HACK Competition is unquestionably serves as a platform that enables the sharing and generating knowledge and skills particularly related to the computer security issues since it is a very crucial part in information technology. I also hope that this event has give our students a lot of benefits in gaining so much knowledge in computer security fields and also obtaining various communication, social and teamwork skills.

There is no doubt that i-HACK delivers a platform where students are able to present and polish their communication skills, discover and explore the technological skills, and lastly, realize and exhibit the important of teamwork and time management skills.

Last but not least, again I would like to express my greatest thankful to the Faculty of Computer and Mathematical Sciences, organizers, sponsors and anyone who were directly or indirectly involved, give their full time support, effort and stand together in making this i-HACK competition 2010 a victorious event.

Thank you.

Dr. Fakariah Hani Mohd AliHead Advisor of i-HACK COMPETITION 2010Faculty of Computer and Mathematical Sciences

Page 7: Buku Program I-Hack2010 Booklet

[ message by Mohd Razif Mohd Saunan, Program Director ]

ASSALAMUA’LAIKUM WARAHMATULLAHI WABARAKATUH

First and foremost, let us thank Allah SWT, The Almighty for His Blessings and Kindnesses that enable us to organize this booming event as scheduled.

i-HACK serves as a channel to understand security issues and expose the society to the computer security threats and vulnerabilities in the computer and network systems. This competition serves as a platform for students to expose their technical and functional capability, which enable them to escalate their future by portraying their skills in society and show their talent in this ICT industry.

i-HACK 2010 is mostly managed by students. It is hoped that students gathered a lot of exposure in organizing this big event with the collaboration from industries. Besides, i-HACK helps in building their soft skills and spirit of togetherness in making this event a success. I wish they will be able to employ the experience gathered for their future endeavor.

Thank you.

Mohd Razif Mohd SaunanProgram Director of i-HACK COMPETITION 2010Faculty of Computer and Mathematical Sciences

Page 8: Buku Program I-Hack2010 Booklet

[ schedule of events ]

Day 17 August 2010 (Saturday)

Time Event Venue

8.00 am – 8.30 am Arrival of Participants and Guests AGH

8.30 am – 9.00 am Arrival of Guest of Honour AGH

9.00 am– 10.00 am Opening Ceremony Doa Recital

Welcoming Address by Y. Bhg. Prof Dr. Zainab Abu Bakar, Dean of FCMS, UiTM

Collaborator Address by Y. Bhg. Encik Harme Mohamed, Director of Security, Trust and Governance Department, MCMC Officiating Address by Y. Bhg. Prof. Dr. Mohamad Kamal Hj. Harun,

Deputy Vice-Chancellor (Community and Industrial Networking), UiTM Mock Cheque Giving Session

AGH

10.10 am –11.00am

Break

10.30 am – 1.00 pmParallel Session 1

11.00 am –11.30 amParallel Session 2

Hacking Workshop“Ethical Hacking for Beginners” facilitate by Security Experts

Forensic Workshop “Uncover Hidden Evidence” facilitate by Digital Forensic Department, CyberSecurity Malaysia

Security Talk 1 : “Defending Againts Web Attacks” Abu Ubaidah Md Zain, Deputy Director of Security, Trust and Governance Department, MCMC

LAB 1, 2, 3, 9, 11, 12

LAB 6 & 18

AGH

11.30 am –12.30 pm

Security Talk 2 : “Developments in Malicious Internet Activity: A Focus on Difficult Issues” Ryan Connolly, Managing Director, eKrios System

AGH

Page 9: Buku Program I-Hack2010 Booklet

12.00 pmParallel Session 3

Parallel session 4

12 Hours Competition “Hacking and Defense” facilitate by SCAN Associates Berhad12 Hours Competition “Forensic Challenge” facilitate by SCAN Associates Berhad

LAB 14 & 15

LAB 17

12.30 pm – 2.00 pm

Break

2.00 pm – 5.00 pmParallel Session 5

Parallel Session 6

Parallel Session 7

Forensic Workshop “Uncover Hidden Evidence” facilitate by Digital Forensic Department, CyberSecurity Malaysia

Hacking Workshop“Ethical Hacking for Beginners” facilitate by Security Experts

Career Forum “Wanted: Security Expert!” Moderator : Dr. Kamarularifin Abdul Jalil Panels :

Lt. Colonel Asmuni Yusof, Head of Security Assurance Department, CyberSecurity Malaysia

Harme Mohamed, Director of Security, Trust and Governance Department, MCMC

Faris Dzulkarnain, Executive, IT Security Officer Bank Islam

LAB 6 & 18

LAB 1, 2, 3, 9, 11, 12

AGH

12.00 am End of 12 Hours Competition

AGH : Al-Ghazali Hall LAB : Laboratory

Page 10: Buku Program I-Hack2010 Booklet

[ schedule of events ]Day 28 August 2010 (Sunday)

Time Event Venue

8.00 am – 8.30 am Arrival of Participants and Guests

8.30 am – 11.30 amParallel Session 8

Parallel Session 9

9.00 am – 10.00 amParallel Session 10

10.00 am – 11.00 amParallel Session 11

Forensic Workshop “Uncover Hidden Evidence”

facilitate by Digital Forensics Department, CyberSecurity Malaysia

Hacking Workshop “Ethical Hacking for Beginners” facilitate by Security Experts

Security Talk 3: “Fully Disclosed : Mobile Hacking” Adli Wahid, Senior Specialist & Head of Malaysia CERT (My

CERT), CyberSecurity Malaysia

Security Talk 4: “Digital Forensics : The Malaysia CyberCSI” Aswami Fadillah Hj. Mohd Ariffin, Head of Digital Forensics Department, CyberSecurity Malaysia

LAB 6 & 18

LAB 1, 2, 3, 9, 11, 12

AGH

11.00 am – 12.30pm

Security Games AGH

12.30 pm – 2.00pm Break

2.00 pm – 2.30 pm Arrival of Guest of Honour

2.30 pm – 4.00 pm Closing Ceremony

Doa RecitalMultimedia Presentation Recap Address by Y. Bhg. Prof. Dr. Azni Zain Ahmed,

Deputy Vice-Chancellor (Academic and Internationalisation), UiTMClosing Address by Y. Bhg. Puan Eneng Faridah Iskandar, Acting Senior Director, Monitoring and Enforcement Division , MCMC

Prizes Giving Session

AGH

4.00 pm Press Conference Information and Network Security Research Center (INSRC) Lab

End of i-HACK 2010

Page 11: Buku Program I-Hack2010 Booklet

[ Executive Committee ]

PATRON

Y. Bhg. Dato’ Prof. Ir. Dr. Sahol Hamid Abu BakarVice Chancellor, Universiti Teknologi MARA

ADVISORS

Prof. Dr. Zainab Abu BakarDean, Faculty of Computer and Mathematical Sciences (FCMS)

Assoc. Prof. Dr. Mazani ManafDeputy Dean (Student and Alumni), FCMS

Assoc. Prof. Dr. Isahak KassimDeputy Dean (Research and Industrial Linkages), FCMS

Assoc. Prof. Jamaludin Md. YusofHead of Computer Technology and Networking Department, FCMS

Dr. Fakariah Hani Mohd AliHead Advisor of i-HACK COMPETITION 2010

Page 12: Buku Program I-Hack2010 Booklet

[ Steering Committee ]

DIRECTORMohd Razif Mohd Saunan

VICE DIRECTORMohd Naaim Yusop

SECRETARYSuhailly Bachok

VICE SECRETARYKamariah Kammaruddin

TREASURERNur Azlina Onn

VICE TREASURERNor Zubaidah Khalid

Page 13: Buku Program I-Hack2010 Booklet

PROGRAMME Nik Mariza Nik Abdull Malik (Advisor)Muhammad Azim HamirIlyas Foo bin Abdul Rahman FooSiti Nurbaain Mohd JamilSyarifah Natasya Aida Syed Mazly

PROTOCOL, OFFICIATING & CLOSING CEREMONY Raihana Md Saidi (Advisor)Nur Amira YahayaNur Atikah Abu OthmanAbdullah Ahmad Azlan

TALK & FORUMNor Adora Endut (Advisor)Nurul Huda Nik Zulkipli (Advisor)Hamizah Md KassimFarina Idris

VENUE PREPARATION & TECHINAL Md Jamil Abu Sari (Advisor)Farok Azmat (Advisor)Mohamad Ariff KamaruzamanAhmad Faidzal Abd RashidMuhammad Shafik Marhaban

LOGISTIC & TRANSPORTATION Dr. KamarulAriffin Abd. Jalil (Advisor)Mohammad Afandi MazlanRazhaslan RaduanRonoel William Maracus

MEDICAL & SAFETYMohd Nizam Udin (Advisor)Shahima Noorzaida AhmadDewi Kharyawati Budiman

COMPETITIONNorkhushaini Awang (Hacking) (Advisor)Norasiah Daud (Defense) (Advisor)Adzhar Abdul Kadir (Forensic) (Advisor)Amirul Mohamad ZulkifliMohd Hasrul Mohd HanafiahMohd Hazeq Al-hakim AdilFarra Nydia AmranNoor Aqilah Mat SaadFarah Madiha Md Zin

WORKSHOPRozita Yunos (Advisor)Siti Rahayu Abdul Aziz (Advisor)Siti Nurkamaliah KamarudinZuhri Arafah Zulkifli

PUBLICATION & DOCUMENTATION Shapina Abdullah (Advisor)Muhammad Faisal Ariffin Mohd RusliMohd Haziq Abd Rashid

PROMOTION & PUBLICITYAhmad Yusri Dak (Advisor)Fauziah Ahmad (Advisor)Nor Diyana Marlan Azlin Suraya RazaliMohd Hafizainizam Mohd YusofNoorul Munirah Kamarudin

SPONSORSHIP Assoc. Prof. Dr. Adnan Ahmad (Advisor)Prof. Dr. Saadiah Yahya (Advisor)Assoc. Prof. Dr. Syed Ahmad Aljunid (Advisor)Noor Saffazura Ahmad SafuanUmi Alliza Allazmi

INVITATION, CORPORATE COMMUNICATION & INTERNATIONALISATIONDr. Siti Salwa Salleh (Advisor)Mohd Izwandy BeduwiNur Azimah Raha Ahmad Jeffry

SOUVENIRS & PRIZES Noorhayati Mohd Nor (Advisor)Suhaila Abd. Halim (Advisor)Nur Azliza Mohd DzahirNajihah Abd Ralim

FOOD & BEVERAGENorizan Mat Diah (Advisor)Rozieyana SahriKhairul Fahmy IshakNik Mohd Hafiz Che Hassan

MANAGEMENT & ACCOMODATION Rosanita Adnan (Advisor)Zolidah Kasiran (Advisor)Ahmad Fikri AbdullahSiti Naqiah Azalela Mohd Salleh

Page 14: Buku Program I-Hack2010 Booklet

[ Organizers ]

Information and Network Security Research Center (INSRC)Faculty of Computer and Mathematical Sciences

Universiti Teknologi MARA (UiTM), Shah Alam

&

Department of Computer Technology and Networking (CTN)Faculty of Computer and Mathematical Sciences

Universiti Teknologi MARA (UiTM) Shah Alam

ASSOCIATION WITH

Malaysian Communications and Multimedia Commission (MCMC)SCAN Associates BerhadCyberSecurity Malaysia

Page 15: Buku Program I-Hack2010 Booklet

[ sponsors ]

DIAMOND

Malaysian Communications and Multimedia Commission (SKMM)

The Malaysian Communications and Multimedia Commission is the regulator for the converging communications and multimedia industry. At the time it was created its key role was the regulation of the communications and multimedia industry based on the powers provided for in the Malaysian Communications and Multimedia Commission Act (1998) and the Communications and Multimedia Act (1998). Pursuant to these Acts the role of the Malaysian Communications and Multimedia Commission is to implement and promote the Government's national policy objectives for the communications and multimedia sector. The Malaysian Communications and Multimedia Commission is also charged with overseeing the new regulatory framework for the converging industries of telecommunications, broadcasting and on-line activities.

Economic regulation, which includes the promotion of competition and prohibition of anti-competitive conduct, as well as the development and enforcement of access codes and standards. It also includes licensing, enforcement of license conditions for network and application providers and ensuring compliance to rules and performance/service quality.

Technical regulation, includes efficient frequency spectrum assignment, the development and enforcement of technical codes and standards, and the administration of numbering and electronic addressing.

Consumer protection, which emphasises the empowerment of consumers while at the same time ensures adequate protection measures in areas such as dispute resolution, affordability of services and service availability.

Social regulation which includes the twin areas of content development as well as content regulation; the latter includes the prohibition of offensive content as well as public education on content-related issues.

On 1 November 2001, the Malaysian Communications and Multimedia Commission also took over regulation of the Postal Industry and was appointed the Certifying Agency pursuant to the Digital Signature Act (1997).

Page 16: Buku Program I-Hack2010 Booklet

[ sponsors ]

SILVER

Edaran Berhad (EDARAN)

Edaran Berhad (EDARAN) has emerged as one of Malaysia’s leading companies within the information communications technology (ICT) sector over the last 20 years. EDARAN’s core business activities revolve around the area of computer systems integration, the provision of smart technology solutions and maintenance and consultancy services. The business activities are handled through two major divisions, namely Edaran IT Services Sdn. Bhd. (EKOM) and SIDIC Technology Sdn. Bhd. (SIDIC).  EKOM’s business scope revolves around the area of systems integration and maintenance while SIDIC is the smart solutions arm, focused on the provision and implementation of smart technology solutions. Between these two entities, the Group taps tangible cross synergies and cross applicable benefits that add value to customers. EDARAN Group continues to pursue its goal of building a base of skilled and professional human resources. It involves regularly in relevant skills training programmes, industry happening and technology updates.

SCAN Associates Berhad (SCAN)

SCAN Associates Berhad (SCAN) is Malaysia’s premier and trusted ICT security solutions provider. It is a MSC Malaysia status and an affiliated company of Commerce Asset Ventures Sdn. Bhd., a wholly-owned venture capital arm of Bumiputra-Commerce Holdings Berhad. With a solid track record of providing ICT security solutions and building its intellectual property, SCAN delivers internationally recognised and enterprise-wide solutions and services.  SCAN is backed by relevant Malaysian Government Agencies, such as the Multimedia Development Corporation and Malaysia Debt Ventures, to spearhead ICT security initiatives in Malaysia and overseas. In addition, SCAN currently houses the highest concentration of internationally certified ICT security professionals in Malaysia. SCAN has also made inroads into the international market especially in Indonesia and the Middle East by leveraging on its knowledge capital, to provide leading-edge ICT security solutions. SCAN upholds TRUST as its fundamental value proposition in providing customer-centric solutions and services to the growing regional and global markets, where we aim to be one of the leading global ICT security solutions providers.

Page 17: Buku Program I-Hack2010 Booklet

[ Acknowledgement ]

The Secreteriat of I-HACK COMPETITON 2010 would like to express our gratitude to all who involved either directly or indirectly in helping us to make this event successfully. They are :

Ministry of Higher Education

University Teknologi MARA

Faculty of Computer and Mathematical Sciences

Information and Network Security Research Centre (INCRC)

Department of Computer Technology and Networking

Networking Society (NETs)

Panels of Judges

Malaysian Communications and Multimedia Commission (MCMC)

SCAN Associates Berhad

CyberSecurity Malaysia

Edaran Sdn. Bhd,

Pustaka Prinsip Sdn. Bhd.

3Com Asia Ltd. Malaysia

Visual In-Tech Sdn. Bhd.

eKrios Systems, LCC

Page 18: Buku Program I-Hack2010 Booklet

I-HACK COMPETITION 2010HACKING FOR SECURITY

LOGO

Page 19: Buku Program I-Hack2010 Booklet

Autogrpahy

Page 20: Buku Program I-Hack2010 Booklet

[backpage]I-Hack 2010