SEARCH
TOOLBOX
LANGUAGES
Difference between revisions of "Schedule"

Difference between revisions of "Schedule"

From BruCON 2017

Jump to: navigation, search
(Presentations)
(General Information)
 
(248 intermediate revisions by 8 users not shown)
Line 1: Line 1:
=Keynote Speakers=
+
__NOTOC__
  
'''Haroon Meer (Thinkst.com, South-Africa) -- You and your research'''
+
 +
=General Information=
  
Haroon is a well-known security researcher who has recently started his own venture with Thinkst.com, an applied research company. He is also involved with ZACON, a security conference in South-Africa.
+
* '''Registrations start at 8h30!'''
Haroon is a frequent speaker at conferences such as Blackhat, Defcon, etc.
+
* Typically workshops run for 2 consecutive speaking slots (ca. 2 hours), but some of them are even longer
 +
* Workshop rooms in the location '''Novotel Ghent (Orval, Chimay, La Trappe)''' are 5 minutes walking from the main venue
 +
* Workshop seats are limited. '''Reserved seats get in until 5 min before the workshop. After that it is first come, first in.'''
 +
* Read our important instructions on [[how to use SCHED.org]]!
 +
* This schedule is subject to change, check back regularly.
  
What does it take to do quality research? What stops you from being a one-hit wonder? Is there an age limit to productive hackery? What are the key ingredients needed and how can you up your chances of doing great work? In a talk unabashedly stolen from far greater minds we hope to answer these questions and discuss their repercussions.
+
Full schedule of the 0x09 (2017) edition [https://brucon0x092017.sched.com/ https://brucon0x092017.sched.com/]
 
 
 
'''Alex Hutton (Verizon Business, United States)'''
 
  
Alex is a principal in the Verizon Business RISK intelligence team and has been one of the driving forces behind the VERIS (Verizon Risk Information Sharing) Framework and their yearly Databreach Investigations Report (DBIR). He is involved with the SIRA podcast and frequently presents on risk management and data-driven security at conferences such as Blackhat and Source.
+
'''Keynotes:'''
  
'''Jaron Lanier (Microsoft, United States)'''
+
* Keynote: [[Justine Bone]] - [[The cyber short. A market solution for product safety and corporate governance.]]
 +
* Keynote: [[Chris Wysopal]] - [[How hackers changed the security industry and how we need to keep changing it.]]
  
Jaron is a pioneer in the realm of virtual reality and currently works as a principal architect for Microsoft’s Extreme Computing lab. He is the author of the 2010 bestseller “you are not a gadget” and has given talks at conferences around the world on virtual reality and the impact of social networks and web 2.0.
+
'''Talks:'''
  
'''Due to time constraints Jaron will not be able to attend the conference. Instead we are organizing for him to deliver his keynote talk through a video link. We're still privileged to have Jaron on-board for our 2011 edition!'''
+
* [[Matt Wixey]] - [[See no evil, hear no evil: Hacking invisibly and silently with light and sound]]
 +
* [[Balazs Bucsay]] - [[XFLTReaT: a new dimension in tunnelling]]
 +
* [[Anna Shirokova]] and [[Veronica Valeros]] - [[Knock Knock... Who's there? admin admin and get in! An overview of the CMS brute-forcing malware landscape.]]
 +
* [[Volodymyr Styran]] - [[From Weakest Link to Retaliation Weapon: Building Efficient Anti-Social Engineering Awareness Program]]
 +
* [[Sampada Nandedkar]] and [[Rushikesh Nandedkar]] - [[Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited)]]
 +
* [[Damien Cauquil]] - [[Weaponizing the BBC Micro:Bit]]
 +
* [[Sander Demeester]] - [[Secure channels: Building real world crypto systems]]
 +
* Josh Schwartz and John Cramb - [[MEATPISTOL, A Modular Malware Implant Framework]]
 +
* [[Gregory Pickett]] - [[Open Source Security Orchestration]]
 +
* [[František Střasák]] and Sebastian Garcia- [[Detecting malware even when it is encrypted -  Machine Learning for network HTTPS analysis]]
 +
* [[Nikhil Mittal]] - [[Evading Microsoft ATA for Active Directory Domination]]
 +
* [[Debasish Mandal]] - [[Browser Exploits? Grab them by the collar!]]
  
=Workshops=
+
'''Workshops:'''
  
 
+
* Benjamin Delpy - Mimikatz workshop
'''Agnitio: the security code review Swiss army knife (David Rook - Security Ninja)'''
+
* [[Didier Stevens]] - [[Programming Wireshark With Lua]]
 
+
* [[David Szili]] - [[Getting the Most Out of Windows Event Logs]]
Its static analysis, but not as we know it
+
* [[Steven Wierckx]] and [[Andy Deweirt]] - [[Building a cheap, robust, scaling, penetration testing/bug bounty super computer]]
 
+
* [[Swaroop Yermalkar]] - [[Practical iOS App Exploitation and Defense using iGoat]]
'''Collective Malicious PDF Analysis (Brandon Dixon - x0ner)'''
+
* [[Sergei Frankoff]] and [[Sean Wilson]] - [[Malware Triage: Malscripts Are The New Exploit Kit]]
 
+
* [[Emmanuel Nicaise]] - [[Jedi's trick to convince your boss and colleagues]]
Going beyond one sample at a time
+
* [[Leszek Mis]] - [[May the data stay with you Network Data Exfiltration Techniques.]]
 
+
* [[Slawomir Jasek]] - [[Hacking Bluetooth Smart locks]]
'''Script Kiddie Hacking Techniques (Ellen Moar & Colin McLean)'''
+
* [[Georges Bossert]] and [[Frédéric Guihéry]] - [[Defeating Proprietary Protocols the Smart Way]]
 
+
* [[Anto Joseph]] and [[Clarence Chio]] - [[Practical Machine Learning in InfoSecurity]]
How a script kiddie can copy and paste their way to effective hacks
+
* [[Vinnie Vanhoecke]] and Tom Kustermans and Joachim Schäfer - [[Playing with RFID workshop]]
 
+
* [[Yannick Wellens]] - [[Windows malware development: A JMP in the dark]]
'''The Web Application Hacking Toolchain (Jason Haddix - jhaddix)'''
 
 
 
web hacking made better
 
 
 
'''White Hat Shellcode: Not for Exploits (Didier Stevens)'''
 
 
 
Learn to use shellcode for defense
 
 
 
'''Beer brewing (TBD)'''
 
 
 
'''Lockpicking (TBD)'''
 
 
 
'''VOIP (TBD)'''
 
 
 
'''RFID (TBD)'''
 
 
 
=Presentations=
 
 
 
 
 
''' Ripping Out Code: Practical Attack Surface Reduction for Open Source Systems (Craig Balding)'''
 
 
 
This talk is about how the software choices we make (or tacitly accept) on our desktops, have  greatly increased our attack surface.  In the case of OSS, we'll look at practical metrics for measuring code complexity and attack surface along with a "hall of shame" where some OSS projects you know, use and love will be "weighed in".  In "the what you can do about it" section, I'll show ways to bring back simplicity and security through highlighting "lighter options" and ripping out code (for non-programmers).
 
 
 
'''Abusing Locality in Shared Web Hosting (Nick Nikiforakis - nikifor)'''
 
 
 
The increasing popularity of the World Wide Web has made more and more individuals and companies to identify the need of acquiring a Web presence. The most common way of acquiring such a presence is through Web hosting companies and the most popular hosting solution is shared Web hosting. In this presentation we investigate the workings of shared Web hosting and we point out the potential lack of session  isolation between domains hosted on the same physical server. We present two novel server-side attacks against session storage which target the logic of a Web application instead of specific logged-in users. Due to the lack of isolation, an attacker with a domain under his
 
control can force arbitrary sessions to co-located Web applications as well as inspect and edit the contents of their existing active sessions. Using these techniques, an attacker can circumvent authentication mechanisms, elevate his privileges, steal private information and conduct attacks that would be otherwise impossible. Finally, we test the
 
applicability of our attacks against common open-source software and evaluate their effectiveness in the presence of
 
generic server-side countermeasures.
 
 
 
'''Botnet Identification and remediation (Barry Irwin)'''
 
 
 
Modern botnet trends have become increasingly sophisticated  both in terms of the techniques used to avoid detection on compromised endpoints, but also in their varied communication channels. The use of IRC as the communications medium of choice for Command & Control (C2) activities has been replaced with sophisticated  use of IP and domain fast-fluxing to avoid detection and increase resilience. These techniques largely bypass traditional network security detection and mitigation approaches  such as blacklists and intrusion detection systems.
 
 
 
In the ongoing defence against these networks, a number of novel approaches are presented in order to allow an organisation to perform near realtime analysis of network traffic with very low system load.  The intention of these is that an organisation or ISP could use the tools as a means of early identification of compromised hosts participating in the botnet.  This paper is comprised of three components, the first two relating to detection mechanism, and the final one providing a console which can be used to tracking  and information aggregation.
 
 
 
The first detection technique utilises passive analysis of DNS traffic collected from the network. Due to its tight integration with  the TCP/IP suite, it serves as an ideal transport mechanism for communications. Using a combination of classifiers, a high degree of accuracy is obtained in the identification of fast flux domains, using at most a single DNS packet query. This is in contrast to work done by other researchers which required multiple queries.  The detection techniques are tested against sample traffic and it is shown that malicious traffic can be detected with low
 
false positive rates. This can be combined with a more heavyweight scoring system which utilises other metadata such as registrar, domain age and ASN data to further support scoring.
 
 
 
The second component  applies a lightweight mathematical classification to observed URLs contained in network traffic. This can either be via  a network tap, or integrated into a proxy server solution such as squid. The methods used are able to identify malicious urls with a high degree of accuracy, while maintaining a low false positive rate.  This lightweight solutionc an be further supported by active queries relating to target ASN, Domain registrar, and other existing blacklists and dnsbl systems.
 
 
 
The final component provides a web based management and visualisation system providing integration between the above two classes in order to allow for ease of notification of malicious activity. The anticipated target for theses solutions are Academic networks, ISPs and to a lesser extent corporate networks.  The intention being that by providing suitable monitoring and analysis of traffic egressing ones network,  re-mediation can be carried out by the organisation closest to the infection – in effect cleaning up ones own back yard. A role that this can play other than the operational one described, is to provide researchers with access to suitable data (either live networks or even malware labs) to have an automated means of identifying potentially malicious activity, with very low resource requirements.
 
 
 
'''Botnets and Browsers - Brothers in a Ghost Shell (Aditya K Sood)'''
 
 
 
'''iOS Data Protection Internals (Andrey Belenko)'''
 
 
 
'''The 99¢ heart surgeon dilemma (Stefan Friedli)'''
 
 
 
How to fix penetration testing
 
 
 
'''Pushing in, leaving a present, and pulling out without anybody noticing (Ian Amit)'''
 
 
 
Data Exfiltration in highly secure environments
 
 
 
'''Social Engineering Like In The Movies (Dale Pearson)'''
 
 
 
The reality of awareness and manipulation
 
 
 
'''Smart Phones – The Weak Link in the Security Chain (Nick Walker - tel0seh)'''
 
 
 
Hacking a network through an Android device
 
 
 
'''Enterprise Wi-Fi Worms, Backdoors and Botnets for Fun and Profit (Vivek Ramachandran)'''
 

Latest revision as of 07:40, 3 October 2017


General Information

  • Registrations start at 8h30!
  • Typically workshops run for 2 consecutive speaking slots (ca. 2 hours), but some of them are even longer
  • Workshop rooms in the location Novotel Ghent (Orval, Chimay, La Trappe) are 5 minutes walking from the main venue
  • Workshop seats are limited. Reserved seats get in until 5 min before the workshop. After that it is first come, first in.
  • Read our important instructions on how to use SCHED.org!
  • This schedule is subject to change, check back regularly.

Full schedule of the 0x09 (2017) edition https://brucon0x092017.sched.com/

Keynotes:

Talks:

Workshops: