|
|
(221 intermediate revisions by 8 users not shown) |
Line 1: |
Line 1: |
− | =Time Table=
| + | __NOTOC__ |
| + | |
| + | |
| =General Information= | | =General Information= |
− | * Please register for workshops here (not active yet) | + | |
− | * Workshops run for 2 consecutive speaking slots (ca. 2 hours) | + | * '''Registrations start at 8h30!''' |
| + | * Typically workshops run for 2 consecutive speaking slots (ca. 2 hours), but some of them are even longer |
| + | * Workshop rooms in the location '''Novotel Ghent (Orval, Chimay, La Trappe)''' are 5 minutes walking from the main venue |
| + | * Workshop seats are limited. '''Reserved seats get in until 5 min before the workshop. After that it is first come, first in.''' |
| + | * Read our important instructions on [[how to use SCHED.org]]! |
| * This schedule is subject to change, check back regularly. | | * This schedule is subject to change, check back regularly. |
− | ==Day 1 : Monday September 19th==
| |
− | {| border="1px solid" style="text-align:center;"
| |
− | |- bgcolor="#CCCCCC"
| |
− | !|Time
| |
− | !|Basement
| |
− | !|Aula A (main track)
| |
− | !|Aula B (workshop)
| |
− | !|Aula D (workshop)
| |
− | !|Outside
| |
− | |- bgcolor="#CCCCCC"
| |
− | !|18:30
| |
− | |Breakfast
| |
− | |Breakfast
| |
− | |Breakfast
| |
− | |Breakfast
| |
− | |Breakfast
| |
− | !|9:50
| |
− | |
| |
− | |Welcome (Seba & Wim)
| |
− | |
| |
− | |
| |
− | |
| |
− | |-
| |
− | !|10:00
| |
− | |
| |
− | |Keynote - Alex Hutton
| |
− | |
| |
− | |
| |
− | |
| |
− | |-
| |
− | !|11:00
| |
− | |
| |
− | |IOS Data Protection Internals - Andrey Belenko
| |
− | |Collective Malicious PDF Analysis - Brandon Dixon & x0ner
| |
− | |Lockpicking workshop - TOOOL NL
| |
− | |
| |
− | |-
| |
− | !|12:00
| |
− | |
| |
− | |Botnet Identification and remediation - Barry Irwin
| |
− | |
| |
− | |
| |
− | |
| |
− | |- bgcolor="#CCCCCC"
| |
− | !|13:00
| |
− | |Lunch
| |
− | |Lunch
| |
− | |Lunch
| |
− | |Lunch
| |
− | |Lunch
| |
− | |-
| |
− | !|14:00
| |
− | |DJ Workshop (Joernchen and Mumpi of Phenoelit)
| |
− | |Lightning talks Day 1
| |
− | |The web application hacking toolchain - Jason Haddix
| |
− | |White hat shellcode: not for exploits - Didier Stevens
| |
− | |Beer workshop - Machtelt Garrels
| |
− | |-
| |
− | !|15:00
| |
− | |
| |
− | |Smart Phones, the weak link in the security chain - Nick Walker and Werner Nel
| |
− | |
| |
− | |
| |
− | |
| |
− | |- bgcolor="#CCCCCC"
| |
− | !|16:00
| |
− | |Coffee break
| |
− | |Coffee break
| |
− | |Coffee break
| |
− | |Coffee break
| |
− | |Coffee break
| |
− | |-
| |
− | !|16:30
| |
− | |
| |
− | |Keynote - Jaron Lanier (remote)
| |
− | |Wifi malware for fun and profit - Vivek Ramachandran
| |
− | |Hacking your conference badge - OpenAMD
| |
− | |
| |
− | |-
| |
− | !|17:30
| |
− | |
| |
− | |Ripping out code : Practical attack surface reduction for open source systems - Craig Balding
| |
− | |
| |
− | |
| |
− | |
| |
− | |- bgcolor="#CCCCCC"
| |
− | !|18:30
| |
− | |Dinner
| |
− | |Dinner
| |
− | |Dinner
| |
− | |Dinner
| |
− | |Dinner
| |
− | |-
| |
− | !|19:30
| |
− | |
| |
− | |Pentesting high security environments - Joe McCray and Chris Gates
| |
− | |Podcasters meetup
| |
− | |Agnitio: the security code review Swiss knife - David Rook (Securityninja)
| |
− | |
| |
− | |-
| |
− | !|20:30
| |
− | |
| |
− | |Abusing locality in shared web hosting - Nick Nikiforakis
| |
− | |
| |
− | |
| |
− | |
| |
− | |-
| |
− | !|21:30
| |
− | |Close
| |
− | |
| |
− | |
| |
− | |
| |
− | |
| |
− | |-
| |
− | !|22:00
| |
− | |Doors closed
| |
− | |
| |
− | |
| |
− | |
| |
− | |
| |
− | |-
| |
− | |}
| |
− |
| |
− | ==Day 2 : Tuesday September 20th==
| |
− | {| border="1px solid" style="text-align:center;"
| |
− | |- bgcolor="#CCCCCC"
| |
− | !|Time
| |
− | !|Basement
| |
− | !|Aula A (main track)
| |
− | !|Aula B (workshop)
| |
− | !|Aula D (workshop)
| |
− | !|Outside
| |
− | |- bgcolor="#CCCCCC"
| |
− | !|9:00
| |
− | |Breakfast
| |
− | |Breakfast
| |
− | |Breakfast
| |
− | |Breakfast
| |
− | |Breakfast
| |
− | |-
| |
− | !|9:50
| |
− | |
| |
− | |
| |
− | |
| |
− | |
| |
− | |
| |
− | |-
| |
− | !|10:00
| |
− | |
| |
− | |Pushing in, leaving a present and pulling out without anybody noticing - Ian Amit
| |
− | |
| |
− | |
| |
− | |
| |
− | |-
| |
− | !|11:00
| |
− | |
| |
− | |Step-by-Step for Software Security (that anyone can follow) - Pravir Chandra
| |
− | |Hacking your conference badge - OpenAMD
| |
− | |Scriptkiddie hacking techniques - Ellen Moar & Colin McLean
| |
− | |
| |
− | |-
| |
− | !|12:00
| |
− | |
| |
− | |Attacking SAP's J2EE Engine - Alexander Polyakov and Dmitriy Chastuhin
| |
− | |
| |
− | |
| |
− | |
| |
− | |- bgcolor="#CCCCCC"
| |
− | !|13:00
| |
− | |Lunch
| |
− | |Lunch
| |
− | |Lunch
| |
− | |Lunch
| |
− | |Lunch
| |
− | |-
| |
− | !|14:00
| |
− | |
| |
− | |Social Engineering like in the movies - Dale Pearson
| |
− | |Cisco VoIP insecurity - Sandro Gauci and Joffrey Czarny
| |
− | |The web application hacking toolchain - Jason Haddix
| |
− | |
| |
− | |-
| |
− | !|15:00
| |
− | |
| |
− | |Myth-busting Risk - Jack Jones
| |
− | |
| |
− | |
| |
− | |
| |
− | |- bgcolor="#CCCCCC"
| |
− | !|16:00
| |
− | |Coffee break
| |
− | |Coffee break
| |
− | |Coffee break
| |
− | |Coffee break
| |
− | |Coffee break
| |
− | |-
| |
− | !|16:30
| |
− | |
| |
− | |Botnets and Browsers, Brothers in a Ghost Shell - Aditya K Sood
| |
− | |White hat shellcode: not for exploits - Didier Stevens
| |
− | |Wifi Malware for fun and profit - Vivek Ramachandran
| |
− | |
| |
− | |-
| |
− | !|17:30
| |
− | |
| |
− | |Keynote : You and your research - Haroon Meer
| |
− | |
| |
− | |
| |
− | |
| |
− | |- bgcolor="#CCCCCC"
| |
− | !|18:30
| |
− | |Dinner
| |
− | |Dinner
| |
− | |Dinner
| |
− | |Dinner
| |
− | |Dinner
| |
− | |-
| |
− | !|19:30
| |
− | |
| |
− | |Lightning talks Day 2
| |
− | |
| |
− | |
| |
− | |
| |
− | |-
| |
− | !|20:30
| |
− | |
| |
− | |The 99c heart surgeon dilemma - Stefan Friedli
| |
− | |Powerpoint Karaoke
| |
− | |Collective malicious PDF Analysis (Brandon Dixon)
| |
− | |
| |
− | |-
| |
− | !|21:30
| |
− | |Close
| |
− | |
| |
− | |
| |
− | |
| |
− | |
| |
− | |-
| |
− | !|22:00
| |
− | |Doors closed
| |
− | |
| |
− | |
| |
− | |
| |
− | |
| |
− | |-
| |
− | |}
| |
− |
| |
− | =Keynote Speakers=
| |
− |
| |
− | '''Haroon Meer (Thinkst.com, South-Africa) -- You and your research'''
| |
− |
| |
− | Haroon is a well-known security researcher who has recently started his own venture with Thinkst.com, an applied research company. He is also involved with ZACON, a security conference in South-Africa.
| |
− | Haroon is a frequent speaker at conferences such as Blackhat, Defcon, etc.
| |
− |
| |
− | What does it take to do quality research? What stops you from being a one-hit wonder? Is there an age limit to productive hackery? What are the key ingredients needed and how can you up your chances of doing great work? In a talk unabashedly stolen from far greater minds we hope to answer these questions and discuss their repercussions.
| |
− |
| |
− |
| |
− | '''Alex Hutton (Verizon Business, United States)'''
| |
− |
| |
− | Alex is a principal in the Verizon Business RISK intelligence team and has been one of the driving forces behind the VERIS (Verizon Risk Information Sharing) Framework and their yearly Databreach Investigations Report (DBIR). He is involved with the SIRA podcast and frequently presents on risk management and data-driven security at conferences such as Blackhat and Source.
| |
− |
| |
− | '''Jaron Lanier (Microsoft, United States)'''
| |
− |
| |
− | Jaron is a pioneer in the realm of virtual reality and currently works as a principal architect for Microsoft’s Extreme Computing lab. He is the author of the 2010 bestseller “you are not a gadget” and has given talks at conferences around the world on virtual reality and the impact of social networks and web 2.0.
| |
− |
| |
− | '''Due to time constraints Jaron will not be able to attend the conference. Instead we are organizing for him to deliver his keynote talk through a video link. We're still privileged to have Jaron on-board for our 2011 edition!'''
| |
− |
| |
− | =Workshops=
| |
− |
| |
− | '''DJ Workshop (Joernchen and Mumpi of Phenoelit)'''
| |
− |
| |
− | Joernchen and Mumpi will give you an introduction to what it takes to entertain a crowd with the magic of music.
| |
− | This is very much a hands-on workshop so all attendees will get ample time to put the theory into practice guided by two of the best hackers/dj's we are aware of.
| |
− |
| |
− | '''Agnitio: the security code review Swiss army knife (David Rook - Security Ninja)'''
| |
− |
| |
− | Teaching developers to write secure code, helping security professionals find security flaws in source code, producing application security metrics and reports with integrity checks and audit trails. If you want to implement an SDLC that produces secure software with the audit trails and reports frequently demanded by auditors and management you need to acknowledge that these are key constituents and implement them in a form that is both easy to understand and use.
| |
− |
| |
− | This is far easier to talk about than it is to implement in the real world where well structured SDLC’s are rare and application security programmers are usually under funded. Working with developers, security professionals and management to cultivate an environment where secure code is written and flaws found consistently requires both time and money. The same can be said for producing informative reports and metrics when all of your security code review data resides in notepad, Word and Excel files. With these problems in mind I developed Agnitio to be my security code review Swiss army knife and released it as a free tool in late 2010.
| |
− |
| |
− | In this demonstration filled workshop I will show how Agnitio can be used to addresses repeatability, integrity and audit trail concerns by requiring the creation of application profiles, the use of a security code review checklist consisting of over 60 application security questions and mandatory integrity checks for reviews and reports created using the tool. I will demonstrate how the inbuilt secure coding and security code review guidance modules allow developers and security professionals to access the information they need precisely when they need it. I will also show how Agnitio automatically creates metrics and reports bringing much needed visibility to the security code review process with no extra effort required from the reviewer, developers or management.
| |
− |
| |
− | '''Collective Malicious PDF Analysis (Brandon Dixon - x0ner)'''
| |
− |
| |
− | This class will cover the analysis of PDFs like many others have previously done, but it will also go further by helping users setup their own analysis engine. Users will use PDF X-RAY to help with analysis and setup their own local malware repository using open source tools that power PDF X-RAY including MalPdfObj and MongoDB. Users will leave with a new analysis approach and method to tackling the detection of malicious PDF documents instead of a glossing over the specification.
| |
− |
| |
− | '''Script Kiddie Hacking Techniques (Ellen Moar & Colin McLean)'''
| |
− |
| |
− | In April at BSidesLondon, Ellen Moar & Colin McLean demonstrated how effectively a person with just a little coding knowledge could copy and paste their way to a Trojan which was undetected by antivirus. In this workshop they intend to go much further; expanding more on the techniques used, showing many additional tricks that the script kiddie can use, providing exercises so that participants can see how somebody could create their own malware in minutes and leading a discussion on effective countermeasures.
| |
− |
| |
− | At BSides London we covered the following:
| |
− | - Creating the basic Trojan
| |
− | - Avoiding defences
| |
− | - Persistence
| |
− | - Backdoors
| |
− | - Avoiding someone erasing our stuff
| |
− | - Building the installer
| |
− | - Countermeasures
| |
− |
| |
− | In the workshop we'll dig deeper into each section, looking at code samples, testing what we need to do to get past AV at each stage. We'll show how a skript kiddie could build their own malware and just how easy it can be. We'll discuss countermeasures in depth, and discuss just what the risk level is from a script kiddie.
| |
− |
| |
− | This should be a very interactive session. When we presented at BSides we prompted loads of discussion, hopefully at BruCON we can continue that discussion in a workshop setting.
| |
− |
| |
− | '''The Web Application Hacking Toolchain (Jason Haddix - jhaddix)'''
| |
− |
| |
− | There exists many tools for a web pentesters job; proxies, scanners, scripts, etc, but so many of the tutorials or classes on the net leave much to be desired, especially in areas where the tools fail. We aim to show how to effectively chain and use an industry standard web pentest toolset.
| |
− |
| |
− | The workshop contains:
| |
− |
| |
− | - Winning by chaining proxies and scanners
| |
− | - Common headaches with SQL injection through sqlmap
| |
− | - Advanced burp and fiddler
| |
− | - Leaving tools behind, the fuzzdb
| |
− | - Metasploit and beef, practical clientsides
| |
− | - more
| |
− |
| |
− | '''White Hat Shellcode: Not for Exploits (Didier Stevens)'''
| |
− |
| |
− | In this workshop, we will present shellcode designed to protect systems, in stead of attacking systems.
| |
− | Some examples:
| |
− | - shellcode to unload a DLL
| |
− | - shellcode to enable DEP
| |
− | - shellcode to patch a vulnerability
| |
− | - shellcode to prevent heap sprays (from my HeapLocker tool)
| |
− |
| |
− | Participants to the workshop are best to bring a virtual WIndows XP machine.
| |
− | Other tools will we provided during the workshop.
| |
− |
| |
− |
| |
− | '''WiFi malware for Fun and Profit (Vivek Ramachandran)'''
| |
− |
| |
− | In this workshop, we will explore the fun new world of Wi-Fi Malware!
| |
− |
| |
− | We will look at how one can abuse perfectly legitimate and useful features like Hosted Network and Ad-Hoc modes to create pure Wi-Fi Backdoors, Worms and even short range Botnets! We will learn how to program/script these malware using various APIs and command line utilities available natively on Windows. We will see how effective these malware can be in beating conventional forms of host and network based intrusion detection. We will also discuss how you can use your newfound knowledge for fun and profit :)
| |
− |
| |
− | This session will also see the release of new tools and scripts which you can play with later.
| |
− |
| |
− | Hardware/Software Requirements:
| |
− |
| |
− | Attendees must get their own laptop with Windows 7 and a working internal Wi-Fi card or external Adapter. Optionally, to have more fun, you could also have Backtrack installed in the Windows 7 laptop using Virtualbox along with a USB based Wi-Fi card which supports packet sniffing / injection (like the Alfa Network AWUS036H card), though this is not mandatory.
| |
− |
| |
− | '''Cisco VoIP insecurity workshop (Sandro Gauci and Joffrey Czarny aka Sn0rkY)'''
| |
− |
| |
− | The workshop will consist of technical details, demonstrations and practical sessions targeting both the basics of testing the security of Cisco based VoIP solutions and also attacks specific to such products. We will cover scanning and attacking signaling protocols used in Cisco VoIP networks. We will especially focus on toll fraud and confidentiality attacks. Then we will focus on attacks on the phones themselves such as grabbing credentials, SIP digest leakage and
| |
− | remote wiretapping. Discussion of mitigation or solutions will follow.
| |
− |
| |
− | '''Beer brewing workshop (Machtelt Garrels)'''
| |
− |
| |
− | The beer brewing workshop is a blitz course demonstrating the brewing process. During these 2-3 hours you will be introduced to the different steps involving the brewing of a lager beer of double fermentation. We will demonstrate that you can brew beer using simple DIY tools and household equipment. You will get a taste, feel and smell of all the
| |
− | ingredients, and of course of the finished product, as the workshop includes a tasting session. Participants can take home a unique beer that they have bottled themselves during the workshop.
| |
− |
| |
− | '''Lockpicking (TBD)'''
| |
− |
| |
− | '''RFID (TBD)'''
| |
− |
| |
− | =Presentations=
| |
− |
| |
− | '''Attacking SAP's J2EE Engine (Alexander Polyakov and Dmitriy Chastuhin)'''
| |
− |
| |
− | Nowadays SAP NetWeaver platform is the most widespread platform for developing enterprise business applications. It’s becoming popular security topic but still not covered well.
| |
− |
| |
− | This talk will be focused on one of the black holes called SAP J2EE engine. Some of the critical SAP products like SAP Portal, SAP Mobile, SAP XI and many other applications lay on J2EE engine which is apart from ABAP engine is less discussed but also critical.
| |
− |
| |
− | I will explain architecture of SAP’s J2EE engine and give a complete tour into its internals. After that I will show a number of previously unknown architecture and program vulnerabilities from auth bypasses, smbrelays, internal scans, xml/soap attacks to insecure encryption algorithms and cross-system vulnerabilities in J2EE platform.
| |
− | Finally it will be presented chained attack which use multiple logic vulnerabilities and give a full control on SAP’s J2EE Engine. A free tool will be presented to automatically scan custom applications against this attack.
| |
− |
| |
− | '''Ripping Out Code: Practical Attack Surface Reduction for Open Source Systems (Craig Balding)'''
| |
− |
| |
− | This talk is about how the software choices we make (or tacitly accept) on our desktops, have greatly increased our attack surface. In the case of OSS, we'll look at practical metrics for measuring code complexity and attack surface along with a "hall of shame" where some OSS projects you know, use and love will be "weighed in". In "the what you can do about it" section, I'll show ways to bring back simplicity and security through highlighting "lighter options" and ripping out code (for non-programmers).
| |
− |
| |
− | '''Pentesting High Security Environments (Joe McCray and Chris Gates)'''
| |
− |
| |
− | This presentation focuses on pentesting high security environments, new ways of identifying/bypassing common security mechanisms, owning the domain, staying persistent, and ex-filtrating critical data from the network without being detected. The term Advanced Persistent Threat (APT) has caused quite a stir in the IT Security field, but few pentesters actually utilize APT techniques and tactics in their pentests. This presentation picks up where Joe left off in last year’s Def Con presentation “You Spent All That Money And You Still Got Owned” and takes it to the next level. Joe will also be releasing a new tool as well.
| |
− |
| |
− | '''Abusing Locality in Shared Web Hosting (Nick Nikiforakis - nikifor)'''
| |
− |
| |
− | The increasing popularity of the World Wide Web has made more and more individuals and companies to identify the need of acquiring a Web presence. The most common way of acquiring such a presence is through Web hosting companies and the most popular hosting solution is shared Web hosting. In this presentation we investigate the workings of shared Web hosting and we point out the potential lack of session isolation between domains hosted on the same physical server. We present two novel server-side attacks against session storage which target the logic of a Web application instead of specific logged-in users. Due to the lack of isolation, an attacker with a domain under his
| |
− | control can force arbitrary sessions to co-located Web applications as well as inspect and edit the contents of their existing active sessions. Using these techniques, an attacker can circumvent authentication mechanisms, elevate his privileges, steal private information and conduct attacks that would be otherwise impossible. Finally, we test the
| |
− | applicability of our attacks against common open-source software and evaluate their effectiveness in the presence of
| |
− | generic server-side countermeasures.
| |
− |
| |
− | '''Botnet Identification and remediation (Barry Irwin)'''
| |
− |
| |
− | Modern botnet trends have become increasingly sophisticated both in terms of the techniques used to avoid detection on compromised endpoints, but also in their varied communication channels. The use of IRC as the communications medium of choice for Command & Control (C2) activities has been replaced with sophisticated use of IP and domain fast-fluxing to avoid detection and increase resilience. These techniques largely bypass traditional network security detection and mitigation approaches such as blacklists and intrusion detection systems.
| |
− |
| |
− | In the ongoing defence against these networks, a number of novel approaches are presented in order to allow an organisation to perform near realtime analysis of network traffic with very low system load. The intention of these is that an organisation or ISP could use the tools as a means of early identification of compromised hosts participating in the botnet. This paper is comprised of three components, the first two relating to detection mechanism, and the final one providing a console which can be used to tracking and information aggregation.
| |
− |
| |
− | The first detection technique utilises passive analysis of DNS traffic collected from the network. Due to its tight integration with the TCP/IP suite, it serves as an ideal transport mechanism for communications. Using a combination of classifiers, a high degree of accuracy is obtained in the identification of fast flux domains, using at most a single DNS packet query. This is in contrast to work done by other researchers which required multiple queries. The detection techniques are tested against sample traffic and it is shown that malicious traffic can be detected with low
| |
− | false positive rates. This can be combined with a more heavyweight scoring system which utilises other metadata such as registrar, domain age and ASN data to further support scoring.
| |
− |
| |
− | The second component applies a lightweight mathematical classification to observed URLs contained in network traffic. This can either be via a network tap, or integrated into a proxy server solution such as squid. The methods used are able to identify malicious urls with a high degree of accuracy, while maintaining a low false positive rate. This lightweight solutionc an be further supported by active queries relating to target ASN, Domain registrar, and other existing blacklists and dnsbl systems.
| |
− |
| |
− | The final component provides a web based management and visualisation system providing integration between the above two classes in order to allow for ease of notification of malicious activity. The anticipated target for theses solutions are Academic networks, ISPs and to a lesser extent corporate networks. The intention being that by providing suitable monitoring and analysis of traffic egressing ones network, re-mediation can be carried out by the organisation closest to the infection – in effect cleaning up ones own back yard. A role that this can play other than the operational one described, is to provide researchers with access to suitable data (either live networks or even malware labs) to have an automated means of identifying potentially malicious activity, with very low resource requirements.
| |
− |
| |
− | '''Botnets and Browsers - Brothers in a Ghost Shell (Aditya K Sood)'''
| |
− |
| |
− | Browsers exploitation is on rise. Botnets in conjunction with Browser Exploit Packs (BEP's) are becoming the source of incredible malware infections. The exploitation revolves around the manipulation of browser architectures thereby infecting victims at large scale. Malware infection is proliferating day by day. In spite of the new advanced protection features, subverting the infections that happen through browsers and take control of the victim's machine remains an arduous task. Exploit packs and attack toolkits play a critical role in the success of malware infections. Browser Exploit Packs (BEPs) are based on the basic philosophy of exploiting the extensibility of browsers by utilizing the technology and developing a code which should work in line with the browser classes.
| |
− |
| |
− | '''Step-by-Step for Software Security (that anyone can follow) (Pravir Chandra)'''
| |
− |
| |
− | These days, most organizations have identified a need for a Software Security Assurance (SSA) program, but many are stymied in their infancy by challenges such as lack of resources, difficulty to sell it upward/across the organization, questions about where to start first, and inability to show benefit to the business. This talk will present a step-by-step plan to build an SSA program that addresses all these challenges. Not only is the plan easy to understand and follow, it has been successfully used with organizations across industry verticals including financial services, retail, high-tech, and government. This plan combines resources from OWASP and other sources (with examples) to set any organization on the path to SSA success.
| |
− |
| |
− | '''Myth-busting Risk (Jack Jones)'''
| |
− |
| |
− | Risk has become a hot topic in the industry. Unfortunately, there are a lot of misconceptions and myths within our industry about what it is, how to measure it, and even whether it can be measured at all. In this session, Jack will bring clarity to the issue by describing what risk is (and isn't) and exploding common misconceptions and myths. He'll also talk about how a risk-based focus can fundamentally change our value proposition to our employers.
| |
− |
| |
− | '''iOS Data Protection Internals (Andrey Belenko)'''
| |
− |
| |
− | Data protection is a feature available for iOS 4 devices with hardware encryption: iPhone 4, iPhone 3GS, iPod touch (3rd generation or later), and all iPad models. Introduction of this feature had complicated iPhone forensics process because now (almost) all files on user partition are encrypted and physical dumps are of much less value to examiners: while the filesystem seems to be intact, actual file contents are encrypted and are not suitable for analysis. This talk will provide in-depth information about iOS 4 Data protection internals.
| |
− |
| |
− | '''The 99¢ heart surgeon dilemma (Stefan Friedli)'''
| |
− |
| |
− | Let's assume you need heart sugery. I hope you don't, but let's just stick with it for a minute. How much would you be willing for someone to fix it and who would you hire to do it? If you are a suicidal emo kid, please do not answer, you are ruining the point here. Here's the thing: People want someone suitable and knowledgeable to cut them open and sew them up again and they are willing to pay good money for it. Here are two things you don't want to do:
| |
− |
| |
− | 1) You don't want to hire some old drunk with a pocket knife and a sewing kit from the dollar shop which claims to fix your heart for 100 bucks.
| |
− |
| |
− | 2) You don't want to hire the same guy for 100'000 bucks when he's wearing a white coat and got shiny high tech tools because the last guy paid in advance...
| |
− |
| |
− | What does this have to do with penetration testing? More than we like, unfortunately. I have met companies that invested thousands of dollars, expecting a pentest and getting a spiced up Nessus report as a result. More subtle nuances of "crappy pentest" might overlook essential threats and leave customers at risk with a false sense of security.
| |
− |
| |
− | This talk will explore the common mistakes made when performing pentests, which includes the test itself, as well as pre- and post-engagement matters. Also, it applies for testers and customers alike. Also, it might help saving the rainforests.
| |
− |
| |
− | '''Pushing in, leaving a present, and pulling out without anybody noticing (Ian Amit)'''
| |
| | | |
− | The industry is saturated with penetration testing experience and have adapted itself to test organizations using "best practice" methodologies over the past decade or so. With not a lot of changes happening in the field, organizations find themselves on the defense with not a lot to account for when data breaches happen.
| + | Full schedule of the 0x09 (2017) edition [https://brucon0x092017.sched.com/ https://brucon0x092017.sched.com/] |
| | | |
− | In this presentation we will offer an alternative view of how a security test is done, with a strong focus on data exfiltration techniques employed by advanced attackers and criminals. After an overview of how the initial phases of how an attacker would infiltrate a business (common knowledge), we will explore the targeting considerations when choosing what to look after, as well as advanced techniques for getting the data out without being detected.
| + | '''Keynotes:''' |
| | | |
− | Finally, some approaches to data monitoring and control would be proposed in order to mitigate the techniques that are already in place and have affected large organizations.
| + | * Keynote: [[Justine Bone]] - [[The cyber short. A market solution for product safety and corporate governance.]] |
| + | * Keynote: [[Chris Wysopal]] - [[How hackers changed the security industry and how we need to keep changing it.]] |
| | | |
− | '''Social Engineering Like In The Movies (Dale Pearson)''' | + | '''Talks:''' |
| | | |
− | When talking about some of the essential skills of a successful social engineer we regularly discuss body language, the tells of the face and how we can read them, along with how important tonality and commitment are. These are considered common practice, and within the realms of possibility due to popularisation through the media. When we dip our toe further into understanding how the entire body communicates, the secrets of language for manipulating others, all of a sudden it couldn’t be possible, this must be witchcraft.
| + | * [[Matt Wixey]] - [[See no evil, hear no evil: Hacking invisibly and silently with light and sound]] |
| + | * [[Balazs Bucsay]] - [[XFLTReaT: a new dimension in tunnelling]] |
| + | * [[Anna Shirokova]] and [[Veronica Valeros]] - [[Knock Knock... Who's there? admin admin and get in! An overview of the CMS brute-forcing malware landscape.]] |
| + | * [[Volodymyr Styran]] - [[From Weakest Link to Retaliation Weapon: Building Efficient Anti-Social Engineering Awareness Program]] |
| + | * [[Sampada Nandedkar]] and [[Rushikesh Nandedkar]] - [[Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited)]] |
| + | * [[Damien Cauquil]] - [[Weaponizing the BBC Micro:Bit]] |
| + | * [[Sander Demeester]] - [[Secure channels: Building real world crypto systems]] |
| + | * Josh Schwartz and John Cramb - [[MEATPISTOL, A Modular Malware Implant Framework]] |
| + | * [[Gregory Pickett]] - [[Open Source Security Orchestration]] |
| + | * [[František Střasák]] and Sebastian Garcia- [[Detecting malware even when it is encrypted - Machine Learning for network HTTPS analysis]] |
| + | * [[Nikhil Mittal]] - [[Evading Microsoft ATA for Active Directory Domination]] |
| + | * [[Debasish Mandal]] - [[Browser Exploits? Grab them by the collar!]] |
| | | |
− | '''Smart Phones – The Weak Link in the Security Chain (Nick Walker - Werner Nel)''' | + | '''Workshops:''' |
| | | |
− | One of the most rapidly advancing aspects of technology today is the mobile phone. Use of a smart phone has become commonplace within both business and society, and many people rely on these devices in their day to day lives. As they increase in both power and functionality, smart phones become both a feasible target and a weapon for an attacker. With these mobile devices having more externally facing services than most other systems, a large attack surface is available. As this talk will show that once compromised, a smart phone of an employee is a deadly tool for breaking in and maintaining a foothold on a corporate network. The talk will demonstrate a multi-staged attack on an non-rooted android handset, running the most common stock firmware versions.
| + | * Benjamin Delpy - Mimikatz workshop |
| + | * [[Didier Stevens]] - [[Programming Wireshark With Lua]] |
| + | * [[David Szili]] - [[Getting the Most Out of Windows Event Logs]] |
| + | * [[Steven Wierckx]] and [[Andy Deweirt]] - [[Building a cheap, robust, scaling, penetration testing/bug bounty super computer]] |
| + | * [[Swaroop Yermalkar]] - [[Practical iOS App Exploitation and Defense using iGoat]] |
| + | * [[Sergei Frankoff]] and [[Sean Wilson]] - [[Malware Triage: Malscripts Are The New Exploit Kit]] |
| + | * [[Emmanuel Nicaise]] - [[Jedi's trick to convince your boss and colleagues]] |
| + | * [[Leszek Mis]] - [[May the data stay with you - Network Data Exfiltration Techniques.]] |
| + | * [[Slawomir Jasek]] - [[Hacking Bluetooth Smart locks]] |
| + | * [[Georges Bossert]] and [[Frédéric Guihéry]] - [[Defeating Proprietary Protocols the Smart Way]] |
| + | * [[Anto Joseph]] and [[Clarence Chio]] - [[Practical Machine Learning in InfoSecurity]] |
| + | * [[Vinnie Vanhoecke]] and Tom Kustermans and Joachim Schäfer - [[Playing with RFID workshop]] |
| + | * [[Yannick Wellens]] - [[Windows malware development: A JMP in the dark]] |