Loading…
BSidesLV 2015 has ended
Underground [clear filter]
Tuesday, August 4
 

11:00 PDT

Practical Application Whitelisting Evasion
Organizations continue to tout Application Whitelisting as one of the best counter-measures to deploy. We have developed several evasion techniques that put organizations at risk that use Application Whitelisting. We would like to share these techniques, and engage in dialogue about ways to improve or expand our research.

Speakers
avatar for Casey Smith

Casey Smith

Casey Smith (@subtee) has a passion for understanding and testing the limits of defensive systems.


Tuesday August 4, 2015 11:00 - 11:55 PDT
Underground The Tuscany

14:00 PDT

The Internet of ... Mainframes?! WTF?
In early 2013 Soldier of Fortran had an idea. What if there were mainframes on the internet? He knew, of course, there had to be, the internet is just full of all kinds of weird stuff. But what if there’s also mainframes on there, what would that mean? What would they look like? Using some google fu he started the hunt, easily finding a handful, then later moving on to SHODAN and finally masscan. Having grown up in the BBS era he was happy to find hundreds of ‘green’ screens up and running with their beautiful EBCDIC art for all the world to see. This talk will walk through the story of how he found the mainframes, first by himself and later with the help of others. He’ll go through the growth process he went through to find the mainframes and how he helped augment tools like SHODAN to make the hunting easier. He’ll detail the tools he wrote specifically to hunt internet mainframes, the troubles he’s gotten in to for looking for them (like when someone came up to me after a talk to tell me it was one of theirs) and then provide MANY examples of the the kind of (scary) things he’s encountered on the web. He’ll also delve into some of the alarming statistics of mainframe security using what he’s seen as an example. There may even be some live examples of some of those mainframes.

Speakers
avatar for Soldier of FORTRAN

Soldier of FORTRAN

Supreme Commander, Zed Security
Soldier of Fortran is a mainframe hacker. Being a hacker from way back in the day (BBS and X.25 networks) he was always enamored by the idea of hacking mainframes. Always too expensive and mysterious he settled on hacking windows and linux machines, until 2010 when he finally got... Read More →


Tuesday August 4, 2015 14:00 - 14:55 PDT
Underground The Tuscany

15:00 PDT

What's New Pussycat: Recent Improvements to Powercat
Powercat allows testers to accurately replicate a variety of sophisticated command and control techniques used by skillful attackers. Attendees will learn; core functionality, the latest developments, and help determine future project plans.

Speakers
LB

Luke Baggett

Luke Baggett is a computer science student working as an intern for Black Hills Information Security, where he does penetration testing, and works on various development projects. In his spare time Luke has worked on powercat, a powershell dnscat client, and some currently unreleased... Read More →
MD

Mick Douglas

Mick Douglas is the DFIR Practice Lead at Binary Defense Systems, where he assists companies in every phase of recovery from information security incidents. He is also an instructor for SANS where he teaches several different classes at the community level. In his spare time, Mick... Read More →


Tuesday August 4, 2015 15:00 - 15:55 PDT
Underground The Tuscany

17:00 PDT

Hacking Our Way Into Hacking
It may seem like everyone in infosec has always been a hacker. However, many of us have come to hacking from other industries, and as we make our way through the infosec community it’s often hard to find others like us. This is a conversation for every hacker who started as a mechanic, a kindergarten teacher, or a gender studies major: let’s talk about where we came from, how we got here, and some of the unique challenges we’ve come across as hackers with “past lives”.

Speakers
avatar for Kat Sweet

Kat Sweet

Kat Sweet works for Duo Security's security operations team as an information security analyst (and senior pun architect). A passionate security educator, she is heavily involved in building her team's employee security awareness and engagement program, and is frequently the first... Read More →


Tuesday August 4, 2015 17:00 - 17:55 PDT
Underground The Tuscany

18:00 PDT

Stress, Burnout, Rinse, Repeat
Stories of burnout in tech professionals are not rare, particularly in security pros. Building on the earlier work of the stress and burnout project team which presented at BSidesLV 2011 and RSA USA 2012 and adding new voices, perspectives, and research this panel will explore what we have learned about warning signs, prevention, support, and recovery- and what remains to be done. This will be a highly personal and conversational discussion. While this topic needs public discussion, we are submitting to the Underground track to encourage candid discussions which might be stifled by public exposure.

Speakers
avatar for Josh Corman

Josh Corman

Joshua Corman is a Founder of I am The Cavalry (dot org) and CSO for PTC. Corman previously served as Director of the Cyber Statecraft Initiative for the Atlantic Council, CTO for Sonatype, Director of Security Intelligence for Akamai, and in senior research & strategy roles for The... Read More →
avatar for Jack Daniel

Jack Daniel

Co-Founder, Security BSides
Security BSides, the history of infosec, the meaning of life.
MM

Martin McKeay

Trouble Maker
Martin McKeay is bad at getting his bio to the panel moderator, and feasts on unicorns. Clearly he's been in Britain too long. Martin is a Senior Security Advocate at Akamai, joining the company in 2011. As a member of Akamai's Security Intelligence Team, he is responsible for researching... Read More →
avatar for Chris Sumner

Chris Sumner

Data Enthusiast
Chris is a security data nerd at Hewlett-Packard. Outside work he co-founded the not-for-profit Online Privacy Foundation who contribute to the emerging discipline of behavioral residue research within online social networks. He has previously spoken on this area of research at BSides... Read More →
avatar for Scott Thomas

Scott Thomas

Sr. Security Consultant/Vulnerability Management Team Lead, VioPoint
Scott has worked in IT since the 90s mostly in finance & insurance. He has held multiple jobs ranging from the Service Desk to Vulnerability management. He is currently a Senior Security Consultant leading the Vulnerability Management practice for VioPoint. He helps support multiple... Read More →


Tuesday August 4, 2015 18:00 - 18:55 PDT
Underground The Tuscany
 
Wednesday, August 5
 

10:00 PDT

All You Need Is One: A ClickOnce Love Story
ClickOnce is a deployment solution that enables fast, easy delivery of packaged software. It is commonly used by organizations to deploy both internal and production-grade software packages along with their respective updates. By allowing end-users to accept the requested permissions of the software package without the intervention of an administrator, ClickOnce simplifies the deployment and use of robust software solutions.
It also provides an excellent opportunity for malicious actors to establish a foothold in your network.
In this talk, we will discuss how we combined ClickOnce technology and existing phishing techniques into a new methodology for establishing an initial presence in an environment. By minimizing user interaction, we only require that the user is fooled for "one click" - after that, we already have a foothold in their environment and are ready to pivot and escalate further.

Speakers
RG

Ryan Gandrud

Ryan has a B.S. in computer science from North Dakota State University. He has done work in the Information Technology, Healthcare, Financial Services, and Information Security industries. Ryan's primary knowledge base includes network, web application, and thick application penetration... Read More →
CW

Cody Wass

Cody graduated from North Dakota State University with a degree in Computer Science. He fiddles with web applications and struggles with IDA in his spare time, usually while enjoying a glass of single malt scotch.


Wednesday August 5, 2015 10:00 - 10:55 PDT
Underground The Tuscany

11:00 PDT

Bio-Hacking: Implantable chip attack vector
Implantable electronic devices are becoming more common nowadays. Specifically subdermal implants are now being used in companies for employee identification, security access, medical records and authentication among other uses. These implantable devices can easily bypass current security check procedures in most enterprises as they are located inside the body of a human. A live demo of mobile exploitation using an implanted RFID chip into a subject's hand will be performed during this presentation. This proof of concept aims to show the possibilities of use of implantable devices as attack vectors.

Speakers
RS

Rod Soto

Rod Soto is a security researcher and board member of HackMiami. He is a regular speaker at hacking conferences all over the country on the topics of penetration testing tools and methods, as well as the topic of digital civil liberties. Rod Soto was the winner of the 2012 BlackHat... Read More →
avatar for Seth Wahle

Seth Wahle

Seth Wahle is an engineer and security researcher who specializes in embedded computing, robotic, and radio frequency systems. As a former Fire Control-man in the United States Navy, He maintained and controlled the ships self defense weapon systems to protect the U.S. fleet against... Read More →


Wednesday August 5, 2015 11:00 - 11:55 PDT
Underground The Tuscany

14:00 PDT

Fishing To Phishing - It’s all about slimy creatures.
Hacking a fish finder should be something that hasn't been seen or talked about. The talk will be fun and interest anyone inside or outside the BSides community. Many can relate, or understand the issues and risks of poor security for almost any new device. Most don't realize how powerful sonar units have become over the last 5 years. Fishing is one of the most popular activities in the world.

This talk can be 20 or 45 minutes

Speakers
WC

Wayne Crowder

After the dream of becoming a fisheries biologist was crushed under the reality of low pay for 8+ years of school, Wayne turned to his love of technology. IT and Security have been very kind to Wayne's fishing habit. For many years it supported him while he moonlighted as a professional... Read More →


Wednesday August 5, 2015 14:00 - 14:55 PDT
Underground The Tuscany

15:00 PDT

Insider Tricks for Bug Bounty Success
If you are new to Bug Bounties, learn how to start reporting bugs for cash. If you have experience with Bug Bounties, learn how to increase your chances of success and earn bigger rewards.

Speakers
avatar for PHIL PURVIANCE

PHIL PURVIANCE

Security Associate, Bishop Fox
The number of companies with bug bounty programs has increased dramatically over the last five years. A clever researcher can make easy money disclosing security vulnerabilities responsibly, and some have even turned it into a full-time job. But how do these programs actually work? I will use my personal experiences on both sides of the fence - as a bug hunter and as a bug bounty submission reviewer - to provide an exclusive look into the world of vulnerability reporting. Learn about the most common eligible vulnerabilities... Read More →


Wednesday August 5, 2015 15:00 - 15:55 PDT
Underground The Tuscany

17:00 PDT

Actionable Threat Intelligence: ISIS, SuperBall, SuperFish, and your less magical 8-ball
Threat intelligence. You keep using that term. I'm not sure it means what you think it means.
Plagued by meaningless generalized URLs and file hashes was supposed to be the role of AVs and proxies, how it came about that threat intelligence vendors keep providing those?
Actionable threat intelligence is the rainbow burping unicorn of infosec where such provided intelligence is actually useful for the specific organization.
In this talk we'll discuss about SOME of the way that this can be achieved and utilized in a risk management program.

Speakers
avatar for Iftach Ian Amit

Iftach Ian Amit

CSO, Cimpress


Wednesday August 5, 2015 17:00 - 17:55 PDT
Underground The Tuscany

18:00 PDT

Ask the EFF
"Ask EFF" will be a panel presentation and question-and-answer session with several staff members of the Electronic Frontier Foundation, the nation’s premiere nonprofit digital civil liberties group. Each staffer will discuss a particular issue that has been in the news or on EFF’s docket this yea.

Speakers
avatar for Nate Cardozo

Nate Cardozo

Senior Staff Attorney, Electronic Frontier Foundation
Nate Cardozo is a Senior Staff Attorney on EFF’s civil liberties team where he focuses on cybersecurity policy and defending coders’ rights.Nate has litigated cases involving electronic surveillance, freedom of information, digital anonymity, online free expression, and government... Read More →
NK

Nadia Kayyali

NADIA KAYYALI is a member of EFF’s activism team. Nadia's work focuses on surveillance, national security policy, and the intersection of criminal justice, racial justice, and digital civil liberties issues. Nadia has been an activist since high school, when they participated in... Read More →
avatar for Kurt Opsahl

Kurt Opsahl

Deputy Executive Director and General Counsel, Electronic Frontier Foundation
Kurt Opsahl is the Deputy Executive Director and General Counsel of the Electronic Frontier Foundation. In addition to representing clients on civil liberties, free speech and privacy law, Opsahl counsels on EFF projects and initiatives. Opsahl is the lead attorney on the Coders... Read More →


Wednesday August 5, 2015 18:00 - 19:00 PDT
Underground The Tuscany
 
Filter sessions
Apply filters to sessions.