Introduction to Hack In Paris 2020
• Founder: www.thesecurityawarenesscompany.com, (Interpact, Inc.) The Security Awareness Company • Distinguished Fellow: Ponemon Institute 2012+ • Advisor to the President: ISSA, International • Board. Mobile Application Development Partners, LLC, • In November 2009, was named one of the Top‐20 security industry pioneers by SC Magazine. • Named one of the Top 25 Most Influential People for 2008 by Security Magazine • Voted one of the Top 5 Security Thinkers for 2007 by SC Magazine. • In 2002, honored as a “Power Thinker” and one of the 50 most powerful people by Network World. • He coined the term “Electronic Pearl Harbor" and was the Project Lead of the Manhattan Cyber Project Information Warfare and Electronic Civil Defense Team. • Founder of InfowarCon
Storytelling about creating, managing a small audit team and red teaming the different branches of the ministry of finances: our Tax branch (dgfip), Borders controls (Douanes), Fraud control (DGCCRF), statistics and data branch (Insee) … The good, the bad and the ugly.
different domains, different strategies, different weakness but a lot of common factors
The goal is not to point at failures or names, but to understand why failures happen, how to prevent the most common weak points and why it matters.
Security is hard
M.ARMANDO is handling cyber-security internal audits for the ministry of finances for the past 2 years, including red teaming, incident responses, web application audits, under the supervision of the CISO of the ministry of Finances
https://ssi.economie.gouv.fr
Previously, He was responsible for inspecting physical and cyber security protection regarding terrorist threat on nuclear powerplants and civil nuclear installation for the ministry of Environment.
https://fr.wikipedia.org/wiki/Département_de_la_sécurité_nucléaire
Security tools often have very poor security, this talk will cover our attempts at creating a reasonably secure implant framework. This talk will cover the motivations, reasoning, design, and tricks of building secure custom implants and covert C2 channels.
Sliver is an open source general purpose cross-platform implant framework that supports C2 over Mutual-TLS, HTTP(S), and DNS. Sliver uses an embedded version of the Go compiler to dynamically generate implant binaries with per-binary X.509 certificates, per-binary obfuscation, and per-binary DNS canaries (unique domain strings that are deliberately not obfuscated and the server trigger alert if it’s ever resolved, indicating the implant has been discovered). Other features include in-band TCP tunnels (e.g. TCP over DNS), procedurally generated HTTP C2 messages, automated Let’s Encrypt integration, and more.
Sliver supports Windows-specific post-exploit features such as: user token manipulation in-memory .NET assembly execution, process migration, and privilege escalation features.
The Sliver GUI features a reasonably secure Electron design, leveraging sandboxed webviews, custom protocol handlers, context isolation, content-security-policy, and sandbox-to-native-IPC communication.
Joe DeMesy is a Senior Associate at Bishop Fox, a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on penetration testing, source code review, and mobile application assessments.
Joe is an expert in secure development, proficient in several programming languages, and is a leading contributor to various open source projects such as iSpy, a reverse engineering framework for iOS applications, and Untwister, a tool to exploit weaknesses in various pseudo-random number generators. Joe has previously volunteered as a red team penetration tester for the Collegiate Cyber Defense Competition (CCDC).
Joe is a noted expert in the field of information security, having been quoted in Market Watch, NPR, InformationWeek, and Dark Reading. He has also presented his research at conferences such as BSidesLV, Kiwicon, BlackHat and private conferences hosted by the US Department of Defense, where he was recognized by the Department of Defense's CIO for exceptional achievements in security contributions.
Ronan Kervella is a Security Associate at Bishop Fox, where he focuses on external and internal penetration testing and hybrid application assessments. He has advised Fortune 500 brands and startups in industries such as finance, technology, and manufacturing.
Author of open source-tools including Hershell, Ronan actively contributes to the Sliver framework. His work has been presented at security conferences such as SummerCon and CactusCon.
Do you want to hack your Xbox One for FREE GAMES?? Well you can't. The reason for that is that someone did a really good job protecting the device's boot sequence. But this isn't a story of "that one time that someone did a good job"; it's a collective of all the other stories, when people screwed up.
Secure boot is a process where boot images and code are authenticated before they are allowed to be used in the boot process. Optimally, this creates a chain of trust engulfing all code run on embedded device. This prevents rogue code from executing within the system without the manufacturers approval. Examples include DRM on gaming consoles, root-prevention in smart phones and protection from supply-chain attacks. But not only high-end systems like phones and PCs are using Secure Boot these days - it is used to protect many devices, from smart homes and cities to automotive ECUs from malicious intent.
As embedded vulnerability researchers who are exploiting Automotive and IoT devices, one of our primary targets are secure boot solutions. The earlier in the boot process we manage to manipulate code executed by the system, the greater the power of our attack becomes. Bypassing software protections placed at later stages of the boot process, our only limitations remain hardware protections.
In this talk we will give an overview of common secure boot mechanisms and examples of vulnerabilities found within these systems. We will share our methodology in analyzing boot processes and exploiting them. This talk is based on research we conducted on numerous IoT and Automotive systems and our findings within.
Lior is an experienced security researcher and consultant focusing on embedded devices security. Lior early career started at the military cyber corps, where he served as an officer for 6 years. Later on he specialized in automotive ECU hacking, working as a vulnerability researcher for Cymotive Technologies, and as a secure development consultant at his own firm Imperium Security.
Do you know how Microsoft's popular Remote Desktop Protocol works? The importance of actually knowing it has never been greater. In light of the recent critical vulnerabilities that were found in the protocol (BlueKeep CVE-2019-0708 and DejaBlue CVE-2019-1181), it became an essential knowledge that is absolutely crucial for everyone in the industry these days!
You can be a blue-teamer that needs to understand how those vulnerabilities work in order to detect and mitigate them in your network, you can be a security researcher/red-teamer that is pursuing the next critical vulnerability, or maybe you're just a security enthusiast that wants to understand what's everybody talking about without having to read Microsoft's thousands of pages of RDP documentation.
RDP is relevant now more than ever, having Microsoft's Azure and Hyper-V platforms using it as the default remote connection protocol.
In this talk, we are going to cover the protocol's basics - we'll see how it works, all the layers of different protocols in RDP, how a connection is initiated and what are the capabilities of this powerful protocol. Every version of Windows since XP includes an installed RDP Client (mstsc.exe) and yet, it is hard to find easy-to-digest information about the inner workings of the protocol.
After establishing the basics, we'll walk through the latest critical vulnerabilities that were found recently in the protocol to understand the nitty-gritty details. It goes without saying, but we can't talk about vulnerabilities without seeing demos.
Finally, we'll try to make some predictions for the future of this protocol. Will we see more and more researchers digging their hand into it? For how long will those critical vulnerabilities stay relevant in our "un-patched" world? Will we see a substantial change in the protocol to favor its security?
Presentation Outline
What is the Remote Desktop protocol? Where did it start? Which protocols is it based on? What was the original use and how new technologies like Azure or Hyper-V still take advantage of it.
Kindergarten: From the Bottom-up (15 minutes)
How does an RDP connection look like? We'll see what are the stages for initiating it and what data is tossed between the client and the server in every one of those stages. We'll try to strip down the connection phase to the bare minimum in order to understand the basics.
High school: blue ? (25 minutes)
In this part, we'll walk through some of the most critical vulnerabilities in RDP history. We'll deep dive and analyze the inner mechanisms of the most interesting ones (BlueKeep and DejaBlue).
College: a look into the future (5 minutes)
Here we'll try to predict the future for this protocol. Will it still be embraced by future technologies or will Microsoft decide to abandon it in favor of a more secure protocol? What about the attack surface, is it shrinking or just growing?
Shaked Reiner is a security researcher in CyberArk focused on researching advanced attack vectors and malicious activities. Prior to CyberArk Reiner was a team leader of a defense team in the IDF, responsible for defending a highly classified network and reverse engineer new/unknown threats.
We will show how threat hunting processes and tools can be leveraged in offensive operations. With hunting hypotheses, Jupyter notebooks and custom scripts we can leverage existing data and hunt for paths to the crown jewels and investigation traces you likely missed before.
When performing an extensive red teaming operation (e.g. TIBER), operators are performing multiple scenarios over a multi-month period. Each scenario can have multiple-C2 and backend infrastructures where some channels only had temporary access. Each infrastructure result in its own dataset and logs.
As soon we achieve an initial foothold in the target organisation, we find ourselves in a data gold mine. There is data everywhere, e.g. AD info, files and folder on local disk and network drives, security settings of systems and GPOs, password complexity, paths shown by BloodHound, running processes on systems, but also public TI data and data from scans on our external infra, and lastly info from probes that we can launch ourselves.
The question is: How to use the available data points, from our own infrastructure and the data of the target network to the fullest?
In order to leverage the data available we apply an approach similar to threat hunting. We introduce hypothesis-based hunting for offensive purposes. We consider hunts in multiple directions, e.g.:
Hunting for access paths that can be leveraged to achieve the red team impact
Hunting for regular user behaviour to speed up the learning curve of red team operators
Hunting for traces of an investigation by blue teams SOC
We will discuss various practical examples and their implementation. For example how to hunt for ‘On one of the compromised systems there is an active process of a user that can be leveraged to obtain Domain Admin privileges’. With a combination of Jupyter notebooks, Log data and data enrichment via Bloodhound we show how this hypothesis can be tested and automated.
Of course all queries, hypotheses and playbooks are released!
Marc (@MarcOverIP) is a red teamer and one of the founders of Outflank. He started his career deep in the network stack with a special interest to security. Since 2006 he is fully engaged in security, with red team operations, threat hunting and giving kick-ass technical trainings having his focus. Marc has found an exciting 'blue' aspect of red teaming when he started researching how blue teams investigate red team operations and infrastructures. He open sourced his research when he founded the RedELK project in 2018. He spends his (spare) research time on expanding the ability to detect and bust prying blue teamers and online security services investigating Outflank's red teaming infrastructures. In his free time Marc can be found spending time with his family, enjoying a glass of Champagne and watching Formula 1.
Mark (@xychix) is one of the founders of Outflank. He started his career as developer but moved to security as soon as he found out real developers tend to think different. Now engagement manager and red team operator, Mark loves his daily job as it covers all aspects, from fiddling with bits and bytes all the way to helping board members working with lessons learned from a heavy red team assignment. Within the team, Mark is the lazy one that always has a snippet of python that can help solve the problem, just don't expect it to be production ready. It's a functional script and no more! When not lost in a computer, Mark loves beers, driving 4x4, swimming in icy water and bouldering.
It is difficult to choose between the myriad of assessment options such as vulnerability scans, penetration tests, and red team engagements. Luckily there's the MITRE ATT&CK framework. You can leverage ATT&CK to understand what types of assessments are right for your organization today and identify when it's time to advance to the next level.
Red teaming, penetration testing, adversary simulations, table top exercises, vulnerability scanning, assumed breach assessment, cyber resilience stress test, insider threat simulation,... These are all buzzwords that can confuse decision makers when they are choosing what class of offensive testing they need. It can be overwhelming. Often organizations will purchase elite offensive assessments and learn nothing from the carnage. Other times they won't increase the sophistication of assessments and the security organization will stagnate. Decision makers need guidance to understand what class of offensive testing is right for their maturity. This talk demonstrates how to use ATT&CK to identify what types of testing are right for a given organization.
My goal is to help folks understand how to use ATT&CK to identify what types of offensive assessments are right for their organization. I’ve conducted hundreds of offensive assessments and currently perform nation state level attack simulations. I’ve witnessed numerous organizations undergo offensive assessment that don't align with their maturity. Sometimes they want an elite red team assessment when they don’t even have a vulnerability management program. Alternatively year-over-year they have zero-finding assessments when it’s time to level up their blue team. I will demonstrate how organizations can leverage ATT&CK to evaluate what class of testing will help them most.
Isaiah Sarju is a red teamer. He has contributed to the Microsoft Security Intelligence Report, conducted hundreds of offensive security engagements, and taught students how to become top tier defenders. He plays tabletop games, swims, and trains Brazilian Jiu-Jitsu. You can find him on twitter @isaiahsarju
• Founder: www.thesecurityawarenesscompany.com, (Interpact, Inc.) The Security Awareness Company • Distinguished Fellow: Ponemon Institute 2012+ • Advisor to the President: ISSA, International • Board. Mobile Application Development Partners, LLC, • In November 2009, was named one of the Top‐20 security industry pioneers by SC Magazine. • Named one of the Top 25 Most Influential People for 2008 by Security Magazine • Voted one of the Top 5 Security Thinkers for 2007 by SC Magazine. • In 2002, honored as a “Power Thinker” and one of the 50 most powerful people by Network World. • He coined the term “Electronic Pearl Harbor" and was the Project Lead of the Manhattan Cyber Project Information Warfare and Electronic Civil Defense Team. • Founder of InfowarCon
Winn Schwartau
Philippe Armando
Joe DeMesy , Ronan Kervella
Lior Yaari
Shaked Reiner
Marc Smeets , Mark Bergman
Isaiah Sarju
Winn Schwartau
The evolution of programming languages (e.g. C++) directly affect the way researchers approach an existing codebase. C++ has changed drastically over the years. In 1998 C++ has been standardized and ever since, every few years, old bugs are being fixed while new features are being added, but how do these changes really affect vulnerability research in C++ binaries?
Since 1998, when templates and RAII(1) were introduced to string_view in C++17, we ended up with complex and tangled set of features being used by a variety of vendors. C++ 's complexity creates new scenarios of undefined behavior, with each new standard, that could cause a program to be in an undefined state, but it also fixes old standard bugs and shatters bad code habits and vulnerable patterns that were seen in the past.
This talk will show how the process of vulnerability hunting within C++ has changed over the years. It will give a deep dive into some of the hidden problems and gems C++ Standard has and how it influences our research methodology. How can we look for incorrect usage in C++ Binaries? Does the language become safer or do newly-introduced features make our lives more complicated?
Gal Zaban is a Reverse Engineer with a particular interest in C++ code, currently working as a Vulnerability Researcher in the Automotive Industry. As part of her journey in understanding the catacombs of C++, she developed various RE tools for C++ including 'Virtuailor'. In her spare time when she's not dwelling into low-level research, she designs and sews her own clothes and plays the Clarinet.
Mobile applications "level up" complexity of penetration testing and security analysis, thanks to a custom client in which it is possible to implement strong security features, like combinations of symmetric and asymmetric encryption and signatures on the top of the TLS channel, in order to further protect communications with the backend servers and to make very difficult to discover and exploit common application vulnerabilities. These situations require strong reversing and developing skills, in order to be able to understand these security protocols and to implement indispensable tools to accomplish the tasks, such as handling the encryption of our attack vectors. Brida was born to lower skills and time required for these complex tasks, giving penetration testers a tool to handle all these situations with minimal reversing and developing effort, by taking advantage of the integration of the most used penetration testing tool (Burp Suite) with a great dynamic code instrumentation toolkit (Frida).
New Brida major version (v0.4) will be released at the Hack In Paris 2020 security conference, with many new features.
First of all, Frida hooks for common tasks have been included in Brida, directly callable from the GUI of the tool with a click of the mouse! These scripts include the most recent hooks for Android and iOS platforms that handle the following tasks:
Then, a new engine has been developed. Previous versions of the tool required to code custom plugins that used the Brida engine to take advantage of dynamic instrumentation of mobile applications to face complex tasks. Now thanks to a new powerful engine, in most situations it will no longer be necessary to write a single line of code! New high-customizable engine will allow to graphically create custom plugins to:
New features of Brida will be shown in a live demo, in which a mobile application with strong encryption and signature features will be used to demonstrate how Brida can be used to handle these situations, decreasing the necessary reversing effort and completely removing the developing effort! We love live demos during conferences, what can go wrong! :)
Federico Dotta is a Security Advisor at @Mediaservice.net S.r.l., an Italian Security Advisory Company. He began his career as a penetration tester in 2009, focusing on Web and Mobile applications and on physical security. He developed many security tools, most of them publicly available on GitHub, with the purpose of helping the job of ethical hackers when handling complex situations. He presented the result of his researches in Italian and international conferences, like HackInBo in Bologna and Hack In The Box in Amsterdam. He achieved many professional certifications like Offensive Security OSWE and OSCP.
Piergiovanni Cipolloni is an IT Security professional and researcher with over 15 years of experience in the IT security industry. Currently he is a Senior Security Advisor at @Mediaservice.net S.r.l., an Italian Security Advisory Company. Previously spoken at: HITB Amsterdam 2018 about advanced mobile penetration testing where alongside his co-worker Federico Dotta he presented Brida the tool they created in order to speed up the security review of a mobile application interactions with its back-end servers.
Operating a Red Team in the middle of an organization that is under close scrutiny by real attackers is tough. Organizations often run the risk of hampering or burdening either side, depending on their approach. The Red Team can suffer from too much red tape, lack of focus, or an adversarial environment that stymies their desire to pursue objectives with the same vigor shown by real threats. Conversely, with an unchecked Red Team, you can overburden and exhaust your Blue Team with constant investigations or worse, condition them to write off real attacker activity as Red Team activity.
In all this conflict, it is easy to lose sight of the goal that both teams have: protect people. To this end, we offer some personal history of our own experience navigating the troubled waters dividing red and blue, provide some strategies to bridge that gap, and share some technical insights as examples gained by a cooperative, open environment which encourages the pursuit of excellence and the shared goal of protecting people
Austin Baker is a Principal Consultant at Mandiant with experience pretending to be the bad guys (Red Team) and evicting actual bad guys (Incident Response) in order to better secure customer environments. He has had the fortune to present at conferences like DerbyCon, TROOPERS, SANS DFIR Summit, and FireEye’s CDS, alongside some of the best and brightest in the industry. He received a B.S. in Computer Science from Columbia University, with a primary interest in applied cryptography and machine learning.
Daniel Bohannon (@danielhbohannon) is a Senior Applied Security Researcher with FireEye’s Advanced Practices Team with over seven years of operations, security and Incident Response consulting experience.
He is the author of Invoke-Obfuscation, Invoke-CradleCrafter, Invoke-DOSfuscation and co-author of the Revoke-Obfuscation detection framework. He has presented at numerous conferences including Black Hat USA, DEF CON, DerbyCon and BlueHat.
Mr. Bohannon received a Master of Science in Information Security from the Georgia Institute of Technology (2013) and a Bachelor of Science in Computer Science from The University of Georgia (2010).
His primary research areas include obfuscation, evasion and methodology-based detection techniques for endpoint and network applied at scale.
ARM processors have been widely used in embedded devices. As more and more IoT devices appear in our lives, their security issues have received more and more attention. Before a hacker wants to attack a certain type of device, he often chooses to extract the firmware first, and then conducts the attack by reverse engineering. At the same time, the technical details of the manufacturer's equipment, which involves the protection of intellectual property rights, are also directly affected by reverse engineering.
In order to resist reverse engineering, many manufacturers first do deterrence through legal methods, such as writing a clause prohibiting reverse engineering in the use agreement, but attackers rarely pay attention. Technically, due to cost and efficiency limitations, many mature PC software protection schemes cannot be implemented. Embedded devices often have read-write protection, execute only and other means for substitution, which increases the cost of reverse engineering. But traditional methods can hardly detect and obtain evidence.
This speech will analyze the battle between firmware protection and extraction. By analyzing the characteristics of modern dynamic debugging and tracing methods. I'll show how to detect these, by the clues left on the device. The reverse engineering method is different from the past in that these techniques can detect debugging on bare metal.
The talk will also introduce techniques similar to honeypots. After detecting debugging, using current debugging softwares' features, trigger firmware self-modification to resist static analysis and protect the firmware content. At the same time, induce attackers to enter pre-arranged traps, complete fingerprint collection, forensics or even launch attacks on them.
RM processors have been widely used in embedded devices. As more and more IoT devices appear in our lives, the security issues have been widely concerned. When the hacker wants to attack a certain type of device, he often chooses to extract the firmware first, and then conducts the attack by reverse engineering. At the same time, the technical details of the manufacturer’s equipment, which involves the protection of intellectual property rights, can also be directly affected by reverse engineering.
In order to resist reverse engineering, the first thing for many manufacturers have done is deterring through legal methods, such as writing a clause prohibiting reverse engineering in the use agreement. But attackers rarely pay attention. Technically, due to cost and efficiency limitations, many mature PC software protection schemes cannot be implemented. Embedded devices often have read-write protection, execute-only and other means for substitution, which increases the cost of reverse engineering. But traditional methods can hardly detect and obtain evidence.
In this speech I will analyze the countermeasures of firmware protection and extraction. By analyzing the characteristics of the dynamic debugging methods and tracing, I will show how to detect them, by the clues left on the device. The reverse engineering method is different from the past that these techniques can detect debugging on bare metal.
The presentation will also introduce techniques similar to honeypots. After detecting debugging, the current debugging softwares’ features can be used to trigger firmware self-modification to resist static analysis and protect the firmware content. At the same time, inducing attackers to enter pre-arranged traps that they will complete fingerprint collection, Forensics or even launch attacks on them.
Common ways to extract firmware
This will detail the ways to extract firmware via
Defense methods against firmware extraction, and how to bypass, taking STM32 as an example
This will introduce the widely used techniques for firmware extraction;
This will detail software, non-invasive hardware and invasive hardware bypass examples to explain current defense solutions are difficult to guarantee the security;
Discuss how the manufactures’ application scenario like OTA makes it easier to get firmware.
Debugger detection
Dissect the ARM debugging infrastructure, namely Coresight, explain the useful registers for hardware debugging detection;
Demo 1
Static analyze protection with code self-modify
Introduce how to modify the firmware in MCU flash after detecting the debugger connectivity;
Demo 2
Deploy the honey pot for the reverse engineer
Explain how to modify the original sensitive information and counterattack the reverse engineering
Give different examples of building up a honey pot.
Application scenario
A security researcher in Skygo team from Qihoo 360 - Specialized in vehicle security,as the cybersecurity partner of Mercedes-Benz. . - A reverse engineer. Experienced in vehicles and embedded devices reverse engineering. Having conducted penetration test on many vehicle manufactures, and helping over a half of domestic vehicle manufactures to harden their systems.
During the last years, Hardware Implants and Air-Gapped Environments got more and more popular topics among the InfoSec community. This trend pushed some hackers to R&D and release new opensource devices with the intent to make Red-Teaming operations even more interesting. Smoothing the path to new TTPs and improving some old ones. During this talk We will go through the entire history of USB Hardware Implants, discussing their features and looking at some cool PoCs. In particular, will be presented 7 different hacking devices developed from Offensive Ninjas, for Offensive Ninjas.
For each of these devices, we will go through their technical specifications and operational features. Passing, of course, through some real case scenarios where you can apply them during an Adversary Simulation.
Luca Bongiorni is working as Mobile Networks Security Researcher at Trendmicro’s FTR, where his main fields of research are: Radio Networks, Hardware Hacking, IIoT and Physical Security. He also loves to share his knowledge and present some cool projects at security conferences around the globe. At the moment, He is focusing his researches on bypassing biometric access control systems, ICS Security and Air-Gapped Environments.
AMSI is one of the more important weapons security vendors have against fileless malware on Windows, and visibility into the execution of scripts and macros. This talk will discuss various new bypasses of the feature, as well as improvements on well known ones, so you can be invisible again :)
Since its appearance in Windows 10, AMSI, the Antimalware Scan Interface, has been one of the most powerful tools available to AV vendors to detect and prevent fileless malware. Instrumenting various scripting engines and frameworks, and exposing the data to vendors, which can deem it malicious, and prevent the execution of a piece of code, has as of now dethroned Powershell as the king of AV evasion, and is seemingly starting to level the playing field against various other scripting engines, and even the currently super-trendy .Net-Framework based tooling.
While a few bypasses already exist for this feature, this is never enough, as some of these techniques could be just as conspicuously as the payloads they intend to hide, and could get (and have gotten) killed by updates.
In this talk, we will try and enumerate the attack surface of the feature, discover the various strengths and shortcomings of bypasses, and discuss some new ways to bypass AMSI, as well as improvements to older techniques.
A few years ago, Philip decided that computers are in fact really cool, and that he wants to spend a lot of time breaking and protecting them. Computers, on the other hand, don’t share a similar sentiment about Philip, and frankly consider him to be a bit of a nerd. @PhilipTsukerman
Cannibal Hacking, from zero the hero to hammer smashed host [ Parental Advisory : Explicit hacking, crude webshells, horrific security flaws and Hardcore hacking in hostile environment ]
If you’re a bad guy (tm), you want to deliver your malwarez, your spam, your payloads without being worried. So, instead of hosting them in your systems, why not using webservers belonging to others? They pay the hosting, the bandwidth, they will be in trouble if something goes wrong, so it’s a platform of choice.
And guess what? If you mix
1) Admins(?) letting sit a poorly configured and forgotten system with a bad password for years
2) Hackers gonna hack
you got a lot of hacked servers and machines all over the world! And sometimes, all of those hacked machines are here for a long time.
Bad guy(c) are not defacing servers anymore (well, sometimes, its still true), they prefer to stay hidden under the radar. Who will suspect that the nice little blog talking about puppies and shiny diamond is the C&C server of a “yet another mirai” botnet, builds ransomware clients and spam the planet for the next magic pill?
In this talk, we will focus on the attacker point of view. We are the good guys, they are the bad guys (tm), and servers are innocent collateral victims. We’ll see how we can find the attacker, learn things, find new victims, look over the shoulders of the attacker, and continue to learn how they operate. In the end, we propose some ways to keep those attackers out of the servers, detect them, and eventually kick them out.
Security Expert at synacktiv Reverse, exploit and pwn. At night, like to follow botnets, reverse C&C command protocols, and hunting for bad guys (tm)
• Founder: www.thesecurityawarenesscompany.com, (Interpact, Inc.) The Security Awareness Company • Distinguished Fellow: Ponemon Institute 2012+ • Advisor to the President: ISSA, International • Board. Mobile Application Development Partners, LLC, • In November 2009, was named one of the Top‐20 security industry pioneers by SC Magazine. • Named one of the Top 25 Most Influential People for 2008 by Security Magazine • Voted one of the Top 5 Security Thinkers for 2007 by SC Magazine. • In 2002, honored as a “Power Thinker” and one of the 50 most powerful people by Network World. • He coined the term “Electronic Pearl Harbor" and was the Project Lead of the Manhattan Cyber Project Information Warfare and Electronic Civil Defense Team. • Founder of InfowarCon
Gal Zaban
Federico Dotta , Piergiovanni Cipolloni
Austin Baker , Daniel Bohannon
Yingjie Cao
Luca Bongiorni
Philip Tsukerman
Kevin Denis
Winn Schwartau