-
If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.
-
You already know Dokkio is an AI-powered assistant to organize & manage your digital files & messages. Very soon, Dokkio will support Outlook as well as One Drive. Check it out today!
|
BSidesSpfd 2018
Event details
When: Saturday, July 14, 2018
Where: Drury University, Trustee Science Center, Reed Auditorium
Cost: Free!

Invite your friends by posting this on Twitter: "#BSidesSpfd July 14,2018: Discover the next big thing! @bsidesspfd"
Sponsors
Sponsorship items |
Breakfast/morning coffee |

|
Lunch |

|
Drinks |

|
Snacks |
|
Location |
|
Lanyards |

|
Badges |

|
Bags/other swag |




|
Prizes/Give aways |

|
After Party |
|
Lock Pick Village sponsor |

|
Grand prize in the Raffle drawing |
|
Capture the Flag (CTF) |

|
CTF Prize |
 |
Schedule
Day 1
Saturday, July 14, 2018 |
|
8:00-8:30 |
Registration and breakfast
|
8:30 AM- 8:35 AM |
Opening Remarks |
8:35 AM - 9:20 AM
|
Name: Bryan Brake
Talk Title: Community Building in the Infosec Space Talk: Information Security is a varied experience in terms of breadth of knowledge and people in it. But what happens when you can't find like minded people to share or can't find an outlet for the knowledge you have? You have to make it yourself sometimes! This talk to will discuss community building, whether it be local, virtual, and ways to build networks and communities, how to increase chances of success, and the pitfalls to watch for.
|
9:25 AM - 10:10 AM |
Name: awsm
Talk Title: Getting the most out of your Pentest Talk: Did you receive a good Pentest? Do you know the difference? Could you have gotten a better one? In this talk we will briefly review what makes up a pentest, the differences in 'types' of assessments, and what information you should end up with at the end of a good test. Not all pentest are equal and with a few basic upfront questions you can identify the type of work you can expect to receive. It's not all abstract, I will also show a few simple techniques that are often out-of-scoped that pose a huge risk to organizations. I will demonstrate the differences between having scanners ran and actual pentesters preforming real-world threats. I will also cover various ways to get the most out of the time and work purchased, identify areas often overlooked that every company should concern themselves with, and help make sure you aren't partly at fault!
I've been speaking at various events in 2017 covering offensive techniques in exploiting organizations. I started with very technical talks and, after great feedback, started making them less and less technical and higher level after realizing that not everyone is on the same page about what pentesting really is. We(pentesters) aren't just shooting 0-days out of ion cannons at web servers! In fact it can be, and often is, much simpler than that and I only rely on 'exploits' as a last resort. Security misconfigurations and weak users are much, much, easier to take advantage of. That being said, when companies go out and get a pentest they seem to think that they only need to be looking for 'exploits' that can affect the organization and miss some of the largest and easiest attack surfaces. This year I hope to speak more on what companies can do to ensure they are getting the results that they need and can actually use. Having tests done that fire scanners at resources they already know are protected by product X is 1. Not a good pentest 2. Not even close to demonstrating the risks to a company, and 3. Providing a false sense of security that you are protected from well known scanner tests that the defensive products already know are coming! In this talk I will demonstrate a few attacks that have recently led me to full company compromises that no firewall or IPS would ever detect and differentiate 'scanner' pentest from _good_ pentest. I have worked for a few different security companies and see the same mistakes, or what I consider mistakes, made by customers that could have easily been prevented and gotten them a much better understanding of where the risk lies in their organizations. And no, the answer isn't always more money. There are plenty of ways companies can get more actionable data and better understanding of risk by better scoping during the initial talks with the vendor. There are too many security companies taking advantage of customers and provide a false sense of security. There is always a way in, once you understand and identify those areas you will be in a much better position to protect what matters most to your company.
|
10:15 AM - 10:45 AM
|
Name: Jason Killam
Talk Title: Registry Forensics for IR Talk: I will go over Windows registry forensics and highlight the information that would be important from an incident response perspective. I will go over the files that contain registry data, and how to gather them from a live response and dead box perspective. I will highlight the tools I use for most incident response which include Registry Explorer, Regripper, Shellbags Explorer. After which I will go over specific artifacts that would indicate a user has fallen for a phish or malicious document.
|
10:50-11:35 |
Name: Todd O'Boyle
Talk title: Attacker vs. Defender: Observations on the Human Side of Security Talk: Attackers spend about a hundredth of the time and money that defenders do giving them a huge advantage when it comes to carrying out their nefarious deeds. With such a strong advantage to the attacker, what’s a defender to do? This talk will explore research completed for the U.S. Department of Defense that delves into why simply blocking a cyberattack with technology never favors the defender. For example, after spending months implementing a sophisticated account management process (thinking we had finally “won” once and for all), we watched the attacker adapt within weeks to be able to social engineer the process.
Yet, attackers aren’t infallible. We’ll identify weaknesses in attacker tactics based on our research and then explore some practical ways defenders can to use those dependencies against them. We will wrap up with a shared brainstorming session to improve how everyone in the audience can respond when under attack.
Attendees will learn: - Why spending more time and money on blocking attackers won’t keep you safe - Lessons from real-world attacks and defensive countermeasures - The importance of humans in security engineering - How to identify weaknesses in an attacker’s tactics - Ideas that help even the defensive playing field and make cybersecurity more symmetric
|
11:35AM - 12:15 PM |
LUNCH!! |
12:15PM - 1:00PM
|
Name: Mark Mahovlich
Talk Title: Cloudy with a Chance of Risk - Applying Risk Adaptive Models Talk: Traditional cyber defense strategies are designed to defeat the external threat actor and deny entry and access to the corporate network and its most treasured information assets The adoption of Cloud Platforms, End User Self Service, and the growth of the Mobile and highly Social workforce threatens to circumvent those controls.
Coupled with the lack of appropriate IS staffing and the struggle to operationalize point solution "noise" requires the adoption of Risk Adaptive Models.
This presentation will cover the following topics: • Challenge: We will define cloud adoption rates, the reality of usage, and the threats facing the modern enterprise • Solution: How to secure cloud platforms and data stores using Risk Adaptive techniques • Execution: We will review a Use Case, Installation Timeline Realities, and Tips for Success
Recommended attendees: CIO, CISO, CRO, Governance & Compliance Officers, VP of Information Security, Chief Architect, Directors of Infrastructure and/or Security, Infrastructure and/or Security Managers, Cloud Platform Specialists
|
1:05 PM - 1:35 PM |
Name: Jason Holcomb
Talk title: Do No Harm: Low Impact Testing & Assessment Techniques for Highly Sensitive Environments Talk: “This environment is too sensitive” should not be an excuse for failing to understand attack surface and overall security posture and, if anything, may be an indicator that a thorough examination is warranted to understand potential risks. But how do you do test or assess a network or system that is potentially fragile and where interruption or downtime comes with a serious price tag that can even include health, safety, and environmental risks? There are many examples of negative assessment side effects including:
- An map scan with default flags forces a shutdown of a critical industrial controller - A simple vulnerability scan saturates a network segment causing an outage for a SCADA system - An aggressive vulnerability scan overwrites data in a poorly configured database
Beyond just the technology interruption, all these examples come with a potentially serious operational impact. In this presentation we will examine tools and techniques to help effectively understand architectural weaknesses, technical vulnerabilities, and attack surface in a “do no harm” approach. The tools and techniques covered represent an accumulation of proven methods developed over ten years of performing assessments in critical infrastructure industrial environments including electric, nuclear, oil and gas, chemical and other production environments.
|
1:40 PM - 2:10 PM |
Name: Sunny Wear
Talk Title: How To DevOps (while sneaking in Security) Talk: The purpose of this talk is to provide instruction on how security professionals can introduce secure lifecycle processes and tools into the DevOps workflow, with little disruption. The processes I will cover include selling security to the business, secure code training, threat modeling exercises during Agile design phase, and automating security-related tasks further in the software lifecycle. The tools I will cover include interactive static analysis plugins, automated dynamic scans, metrics gathering and backlog ticket generation. The audience will have several takeaways from this talk they can apply in their organizations.
|
2:15 PM - 2:30 PM |
Name: Jason Reaves, Joshua Platt
Talk Title: Finding malware backends through server profiling Talk: Discussion into how to find malware backends by using server profiling techniques such as open port mappings, certificates and incorrect configurations including creating frameworks for automating the process.
|
2:30-2:40 |
FUN BREAK! |
2:40 - 3:10 |
Name: Karlo Arozqueta
Talk Title: GO HACK YOURSELF: MOVING BEYOND ASSUMPTION-BASED SECURITY Talk: You have many security products, probably too many. But you are still not secure because it's nearly impossible to know if your security products are actually doing what you want. Through live network and endpoint attack demonstrations, see how to use attack behaviors with Bartalex, Vawtrak, Mimikatz, PowerShell, Tunneling and others to validate your actual security products are working. See startling statistics, based on real-life case studies, that illustrate how ineffective many organizations, some with massive security budgets and teams, actually are because of a lack of validation. See how you can turn these attacks into an opportunity to instrument more effective security.
|
3:15 PM - 4:00 PM
|
Name: fan0654
Talk Title: Discovery - How An Attacker Sees You
Talk: This talk will cover various aspects of "Discovery" on an organization. This is the process of finding all domains, IPs, usernames, email addresses, passwords and keys for a target without actually breaking in. This consists of various areas of open source intelligence, such as certificate information, web archives, and various tools. It also consists of more in-depth information gathering, such as using LinkedIn and public password dumps. The aim is to show how an attacker can map out very detailed information on a target, to result in an external or internal compromise. This talk will also cover some things an organization can do to defend against these various attacks.
|
4:05-4:50 |
Name: Killian Ditch
Talk title: A Good Shell is Hard to Choose Talk: Given the plethora of remote command shell payloads out there, how does one decide which to use? Should an initial foothold such as a webshell be upgraded to an interactive shell; if so, why and how? Perhaps a Meterpreter payload would be best. That decision then leads to the following question of should it be a standard Windows or Linux Meterpreter payload? Maybe it should be a PHP or Java Meterpreter instead. This talk will discuss the various differences in the aforementioned options among others, with the goal being to impart an understanding of which payloads may be best suited for which situations and why. Many of the assorted options will be demonstrated in scenarios derived from situations encountered in real penetration tests to exemplify the need for the ability to differentiate between payloads
|
4:50 - ? |
Closing Remarks, Prize drawings, etc. |
CFP Selection Committee
- Ryan Halstead
- Shannon McMurtrey
- Sarah Evans
- Wayland Morgan
Planners
- Beth Young
- Brittany Bogle
- Sarah Evans
Volunteers
Participants
Name |
Twitter/Email |
Day 1 |
Beth Young |
@bsidesspfd, @bethayoung |
|
Parking
Tags for flickr, twitter, blog, etc.
Please use the tag #Bsidesspfd for content related to this event
Who's blogging?
BSideSpfd Code of Conduct
We have NO TOLERANCE for physical/verbal/sexual harassment of any human!
Our “Code of Conduct” is “Be Excellent to Each Other” AKA the Golden Rule. Failing that, it is “Do not be an Ass* or we will kick your ass out!”.
Asking questions of a speaker during their talk, to get clarity or debate a point is NOT being an ass – heckling or haranguing the speaker IS. If you are not sure, ask, or err on the side of basic decency and common courtesy. If what they are doing would not be acceptable to have done to you, your best friend, your worst enemy, your sister, niece, daughter, brother, nephew, son, mother, father, or any human being, do not let them treat anyone else that way – whether you know them or not. If someone asks you to stop – stop.
If you are having an issue with a BSidesSpfd participant, find a member of our BSidesSpfd Team, who will assist you in determining the next steps for you to feel safe and heard.
*Staff reserves the right to determine what constitutes “Being an Ass”.
BSidesSpfd 2018
|
Tip: To turn text into a link, highlight the text, then click on a page or file from the list above.
|
|
|
|
|
Comments (0)
You don't have permission to comment on this page.