Archive for the talks Category

Abstract:
Today visualizing Wi-Fi traffic is more or less limited to console windows and analyze different logs from an aircrack-ng toolset. There are some commercial tools, but if we want to stay in the Open Source area we need to find better solutions. So we used ELK stack to gather, hold, index and visualize data and a modified version of an airodump tool for input. With this you can create amazing dashboards, correlate some interesting data and do some deep digging for Wi-Fi packets. It gives hackers and also administrators a quick view into Wi-Fi space and offers a range of new possibilities to get interesting data really fast. One half of the talk will be dedicated to a presentation of how this can be done, telling you about some issues that we had and solutions to them, while the rest of the talk will be demonstrating the true power of our research.

Bio:
Milan Gabor is a Founder and CEO of Viris, a Slovenian company specialized in information security. Milan is a distinguished and popular speaker on information security. He has previously been invited to speak at various events at different IT conferences in Slovenia and loves to talk to IT students at different universities. He also does trainings on ethical hacking. He is always on a hunt for new and uncovered things and really loves and enjoys his job.


 

Video/recordings:

[Slides (PDF)] [Recording (MP4)] [Recording (OGV)]

Abstract:
Societies may change, but the staus-quo remains the same. What happens when a super-power has its secrets exposed? Can a government understand the human-cost of wars against religious extremists? Will those chosen to govern ever be able to control the pace of technological developments? Can a state assassinate its exiles in other countries ever really be morally justified? Are just some of the topics covered within this talk.

Granted, this talk looks as though its going to repeat the same Snowden/Wikileaks/Manning stories we’ve all come to expect at a security conference, except you’d be wrong. This talk looks at state-surveillance during the Reformation in Europe during the 16th Century. This particular period in history is interesting for many reasons, yet the parallels to modern dilemmas are clear. Has little changed in 500 years?

Bio:
Twitter: http://twitter.com/f1nux
Speaker: http://www.finux.co.uk
Alba13 Labs: http://www.alba13.com

Arron “”finux”” Finnon has been involved in security research and consultation for a over 8 years. Arron has discussed a wide range of security related topics at a number of high profiled international Security/Hacking conferences, as well as producing over 100 security related podcasts. Interviewing countless security professionals as part of the Finux Tech Weekly podcast show. His security research and consultation have helped businesses around the globe better develop the effectiveness of their security posture in detecting and mitigating cyber attacks.

During Arron’s time at The University of Abertay Dundee he was awarded the SICSA Student Open Source Award for his Advocacy of Free and Open Source software for his work whilst president of The UAD Linux Society. A subject matter he is still very passionate about even today.

Arron currently is the Chief Technical Officer for Krohn and Partners where he oversees the technical and security requirements of the business, as well as offering security consultation and services to Krohn and Partners clients.


 

Slides/Video/Recordings:
[Slides (PDF)]

Abstract:
In this talk we will show how to attack enterprise-grade “big data” environments, based on e.g. HortonWorks or Cloudera, comprising components such as HDFS, Yarn, Hue, Flume, Hive, Spark, Sentry/Ranger.

These environments process huge amounts of data (either data stored in the cluster file system HDFS or streamed into the cluster, e.g. via Flume). The processing of the data is performed in jobs which are
typically submitted by customers into the cluster — and those jobs can be arbitrary code (even though the typical cluster language is Java).

We will give a detailed description on the overall concept of the environment, the tasks of the different components and how they communicate with each other. We will describe the possibilities of the attackers in different network/authentication positions (e.g. with or without the capabilities to submit jobs)and practically demonstrate break-out attacks from the job sandboxes which result from insufficient hardening of the different nodes or overall environment.

Such breakout attacks affect the information of all customers in the attacked cluster and are thus comparable to hypervisor breakouts in public cloud environments.

We will also describe the relevant hardening measures and architectural considerations to prevent the demonstrated attacks.

Bio:
Birk Kauer is a security researcher working for ERNW GmbH. His main interests are application security, reverse engineering and exploitation. Besides the research work, he has extensive experience as a penetration tester in very large corporate environments.

Slides/Video/Recordings:
[Slides (PDF)]

                                /   \       
 _                      )      ((   ))     (
(@)                    /|\      ))_((     /|\
|-|                   / | \    (/\|/\)   / | \                    (@)
| |------------------/--|-voV---\`|'/--Vov-|--\-------------------|-|
|-|                       '^`   (o o)  '^`                        | |
| |                             `\Y/'                             |-|
|-|                                                               | |
| |                 Sorry, but this presentation is being         |-|
|-|       ____                     _          _                   | |
| |      / ___|__ _ _ __   ___ ___| | ___  __| |                  |-|
|-|     | |   / _` | '_ \ / __/ _ \ |/ _ \/ _` |                  | |
| |     | |__| (_| | | | | (_|  __/ |  __/ (_| |                  |-|
|-|      \____\__,_|_| |_|\___\___|_|\___|\__,_|                  | |
| |                                                               |-|
|-|                                                               | |
| |                                                               |-|
|_|_______________________________________________________________| |
(@)            l   /\ /          \\       \ /\   l              `\|-|
               l /   V            ))       V   \ l                (@)
               l/                //             \I
                                 V

Abstract:
I’d like to talk about defense that works. Basics that work. Techniques that give you a chance. Tools/appliances/software that actually work and aren’t lemons. Very little technical in this talk. It’s about going beyond compliance into actually building in security/defensibility without going bankrupt or buying shelfware/blinking boxes. I will recommend some actual vendors and solutions that from a CISO POV are better than others + more value for money.

Bio:
Former CISO of a small bank, now Infosec blogger and works also as community manager at Peerlyst

Abstract:
BGP is pretty old. It’s also very (very) trusting! This talk examines the current state of the BGP routing protocol and analyses different attack vectors against it. Looking at real life examples of recent BGP attacks, I will be attempting to replicate and demonstrate these attacks inside a virtual network, live, in real-time. Please make a sacrifice to the Demo Gods on your way in!

Bio:

  • Ethical Hacker.
  • Server-Side JavaScript crafter [& breaker].
  • Musician.
  • Student.
  • Climbed a couple of hills once.

 

Video/recordings:

[Slides (PDF)] [Recording (MP4)] [Recording (OGV)]