|Code||Breakfast & Lunch is provided each day thanks to our awesome sponsors! Please remember to thank them, network & talk to them, interview for jobs with them and/or look into the services they have to offer the community.|
|Puple = 4 hours|
|Teal = 1 hour slot|
|orange = Firetalk 15+ minutes in 30 or more minute spot to promote open discussion||Double classroom: To better accommodate laptops, and hacking along with the speaker|
|Friday||Java Puppy Coffee Truck||Blue Team (Odeum DAC 309)||Red Team (double classroom DAC 201-203)||Metasploit class|
|Pros vs Joes CTF Classroom |
DAC-312 Fri only
|Interview room DAC-304|
|8:00am||@Java_pup Coffee truck will be on site & out front from about|
8:15am - 11:15am
|Registration check-in (printed or phone scan of badges)||Registration check-in (printed or phone scan of badges)|
|8:30am||Registration, Breakfast & Networking||Registration, Breakfast & Networking||Breakfast|
|9:00 - 9:20am||Title: Cyber Security for the Industrial Environment: An Intro to ISA/IEC 62443|
Speaker: Jim Gilsinn, @jimgilsinn
|Title: Armitage and Cobalt Strike Penetration Testing Lab|
Speaker: Raphael Mudge
Class sign up required, wait-listed people will be permitted as room space can accommodate you
|Pros Vs Joes CTF on going throughout the conference|
|9:30 - 9:50am|
|10:00 - 10:20am||Title: Hacking the Male and Female OS (Men are from Windows, Women are from Linux)|
Speaker: Valerie Thomas @hacktress09
|10:30 - 10:50am||<-- Coffee Break|
|11:00 - 11:20am||Social Engineering CTF Intro @SquirrelsNaBrrl|
|11:30 - 11:50am||Title: The Security Vulnerability Assessment Process, Best Practices & Challenges|
Speaker: Kellep Charles @kellepc
|12:00 - 12:20pm||Title: Firewalling dynamic infrastructures (the cloud) with Chef and Netfilter|
Speaker: Julien Vehent @jvehent
|LockPick Village 12pm - 5pm|
|12:30 - 12:50pm|
|1:00 - 1:30pm||Lunch||Lunch|
|1:30 - 1:50pm|
|2:00 - 2:20pm||Title: Give Yourself a Hand|
|Title: Angry Cars: Hacking the "Car as a Platform"|
Speaker: Aaron Weaver
|2:30 - 2:50pm|
|3:00 - 3:20pm||Title: Defense In Depth : Designing Networks That Survive First Contact|
|Title: Introduction to the use after free vulnerability and why it matters|
Speaker: Johnathan Fragale @insecurityguy
|3:30 - 3:50pm||Title: Duck Sauce v.02|
Speaker: Raymond @securemaryland
|4:00 - 4:20pm||Title: Disruptive Security Chaos ... for Good|
|Title: Web App Security is Impossible|
Speaker: Justin Klein Keane @madirish2600
|4:30 - 4:50pm|
|5:00 - 5:20pm||Title: Exploit Kits are freaking annoying|
Speaker: Joel Esler @joelesler
|5:00 - 5:50pm|
|6:00pm||Raffle/Closing (must be present to win)|
|Off Site Evening Activities TBD|
|Saturday||Java Puppy Coffee Truck||Blue Team (Odeum DAC 309)||Red Team (double classroom DAC 201-203)||Metasploit class|
|8:00am||@Java_pup Coffee truck will be on site & out front from about|
8:15am - 11:15am
|9:00 - 9:50am||Jack Daniel and Dirty Internet||Title: (Workshop) Social Engineering Basics and Beyond|
Speaker: Valerie Thomas @hacktress09
Class sign up required, wait-listed people will be permitted as room space can accommodate you
Chris Godoy @Rapid7
Priority is given to those who are preregistered for this class, but we will accept everyone until the room is full.
|Pros Vs Joes CTF on going throughout the conference|
|9:30 - 9:50am|
|10:00 - 10:20am||Title: Detecting the Break-in: Do you know what your processes are up to?|
Speaker: Greg Kuruc
|10:30 - 10:50am||<-- Coffee Break|
|11:00 - 11:20am||Title: Chimps, Gimps and Pimps: Don't let them get their damn dirty paws on your iThings|
Speaker: Gal Shpantzer, Francisco Artes
|11:30 - 11:50am|
|12:00 - 12:20pm||Title: Hurricane Sandy vs. Inerail's Data Centers |
...AKA Some Actual DR Planning & Results
Speaker: Chris Rogers @Inerail
|12:30 - 12:50pm||Social Engineering CTF/something awesome from @SquirrelsNaBrrl|
|1:00 - 1:30pm||Lunch||Lunch|
|1:30 - 1:50pm||Title: Pen Testing as due diligence|
Speaker: Alex Muentz
|2:00 - 2:50pm||Title: Cryptanalysis of the Enigma|
Speaker: Bob Weiss (@pwcrack) & Ben Gatti
|2:30 - 2:50pm||Title: CVE 2012-4681 (Java Applet Remote Code Execution) from the Victims Perspective|
Speaker: "Ogbeide Derrick Oigiagbe [email@example.com] -Speaker and Author" and "Rayvorn Patterson Jr. (firstname.lastname@example.org)-speaker and author"
|3:00 - 3:20pm||Title: PHP Website Security, Attack Analysis, & Mitigations|
|Title: Physical Drive-By Downloads|
Speaker: Kyle (Kos) Osborn
|3:30 - 3:50pm|
|4:00 - 4:20pm||Title: Treachery, Faith and the Great River - Using critical thinking to examine beliefs introduced to the information security community.|
|Title: A Penetration Testing Distro for the Real World|
Speaker: Rick "Zero_Chaos" Farina
|4:30 - 4:50pm|
|5:00 - 5:20pm||Title: These Go to Eleven: When the Law Goes Too Far|
Panel: Michael "theprez98" Schearer, Debra Salons @dsalons, Francisco Artes
|5:20 - 5:50pm|
|6:00pm||Raffle/Closing (must be present to win in DAC 309)|
|Group 007 Skyfall movie event, details posted near reg!|
|BSidesDE shoot at Targetmaster, times TBD|
|Talk title||Speaker||Abstract||What is the intended audience or level skill level of your talk? (This will be posted online AS IS for talk voting so spell check it please)||Speaker Bio|
|(Workshop) Social Engineering Basics and Beyond||Valerie Thomas @hacktress09||Calling all future social engineers!|
Are you a pen tester in need of social engineering training? Perhaps you just want an understanding of what social engineering is all about. This workshop has something for everyone.
Throughout this 4 hour course we'll cover the steps of the social engineering process from planning to post-attack. After the basics we’ll dive into non-traditional topics such as spycraft, acting, pressure sales, the psychology behind them, and how it all applies to the social engineering that we know and love.
|Anyone who wants to learn about social engineering. Some technical information will be presented, but is suitable for all levels.||Valerie Thomas (@hacktress09) is a Senior Information Security Consultant for Securicon. Upon completing her Bachelors degree in Electronic Engineering Technology her information security career began with the Department of Defense. Throughout her years in information security she has gained expertise in penetration testing, vulnerability assessment, data loss prevention, social engineering, and physical penetration testing. She has performed engagements for private industries, non-profit organizations, and government agencies. She has taught social engineering techniques at multiple corporations, schools, Defcon, DerbyCon, and the Nordic Security Conference.|
|A Penetration Testing Distro for the Real World||Rick "Zero_Chaos" Farina||Planning to be a pen-tester when you grow up? Been in the industry forever? Either way you could benefit from the new and exciting things happening over at the Pentoo Linux Project. We develop a free and fully open source penetration testing platform for all types of pen-testers. Come find out how these exciting improvements can help you from CTF to the customer.||Beginner through Expert penetration testers, or even those simply interested in pen-testing.||Rick "Zero_Chaos" Farina is an old personality in the hacker community. His knowledge and experience as a Linux developer will be invaluable to all the pen-testers who want to break into the industry or gain that all important competitive edge.|
|Angry Cars: Hacking the "Car as a Platform"||Aaron Weaver||Recently Renault announced "what it describes as a “tablet,” an integrated Android device built into its next range of cars, effectively opening the way to the car-as-a-platform. The car is becoming a new platform. We need developers to work on apps.” Not to be left behind Ford has introduced the OpenXC platform, which it sees as a channel for collaboration between Ford and 3rd party application developers.|
What role will security play in shaping this newly emerging technology, when your car can tweet it needs an oil change? Cars rely heavily on small embedded microprocessors running on a network that was never designed to be secure. This talk will look at the current technologies used CAN bus, OBDII, and tire pressure monitoring systems and demonstrate their inherent weaknesses. What should be considered in the future when most cars will be connected to the Internet?
|Everyone because who doesn't drive?||Aaron Weaver is a Principal Security Analyst at Pearson Education. He has been in various roles including software developer, system engineer, embedded developer to IT security. He also leads OWASP Philadelphia. His experience includes mobile security, web application security, penetration testing and embedded development.|
|Armitage and Cobalt Strike Penetration Testing Lab||Raphael Mudge||The Metasploit Framework is a must-have tool for penetration testers. Armitage builds a workflow on top of the Metasploit Framework and exposes its most advanced capabilities. Cobalt Strike augments Armitage with tools to carry out social engineering attacks. This four-hour lab oriented workshop will introduce you to the penetration testing process from the perspectives of Armitage and Cobalt Strike.||This workshop is recommended for beginner to advanced security practitioners who are comfortable working on Linux and using a command line interface. This workshop will introduce Armitage and the Metasploit Framework, you do not need to know these tools walking in. To participate in the labs, you must have VMWare Player, VMWare Fusion, or VMWare Workstation installed. VirtualBox is not supported. Your laptop should have a DVD drive and 14GB free disk space for three virtual machines, provided by the instructor. Your laptop should also have enough RAM (2GB min, 4GB recommended) to run two virtual machines at the same time.||Raphael Mudge is the founder of Strategic Cyber LLC, a Veteran-owned|
business that creates software for red teams. Raphael created
Armitage for the Metasploit® Framework, Cortana, and Cobalt Strike.
His work made the cover of the Linux Journal, was seen on the Fox sitcom
Breaking In, and is used by security professionals all over the world. Raphael
speaks and writes on security topics and provides red team support to
many Cyber Defense competitions across the country
|Chimps, Gimps and Pimps: Don't let them get their damn dirty paws on your iThings||Gal Shpantzer, Francisco Artes||This “Blue Team” talk covers the past, present and future of mobile security of the major vendors (RIM/Android/iOS) from a multi-sector perspective. We will touch on operating system and ecosystem holy wars, fanboi FUD, warranty-voiding activities, hw/sw fragmentation, app stores, patent trolling, malware resistance, data at rest, consumer/enterprise/federal perspectives and third party tools. We will perform a demo, aptly named "I can train a chimpanzee to help me hack your iPhone" in order to demonstrate defensive smartphone configuration and handling. Other than that, not too comprehensive. But seriously, we'll go through the major security features and 'issues' of mobile security, some unique to mobile and some just transferred over from the old desktop/laptop form factors. There will be business, technology and cultural aspects to the presentation, since mobile is breaking the traditional enterprise security model, for good and bad...||Everybody will get something from this, though it would be good to have some infosec experience in order to 'get' some of the more esoteric points of exploitation/defense of mobile ecosystems (software/hardware, app store, wireless, etc).||FRANCISO ARTES is a leading international security expert and recognized InfoSec top executive with over twenty years of experience in the field. Mr. Artes is a Research Director with NSS Labs.|
Mr. Artes has served as Vice President, Chief Architect / Content Protection for Trace3, and as Vice President, Security Worldwide for Deluxe Entertainment Services Group, Inc. He is credited with establishing the industry best practices (motion picture & television) for content handling and protection. He continues to consult to the entertainment industry on best practices, intellectual property protection, and digital rights management.
As the CTO/CSO of Club E Network, Francisco developed much of the web 2.0 technology for the world's largest Entrepreneur Social Network. He has a distinguished history implementing and securing some of the largest and most widely known networks in the world. As Information Security Manager for Electronic Arts, Francisco was responsible for all information security solutions and policies to protect the intellectual property, e-commerce and on-line gaming networks of the then $3.4 Billion, Fortune 100 organization.
He has written several white papers, presents internationally and is an instructor on hacking and forensic security reviews for the FBI, Texas Rangers, US Marshels, and other federal and local agencies. Mr. Artes has been the special guest of the Texas State Attorney General symposiums on Cybercrime, a speaker and subject matter expert on Anti Piracy for the United States Attorney General and he has been a panel member for the Critical Information Security Conference held by the Texas State Attorney General and the United States Attorney General. Francisco has a successful history lobbying for Intellectual Property Rights, and has worked with the Secretary of the Department of Homeland Security.
GAL SHPANTZER AKA "The straw hat guy" is a trusted advisor to CSOs of Fortune 500 corporations, technology startups, large universities and non-profits/NGOs specializing in critical infrastructure protection . Gal has been involved in multiple SANS Institute projects, including co-editing the SANS Newsbites from 2002-2008, revising the E-Warfare course and presenting SANS@Night talks on cyberstalking, CAPTCHAs and endpoint security. In 2009, Gal founded the privacy subgroup of the NIST Smart Grid cybersecurity task group, resulting in the privacy chapter of NIST IR 7628. He is a co-author of the Managing Mobile Device Security chapter in the 6th ed. Vol 4 of the Information Security Management Handbook (2010) with the late Dr. Eugene Schultz. Gal collaborated with Dr. Christophe Veltsos (@DrInfosec) to present the Security Outliers project at RSA, CSI and other conferences. He is particularly proud of his ongoing contributions to productive snark in the community, including the Shpantzer Coma Scale of Vendor Lameness and FUD (SCSoVLF), #TSAsongs and ridiculous themes for most excellent conferences such as BSides, DojoCon and Baythreat. Gal is currently involved in the Infosec Burnout research project and co-presented on this topic at BSides-Las Vegas (2011) and RSA (2012).
|Cryptanalysis of the Enigma||Bob Weiss (@pwcrack) & Ben Gatti||The Enigma machine was broken during WWII using an Electro Mechanical device and cribs (or known plaintext.) A ciphertext only cryptanalysis method for breaking the Enigma was proposed by James Gillogly in 1995, but until now software to implement this type of attack has not been available. We will introduce some new cryptanalysis methods implemented in our system.|
Were Allen Turing to have survived to the present; he would have access to the most powerful computers and the liberty to choose his own friends: We
note that he had neither; and yet it is significantly because of him, that we now have both. It is an honor to present a new Open Source software and a novel technique for cracking the Enigma cipher on the year of his Centennial.
As does Gillogy, Sullivan, Weierud, and other contemporary Enigma researchers, We apply Index of Coincidence in various forms over a subset of the parameter space, and promote a minority of results through a series of increasingly exhaustive tests. To this general approach we contribute two exploits: Stecker Isolation, which reduces the most complex module, the steckerbrett, from ~26!! to 262 tests ; and Diagonal Conflation which prescribes a unique subset of the ringstellung by noting their inverse effect relationship with the message cipher.
We will attempt to break a message during the talk on a laptop. To improve performance we rely on OpenCL which provides cross platform access to GPU for General purpose computing.
More generally, we discuss the curve of entropy, complexity and the rapid improvement in computing power by showing that what took a national industrial effort to achieve in the 40's can now be superseded on a laptop computer.
|Intro to Crypto for Hackers||Bob Weiss is founder and owner of Password Crackers, Inc. and a Defcon Goon. Ben Gatti is on of the developers of OpenVPN.|
|CVE 2012-4681 (Java Applet Remote Code Execution) from the Victims Perspective||"Ogbeide Derrick Oigiagbe [email@example.com] -Speaker and Author" and "Rayvorn Patterson Jr. (firstname.lastname@example.org)-speaker and author"||There are many articles that focus on how the CVE 2012-4618 (Java 7 Applet Remote Code Execution) functions and how to use it. However, few articles if any focus on the effects after the exploit and what artifacts are left behind. We wish to explore this concept by analyzing artifacts left by the CVE 2012-4618 vulnerability (Java 7 Applet Remote Code Execution). We do this by using familiar security tools including but not limited to Snort, Wireshark, Process Explorer, etc.||The intended audience consists of security practitioners who are familiar with common security tools.||Ogbeide Derrick Oigiagbe|
Mathematics and Computer Science with Security Track.
Rayvorn Patterson Jr.
Computer Science with Security Track.
|Cyber Security for the Industrial Environment: An Intro to ISA/IEC 62443||Jim Gilsinn, @jimgilsinn||Industrial automation and control system (IACS) and supervisory control and data acquisition (SCADA) cyber security has gotten a lot of press recently due to those systems being the target of attacks by Stuxnet, Duqu, Flame, and others. These are not the first viruses, worms, or malware to affect IACS and SCADA systems, but they carried payloads specifically targeting those systems. While the exact vulnerabilities exploited were considered zero-days, the basic methods they used to infect their target systems were not unknown: infected removable media and drives, peer-to-peer infection on a network, rootkits, and hard-coded passwords. It is unlikely that all of these infections could have been prevented completely, but many common cyber security methods and controls could have prevented different aspects of each of these attacks.|
IACS and SCADA cyber security is more about using proven security methods, controls, and technology than it is about the newest widget being sold by your favorite vendor. Many of the same methods, controls, and technology used in the IT environment can be used in the industrial environment, but their usage needs to be carefully analyzed before they can be applied. IACS and SCADA systems have real-world consequences that necessitate taking a risk-based approach to security. The International Society of Automation’s (ISA’s) committee on security for IACS (ISA99) and IEC have developed a series of standards (ISA/IEC 62443) to define procedures for implementing and measuring cyber security. This talk is a primer on the ISA/IEC 62443 series. It’s not intended as a deep-dive, but an introduction to what is and what is not part of the series and where you can go for more information.
|Anyone interested or involved in cyber security for industrial systems.||Jim Gilsinn has spent over 20 years working as an Electronics Engineer for the Engineering Laboratory at the National Institute of Standards and Technology (NIST). During that last decade at NIST, he focused on industrial network reliability, performance, and security. He created a series of performance metrics and tests and developed a software tool capable of measuring the network performance for industrial devices. He is a founding member of the ISA99 committee and recently took on the role of co-chair for the committee and co-chair for the working group developing an IACS security management system based on ISO/IEC 27001/27002.|
|Defense In Depth : Designing Networks That Survive First Contact||@XenoPhage||Most of the talks I see nowadays centers around new ways of taking down systems, the fastest way to get shells, and other attack oriented subjects. There are a few talks now and then about defense, mainly about adding new defenses to your existing network. But what if you had a chance to build things from scratch? What would that look like? Would what you build survive better than what you have now?|
This talk will explain how to build a network from the ground up with security in mind from the start. We'll start with a basic network consisting of routers and firewalls. We'll talk about basic network layout, how to identify what systems belong where, and how to get going without having to have all of those fancy, expensive gadgets. We'll cover various open source projects that can help you fortify your network from the start without having to spend boatloads of money. And finally, we'll talk about some of those expensive gadgets and when it's appropriate to start looking at using them.
|This talk is for everyone, both experienced professionals as well as beginners. At the very least, this talk should provide insight for professionals looking to offer suggestions to clients on how to fix some of the problems they see.||Jason Frisvold is currently employed as a Senior Network Engineer at Lafayette College in Easton, Pennsylvania. Prior to his current position, he spent 15 years in the ISP business working for a variety of small and large companies. He has a wide variety of interests including programming, network design, security, and gaming.|
|Detecting the Break-in: Do you know what your processes are up to?||Greg Kuruc||So your computer gets hacked. The problem is you have no idea it happened. In a world where an attacker is going to get into your system eventually, being able to detect the break in is invaluable. The goal of this research project is to be able to determine if a system has been hacked and to be able to detect how it happened. By keeping track of what your processes are up to, you can check for flags and inconsistencies. This project consists of a series of python scripts, which track your processes, and outputs the information to a web interface that a user can easily analyze. This talk will consist of an overview of this research and showing a prototype of the project.||This talk is intended for everyone, beginner’s included. It may be of special interest to those who compete in cyber defense competitions.||Greg Kuruc is a senior at Towson University and currently has an internship working in mobile security at Fixmo Inc. He has also been doing research at Towson University with the CyperOperations Research Group working with emerging exploits and performing forensic analysis on the victim machine.|
|Disruptive Security Chaos ... for Good||@grecs||Typically as organizations become more successful they often leave behind the agile and innovative methods that got them there and become more bureaucratic to protect the success they've achieved. Often this protection involves the implementation of strict policies meant to control the otherwise uncontrollable in a desperate attempt obtain conformity. One of these policies usually addresses organizational IT solutions such as standard workstation or laptops as well as an agreed upon statement of how those resources should be used. As "hacking" has become more prominent organizational leadership has updated these IT policies to include statements limiting experimentation of this practice on the internal network even for curiosity purposes. Is this the right approach? Does it really make the internal network more secure?||Security professionals interested in how policy can make security worse.||Grecs has over 17 years experience, undergraduate and graduate degrees in Electrical Engineering, and a really well known security certification. Even though his training was in Electrical Engineering, Grecs has always been more of a Computer Science person at heart going back to his VIC-20, Commodore 64, and high school computer club days. After doing the IT grind for 5 years, he discovered his love of infosec and has been pursuing this career ever since. Currently, he spends his days doing cyber security paperwork drills in building and maintaining multi-billion dollar government systems. At night he runs a local infosec website and tries to get some hands-on skillz.|
|Duck Sauce v.02||Raymond @securemaryland||Find a system that isn't locked? Do you know what to do? How fast can you type? Simply leverage HID (Human Interface Device) hacking to pwn the system. The talk will cover introduce HID hacking and payload designs, built specifically around the HAK5 USB Rubber Ducky (yes teensy isn't the only one).|
Key topic areas:
1. Introduction to duck code and how to create basic payloads
2. How to hide payloads
3. Advanced payloads - pulling information and interaction with other devices.
4. How to convert other payloads into duck code.
|Beginner to intermediate security engineers/pen-testers.|
Students wanting to learn more.
|16+ years in the infosec arena doing everything from hands-on engineering to high level security management.|
|Exploit Kits are freaking annoying||Joel Esler @joelesler||Exploit kits are multi vector attack methods that can be anywhere on the Internet just waiting for an unpatched unsuspecting browser to cruise by and get attacked. Tracking, working with, and preventing these is one of my full time jobs. |
If you are interested in Snort, Antivirus (particularly ClamAV), and preventing threats.
|Everyone. This talk affects everyone who uses the Internet.||Joel Esler is the OpenSource Community Manager and a Senior Research Engineer at Sourcefire. Joel joined Sourcefire in 2005 after eight years of government (contractor) employment as a Senior Security Consultant. Joel worked in the Professional Services department for nearly six years, and in April of 2011, he moved to the Vulnerability Research Team (VRT) where is responsible for the detection produced for Snort, ClamAV, and the Razorback Projects.|
In Joel's role as the OpenSource Community Manager, he is responsible for the community aspects of the Snort, ClamAV, Razorback, and Daemonlogger projects. He travels the world performing public speaking engagements, teaching others about OpenSource and Sourcefire's contributions and commitment in the area.
Having visited over 150 customers, Joel has configured IPS/IDS installations in many of the Fortune 100 companies in several different industries, including Banking, Travel (Airline and Rail), Manufacturing, and SCADA (Power) Environments, along with almost every federal agency.
Joel is also an Incident Handler for SANS at the Internet Storm Center and a GIAC Gold Advisor responsible for the technical grading of the SANS Gold certification process.
Joel is also the father of three wonderful kids, and a husband to his awesome wife.
|Firewalling dynamic infrastructures (the cloud) with Chef and Netfilter||Julien Vehent @jvehent||Virtualized web infrastructures often means having a bunch of web applications talking HTTP to each other all over your network. REST APIs everywhere, VMs appearing and disappearing every day, without any sort of ACL or passwords between them. From a firewall standpoint, manually managing the firewall rules between those VMs is unreallistic, and often results in opening tcp/80 (and more) everywhere by default. This is obviously not ideal. Some have tried to deploy web application firewall, but few have survived to testify. The Advanced FireWall (https://github.com/jvehent/AFW) is a Chef cookbook that solves these problems by controlling host-based Netfiter firewalls on each system of a Chef provisioned environment. We will demonstrate how host-to-host rules can be created and kept up to date by using a set of generic rules expanded dynamically, and how to keep control over every single packet of your network with it.||Security Architects, who design and maintain network-based security. Familiarity with Netfilter and Chef is preferable but not required.||Julien is a French Engineer who lives in Philadelphia, and specializes in Web Architecture’s Systems and Security. He build infrastructures from the ground up, in datacenters or in the cloud, and from the front firewall to the backend database. Julien owns a Master's Degree in IT Security, write article in GNU/Linux Magazine France and on http://wiki.linuxwall.info, and program enough to get the job done.|
|Give Yourself a Hand||Infojanitor||Have you ever wondered how your physical body works and how you would react to an actual physical attack or attempt to to be restrained. I can tell you that most people don't but, with some simple knowledge of the function of your physical being and minimal practice you to can defend yourself like a boss! This talk with active “Hands” on exercises will cover just how you can make this happen. The human body is an amazing system of interconnected muscle, tissue, and tendons that most of us live in and use every day but have no idea how it functions or what would happen if someone tried to assault it. The knowledge of the body combined with the hacker mentality can teach you how to detect, determine and defend against simple physical assault. They say that a little knowledge is a dangerous thing. This talk intends to prove that statement to be true in addition to giving you the ability to prove that a little knowledge is a good thing.||Security practitioner's with a curiosity on personal physical who are willing to learn simple personal physical security principles and how and why they work. Requires no experience or equipment because you live in the object we are going to learn about and hopefully after attending you will know more about yourself and how you function. If you have every been curious about how to react to someone placing their hands on you with bad intentions like your network this might be the talk for you.||Infojanitor|
Is not a security Rockstar or even a security roadie but simply a security system engineer and long time conference attendee working in the information technology field since the mid 1980's. Interested in most elements of security and has traveled the world performing task for multiple customers to which he still maintains NDA's. In addition to working with computers he has been actively hacking the human body for the past 30 years as an active member of the United States Judo Association (USJA) and United States Martial Arts Association (USMA). He is not paranoid he just likes to be prepared.
|Hacking the Male and Female OS (Men are from Windows, Women are from Linux)||Valerie Thomas @hacktress09||You wouldn't use the same attacks for different operating systems so why would you use the same social engineering attacks for men and women? The male and female brains are as different as Linux and Windows. This principle applies to male and female targets as well as attackers. Social engineering attacks are not one size fits all. As a female social engineer the majority of traditional social engineering attacks didn't work for me so I had to get creative. In this presentation I’ll discuss gender specific social engineering attacks and the psychological mechanics behind them.||This talk is appropriate for anyone interested in social engineering.||Valerie Thomas (@hacktress09) is a Senior Information Security Consultant for Securicon. Upon completing her Bachelors degree in Electronic Engineering Technology her information security career began with the Department of Defense. Throughout her years in information security she has gained expertise in penetration testing, vulnerability assessment, data loss prevention, social engineering, and physical penetration testing. She has performed engagements for private industries, non-profit organizations, and government agencies. She has taught social engineering techniques at multiple corporations, schools, Defcon, DerbyCon, and the Nordic Security Conference.|
|Introduction to the use after free vulnerability and why it matters||Johnathan Fragale @insecurityguy||Almost all students learn about buffer overflows but there are many other common attack vectors in software. Use after free vulnerabilities are just as easy to understand as buffer overflows and affect the security of software just as much. Using the recent Microsoft Internet Explorer execCommand Use-After-Free Vulnerability to demonstrate, I hope that everyone will leave with an appreciation of this class of exploit and a better idea of how to avoid it when coding.||Students and anyone new to the field or curious||Johnahtan Fragale - Security student at Towson University|
|Pen Testing as due diligence||Alex Muentz||We pen test our existing systems to find vulnerabilities in our infrastructure. Great. That way we can fix/patch/remove/protect whatever broken stuff risks our (or our customers/clients) valuable information.|
But what about potential new systems? Should we just accept what the vendor tells us about security? Could there be some additional advantage to pen testing systems we're considering for purchase?
Actual examples of pen testing systems under consideration will be explained and discussed.
|I'm not that bright, so this will be more conceptual than nuts & bolts. Anyone with simple infosec skills and familiarity with dealing with vendors will get what I'm talking about.||Alex Muentz is a hacker and lawyer. At the time of this proposal, he's employed by Picciotti & Schoenberg, an infosec law firm. He's annoyed people at this and other conferences, including HOPE, Shmoocon, Defcon and Pumpcon.|
|PHP Website Security, Attack Analysis, & Mitigations||@grecs||PHP is a very powerful language for easily developing web applications however with this power comes great responsibility ... and in this case that means not shooting yourself in the foot with lax security practices. Issues can arise from everything from language vulnerabilities and weak default settings to insecure coding practices and misconfigurations. This presentation plans to address many of these concerns by providing valuable lessons in the security of, attacks against, and management of PHP in your environment. The talk begins with an overview of PHP security, including it's known issues and corresponding security enhancements the maintainers have incorporated over time. Beginning with an in-depth discussion of Suhosin and how it can be used to lock down your PHP environment, the presentation next details PHPIDS and how it can be used to detect PHP-centric threats. The talk closes with a strategy for analyzing the risks in your PHP environment and applying corresponding PHP and platform/network mitigations to minimize your attack surface.||This talk is intended for security pros doing appsec on php applications as well as developers interested in security.||Grecs has over 17 years experience, undergraduate and graduate degrees in Electrical Engineering, and a really well known security certification. Even though his training was in Electrical Engineering, Grecs has always been more of a Computer Science person at heart going back to his VIC-20, Commodore 64, and high school computer club days. After doing the IT grind for 5 years, he discovered his love of infosec and has been pursuing this career ever since. Currently, he spends his days doing cyber security paperwork drills in building and maintaining multi-billion dollar government systems. At night he runs a local infosec website and tries to get some hands-on skillz.|
|Physical Drive-By Downloads||Kyle (Kos) Osborn||Mobile security is still a fairly young practice, but it’s not unexplored. Over the past few years, there has been plenty of research on mobile threats, such as exploits, malicious applications, and more recently, drive-by downloads. However, there is at least one aspect of security that is lacking documentation, and that is the physical security of the device. One of Android’s great selling points, customization, is also one of its weakest in terms of security. While recent versions of Android support drive encryption, and even remote wipe, these defenses still can’t protect you from a physical attack that you didn’t even realize happened — especially if that phones other defenses have already been weakened by its owner.|
And that’s exactly what this talk intend to do: teach you how to successfully conduct a “physical drive-by download” on a device; and in some cases, one that may only be accessible for a single minute.
|Infosec Researchers, red teamers, android users/developers.||Kyle ‘Kos’ Osborn specializes in network penetration, web application security, and mobile research. He plays a bad guy at the Western Regional Collegiate Cyber Defense Competition, and develops CTF, with his team, including one for the United States Cyber Challenge “Cyber Camps”, where a number of campers competed in. Osborn has previously discussed browser and mobile security at other conferences such as BlackHat USA, DefCon, Toorcon, ThotCon, DerbyCon, BruCon, Hashdays, and TakeDownCon.|
|Project Byzantium: Mesh Networking for the Zombie Apocalypse.||Haxwithaxe, Sitwon, and The Doctor||The goal of Project Byzantium is to develop a communication system with which users can connect to each other and share information in the absence of convenient access to the Internet. The use cases for such a system are:|
* The infrastructure for accessing the internet has become damaged or inaccessible. (Eg, a natural disaster such as Hurricane Katrina.)
* A central authority has decided to explicitly block or shutdown key infrastructure. (Eg, Egypt's recent internet blackout, rampant DNS filtering.)
* A zombie apocalypse in which personnel responsible for maintaining key portions of the infrastructure have all been turned.
The project is developing Byzantium Linux, a live distribution of Linux which makes it possible to construct ad-hoc wireless mesh networks of arbitrary size which do not require equipment that is expensive or difficult to acquire during an emergency, but instead is readily available (i.e., any x86 computer with at least one wireless interface) and accessible from any wi-fi enabled device (such as MP3 players, tablet PCs, and smartphones). In addition to providing a network infrastructure Project Byzantium also includes decentralized alternatives to online services that activists, protestors and organizers use to find one another, coordinate and share information. The applications Byzantium Linux provides are configured with mobile devices as their primary client class. The presentation will include a brief overview of some of the obstacles and threats faced online by protestors in the Middle East and problems encountered during communications infrastructure failure, design constraints for an improvisable mesh network, problems encountered during development, and solutions to problems encountered. The pros and cons of a number of mesh networking protocols and solutions will also be discussed.
|People interested in emergency communications, emergency first response, network neutrality and censorship, or social activism.|
All people interested in network engineering and wireless communications. It would also be of special interest to people interested in IP mesh routing and 802.11 wireless networking.
Hacker, developer, outdoorsman. HacDC Member, software developer, live distro and OpenWRT firmware developer. Fixer of things ... because he breaks them ...
Ben the Pyrate (@sitwon):
Programmer, Hacker, and Pirate extrodinare. Ben is a member of HacDC and a Linux administrator and developer with experience building Live Linux distributions and custom OpenWRT firmwares.
The Doctor (@virtadpt):
The Doctor is a system architect and system administrator working for an aerospace engineering firm in Washington, DC. When not building or repairing servers he's aiding dissidents in the Middle East as an agent of Telecomix, working on projects at HacDC, contributing to Zero State projects, traveling through time and space inside a funny blue box, or consulting in the private sector.
|The Security Vulnerability Assessment Process, Best Practices & Challenges||Kellep Charles @kellepc||Conducting regular security assessments on the organizational network and computer systems has become a vital part of protecting information-computing assets. Security assessments are a proactive and offensive posture towards information security as compared to the traditional reactive and defensive stance normally implemented with the use of Access Control-Lists (ACLs) and firewalls.|
Too effectively conduct a security assessment so it is beneficial to an organization, a proven methodology must be followed so the assessors and assesses are on the same page.
This presentation will evaluate the benefits of credential scanning, scanning in a virtual environment, distributed scanning as well as vulnerability management.
|The talk is for information security practitioners interested or involved in security vulnerability assessments as well as vulnerability management. The content and concept are for those with a basic to moderate level understanding of security.||Kellep Charles (@kellepc) is the creator and Executive Editor of SecurityOrb.com (@SecurityOrb), an information security & privacy knowledge-based website with the mission to share and raise awareness of the motives, tools and tactics of the black-hat community, and provide best practices and counter measures against malicious events.|
Kellep works as a government contractor in the Washington, DC area as an Information Security Analyst with over 15 years of experience in the areas of incident response, computer forensics, security assessments, malware analyst and security operations.
Currently he is completing his Doctorate in Information Assurance at Capitol College with a concentration in Artificial Neural Networks (ANN) and Human Computer Interaction (HCI). He also holds a Master of Science in Telecommunication Management from the University of Maryland University College and a Bachelor of Science in Computer Science from North Carolina Agriculture and Technical State University.
He has served as an Adjunct Professor at Capitol College in their Computer Science department. His industry certifications include Certified Information Systems Security Professional (CISSP), Cisco Certified Network Associate (CCNA), Certified Information Systems Auditor (CISA), National Security Agency – INFOSEC Assessment Methodology (NSA-IAM) and Information Technology Infrastructure Library version 3 (ITILv3) to name a few.
|Treachery, Faith and the Great River - Using critical thinking to examine beliefs introduced to the information security community.||aricon||Information security has a very broad scope and while it is possible to gain a summary of most of it's concerns it is difficult if not impossible to be well versed in most or all of what it encompasses. However many of us still require the logical tools to preform correct analysis of offerings by a number of sources including blogs, conference presentations, email lists and vendor marketing material.|
I intend to demonstrate the means by which critical thinking can be used to research and understand elements in our industry using both scientific and common means for sniffing out thruths, lies and mixed messages that we encounter. Subjects will include areas of social engineering, blackbox and open source tools, user and management education and cross disciplinary interaction. Using examples, imperically gathered data and other information points will hopefully be demonstrated to sway all but the most dogmatic member of the audience.
Many of the ideas that will be incorporated into this talk are to be gathered from the skeptical education movement that has gained traction in other fields to expand beyond limits of preconceptions to demonstrate that facts not beliefs are what decision making should be based upon.
|This content will be written to be accessible to all.||I am a resident of the Northern Virginia area that is like many in the area involved in some government related work. InfoSec, amateur astronomy and critical thinking outreach education are both my interests and my passions. Been attending conferences and doing some level of research for about five years now, but working in information systems for at least 15. Finally I am on IRC and can be reached that way pretty much whenever using my nick - aricon on freenode and elsewhere.|
|Web App Security is Impossible||Justin Klein Keane @madirish2600||Web application security is one of the hottest topics in information security today, and for good reason. Application development online has exploded, with ever increasing customer demand for new services and features. Unfortunately, securing web applications is next to impossible. Despite the temptation to blame "stupid users" or "clueless developers" for web application security failures, this is actually a wildly technical space with issues that extend beyond superficial causes. This talk will cover the essential components of web application technology and show why web application penetration testers (and script kiddies) will always compromise your web applications. Learn why this is such an awesome field to break into as a hacker and why it's going to make your life miserable as a security professional.||Information security enthusiasts with a basic understanding of core concepts in the field (such as trust, authentication, exploitation, and compromise).||Justin C. Klein Keane (a.k.a. Mad Irish) is a web application security specialist with over a decade of experience in application security. Justin holds a MCIT degree from the University of Pennsylvania and currently works as a security researcher and application security expert. Justin is credited with the discovery of hundreds of vulnerabilities in open and closed source software and works actively in security code review and web application penetration testing. Justin is also a professional application developer, so understands the issues facing web applications from both sides of the application security space. Justin is also one of the chapter leaders of Philadelphia OWASP.|