SEARCH
TOOLBOX
LANGUAGES
Difference between revisions of "Schedule"

Difference between revisions of "Schedule"

From BruCON 2016

Jump to: navigation, search
Line 6: Line 6:
 
Click here to see the complete '''[[Speakers | Alphabetical list of speakers]]'''<br>
 
Click here to see the complete '''[[Speakers | Alphabetical list of speakers]]'''<br>
 
Click here to see the complete '''[[Presentations | Alphabetical list of presentations]]'''
 
Click here to see the complete '''[[Presentations | Alphabetical list of presentations]]'''
 
== Current workshops ==
 
 
# [http://blog.brucon.org/2009/03/didier-stevens-will-give-digital-id.html Brucon Workshop #1: Digital ID workshop]
 
# [http://blog.brucon.org/2009/03/toool-will-be-present-at-brucon.html Brucon Workshop #2: Physical Locks Security]
 
# [http://blog.brucon.org/2009/03/brucon-workshop-2-wireless-auditing.html Brucon Workshop #3: Wireless auditing]
 
# [http://blog.brucon.org/2009/05/brucon-workshop-4-voip-workshop.html Brucon Workshop #4: VOIP workshop]
 
  
 
==Schedule==
 
==Schedule==
  
For now, we have just a '''[[Presentations | complete list of confirmed presentations]]'''
 
  
 
__NOTOC__
 
__NOTOC__
  
===“I am walking through a city made of glass and I have a bag full of rocks” (Dispelling the myths and discussing the facts Global Cyber-Warfare)===
+
{| border='1px'
by '''[[Speakers#Jayson_E._Street | Jayson E. Street]]'''<br><br>
+
|- style="font-size:11pt;font-weight:bold" align="center"
'''Abstract:'''  There is a war being raged right now. It is being fought in your living room, in your dorm room even in your board room. The weapons are your network and computers and even though it is bytes not bullets whizzing by that does not make the casualties less real. We will follow the time line of Informational Warfare and its impact today. We will go deeper past the media hype and common misconceptions to the true facts of whats happening on the Internet landscape. You will learn how the war is fought and who is fighting and who is waiting on the sidelines for the dust to settle before they attack.
+
| width="94" height="15" | Hour
 
+
| width="94" | Speaker Track
===A new web attack vector: Script Fragmentation===
+
| width="94" | Workshop Track #1
by '''[[Speakers#Stephan_Chenette | Stephan Chenette]]'''<br><br>
+
| width="94" | Workshop Track #2
'''Abstract:''' This presentation will introduce a new web-based attack vector which
+
| width="94" | Speaker Track
utilizes client-side scripting to fragment malicious web content.
+
| width="94" | Workshop Track #1
 
+
| width="94" | Workshop Track #2
This involves distributing web exploits in a asynchronous manner to
 
evade signature detection. Similar to TCP fragmentation attacks, which
 
are still an issue in current IDS/IPS products, This attack vector
 
involves sending any web exploit in fragments and uses the already
 
existing components within the web browser to reassemble and execute
 
the exploit.
 
 
 
Our presentation will discuss this attack vector used to evade both
 
gateway and client side detection. We will show several proof of
 
concepts containing common readily available web exploits.
 
 
 
===All Your Packets Are Belong to Us - Attacking Backbone Technologies===
 
by '''[[Speakers#Daniel_Mende | Daniel Mende]]'''<br><br>
 
'''Abstract:''' The year 2008 has seen some severe attacks on infrastructure protocols
 
(SNMP, DNS, BGP). We will continue down that road and discuss potential
 
and real vulnerabilities in backbone technologies used in today's
 
carrier space (e.g. MPLS, Carrier Ethernet, QinQ and the like). The talk
 
includes a number of demos (like cracking BGP MD5 keys, redirecting MPLS
 
traffic on a site level and some Carrier Ethernet stuff) all of which
 
will be performed with a new tool kit made available at the con. It's
 
about making the theoretical practical, once more!
 
  
===Botnets, Ransomware, Malware, and Stuff!===
+
|- style="font-size:11pt" align="center"
by '''[[Speakers#Julia_Wolf | Julia Wolf]]'''<br><br>
+
| height="26" | 9:00
'''Abstract:'''
+
| rowspan="2" | [[Presentations#Trusted_Cryptography | Trusted Cryptography]]
 +
| rowspan="4" | Digital ID #1
 +
| rowspan="4" | Physical Locks #1
 +
| rowspan="2" | [[Presentations#Social_engineering_for_penetration_testers  | Social engineering for penetration testers]]
 +
| rowspan="4" | Arduino Workshop #2
 +
| rowspan="4" | Wireless Security #2
  
===Building Hackerspaces Everywhere===
+
|- style="font-size:11pt" align="center"
by '''[[Speakers#Esther_Schneeweisz | Esther Schneeweisz]]'''<br><br>
+
| height="26" | 9:30
'''Abstract:''' 
 
Within the last 12 months, we've seen hackerspaces spread all across the world at an incredible rate, and hackers everywhere getting involved with the movement and turning into the most excited entusiasts for shared community spaces to research and/or build things. As of today there are 102 officially known active hackerspaces and another 82 in planning or building process. The media has developed an interest in the movement, its history (reaching back dozens of years already), and its current status.
 
  
However, the epic plan of taking over the world and bringing new mechanisms of studying, working and experience to the people doesn't stop here. The 40 minute talk will mostly focus on why to build a hackerspace, how, and what questions to ask yourself in the process. It will conclude in an extensive Q/A round.
+
|- style="font-size:11pt" align="center"
 +
| height="129" | 10:00
 +
| rowspan="2" | [[Presentations#SQL_Injection_-_how_far_does_the_rabbit_hole_go.3F | SQL Injection - how far does the rabbit hole go?]]
 +
| rowspan="2" | [[Presentations#.E2.80.9CI_am_walking_through_a_city_made_of_glass_and_I_have_a_bag_full_of_rocks.E2.80.9D_.28Dispelling_the_myths_and_discussing_the_facts_Global_Cyber-Warfare.29 |  “I am walking through a city made of glass and I have a bag full of rocks” (Dispelling the myths and discussing the facts Global Cyber-Warfare)]]
  
 +
|- style="font-size:11pt" align="center"
 +
| height="15" | 10:30
  
===How to prepare, coordinate and conduct a cyber attack===
+
|- style="font-size:11pt" align="center"
by '''[[Speakers#Eric_Adrien_Filiol | Eric Adrien Filiol]]'''<br><br>
+
| height="15" | 11:00
'''Abstract:''' 
+
| Break
 +
| Break
 +
| Break
 +
| Break
 +
| Break
 +
| Break
  
This talk intends to present how true cyberattack could be planned and launched from a military perspective but with the technical aspects in mind. The aim is to explain why the common definition of cyber attack is totally wrong and to show what a rogue group or a rogue nation could really do. Our approach is based on Nato InfoOps techniques, military doctrines and computer attacks techniques. A number a examples will be given to illustrate the talk.
+
|- style="font-size:11pt" align="center"
 +
| height="29" | 11:30
 +
| rowspan="2" | [[Presentations#How_to_prepare.2C_coordinate_and_conduct_a_cyber_attack | How to prepare, coordinate and conduct a cyber attack]]
 +
| rowspan="4" | Arduino Workshop #1
 +
| rowspan="4" | JTAG Workshop #1
 +
| rowspan="2" | [[Presentations#A_new_web_attack_vector:_Script_Fragmentation |  A new web attack vector: Script Fragmentation]]
 +
| rowspan="4" | Digital ID #2
 +
| rowspan="4" | VOIP #2
  
 +
|- style="font-size:11pt" align="center"
 +
| height="29" | 12:00
  
===Knowing Me Knowing You (The dangers of social networks)===
+
|- style="font-size:11pt" align="center"
by '''[[Speakers#Brian_Honan | Brian Honan]]'''<br><br>
+
| height="33" | 12:30
'''Abstract:'''  In late 2008 the author was challenged by an Irish security journalist to steal her identity. The author was only allowed to use information that could be found online, could not break any laws and could not use any social engineering techniques.  The author will present what information was available online, whether or not he was succesful and what lessons can be learned from the experience in relation to an individual's privacy.
+
| rowspan="2" | [[Presentations#Malicious_Markup_-_I_thought_you_were_my_friend_-_cycle_3 | Malicious Markup - I thought you were my friend - cycle 3]]
 +
| rowspan="2" | [[Presentations#Botnets.2C_Ransomware.2C_Malware.2C_and_Stuff.21 | Botnets, Ransomware, Malware, and Stuff!]]
  
===Malicious Markup - I thought you were my friend - cycle 3===
+
|- style="font-size:11pt" align="center"
by '''[[Speakers#Mario_Heiderich| Mario Heiderich]]'''<br><br>
+
| height="33" | 13:00
'''Abstract:'''  The talk will cover a short exegesis of how and where browser vendors talk about security - and what can be seen from a security professionals perspective. The ratio between the growth of new browser technologies and the amount of time for developers to learn working with them could turn out to be a problem - especially when knowing that todays browsers support a vast amount of lost treasures. Amongst them various XML quirks, data islands, SVG fonts etc. which make it hard to protect rich web applications. Surprising but true: several of the most recent in-the-wild browser exploits were possible due to those legacy features like the IE6-8 code execution flaw. Reason enough to dive into a collection of weird techniques and standards exposing attack vectors and scenarios that WAF systems and filters might have some trouble with. The talk also shows some issues regarding IE8 and Opera 10 - as well as current Firefox versions. The conclusion of the talk features an overview of what we can expect during the next months, ways for developers and related parties to deal with those security risks.
 
  
===Open Source Information Gathering===
+
|- style="font-size:11pt" align="center"
by '''[[Speakers#Chris_Gates | Chris Gates]]'''<br><br>
+
| height="15" | 13:30
'''Abstract:'''  This talk is about using the current open source tools to generate a detailed target footprint for a blackbox penetration test. Suppose for our penetration test we are given nothing but a domain name. Client-side and Social Engineering attacks are in scope, but we're on our own to come up with all the information needed to execute those attacks (just like a real attacker would be required to do). The days of running Sam Spade or simply querying a whois server for the totality of your information gathering are dead. We need to leverage all the information freely available to us on the net to build both our network attack list as well as our client attack list. This information includes network ranges, hidden company affiliations, hostnames, dns information, public documents with their metadata and email addresses for client side attacks.
+
| rowspan="2" | Lunch
 +
| rowspan="2" | Lunch
 +
| rowspan="2" | Lunch
 +
| rowspan="2" | Lunch
 +
| rowspan="2" | Lunch
 +
| rowspan="2" | Lunch
  
===Rage Against The Kiosk===
+
|- style="font-size:11pt" align="center"
by '''[[Speakers#Paul_James_Craig | Paul James Craig]]'''<br><br>
+
| height="15" | 14:00
'''Abstract:'''
 
  
My name is Paul Craig, and I am the self proclaimed "King of Kiosk Hacking".
+
|- style="font-size:11pt" align="center"
 +
| height="34" | 14:30
 +
| rowspan="2" | [[Presentations#Rage_Against_The_Kiosk | Rage Against The Kiosk]]
 +
| rowspan="4" | TBD
 +
| rowspan="4" | TBD
 +
| rowspan="2" | [[Open_Source_Information_Gathering | Open Source Information Gathering]]
 +
| rowspan="4" | JTAG Workshop #2
 +
| rowspan="4" | TBD
  
Last year at Defcon 16, I released iKAT v1.0 (The Interactive Kiosk Attack Tool).  iKAT is an online tool designed to allow users to hack an internet Windows Kiosk terminal, in less than one minute.
+
|- style="font-size:11pt" align="center"
 +
| height="34" | 15:00
  
Thousands of Kiosks worldwide have accessed iKAT and witnessed its Kiosk hacking power.
+
|- style="font-size:11pt" align="center"
 +
| height="40" | 15:30
 +
| rowspan="2" | [[Presentations#All_Your_Packets_Are_Belong_to_Us_-_Attacking_Backbone_Technologies | All Your Packets Are Belong to Us - Attacking Backbone Technologies]]
 +
| rowspan="2" | [[Presentations#Red_and_Tiger_Team | Red and Tiger Team]]
  
Kiosk vendors ran for cover after the Defcon release, fixing their software and explicitly blocking iKAT and my techniques. The year is now 2009, and I have spent my spare time playing with more Kiosks. With even more success than ever before!
+
|- style="font-size:11pt" align="center"
 +
| height="40" | 16:00
  
iKAT v2.0 is now ready to be released, with more oh-day, more tools and more tricks, to provide you with the ultimate Kiosk hacking experience.
+
|- style="font-size:11pt" align="center"
 +
| height="15" | 16:30
 +
| Break
 +
| Break
 +
| Break
 +
| Break
 +
| Break
 +
| Break
  
===Red and Tiger Team===
+
|- style="font-size:11pt" align="center"
by '''[[Speakers#Chris_Nickerson| Chris Nickerson]]'''<br><br>
+
| height="40" | 17:00
'''Abstract:''' The world of Information Security is changing. Budgets are tighter, attacks
+
| rowspan="2" | [[Presentations#Knowing_Me_Knowing_You_.28The_dangers_of_social_networks.29 | Knowing Me Knowing You (The dangers of social networks)]]
are more sophisticated, and the corporate network is no longer the low
+
| rowspan="4" | Wireless Security #1
hanging fruit. That leaves web-enabled applications as the vector-du-jour,
+
| rowspan="4" | VOIP #1
but that well is quickly drying up for organized crime as well. As they
+
| rowspan="2" | [[Presentations#Transition_to_IPv6_on_the_Internet:_Threats_and_Mitigation_Techniques | Transition to IPv6 on the Internet: Threats and Mitigation Techniques]]
creep up the OSI Model looking for easier ways to steal your corporate
+
| rowspan="4" | Physical Locks #2
assets, they are quickly making their way up the stack to the unspoken 8th
+
| rowspan="4" | TBD
layer, the end user. So what is the next step in the never-ending escalation
 
of this cyber war?
 
 
To find out, we must do as Sun Tzu taught. "Think like our enemy!" That is,
 
after all, the primary tenet of penetration testing AKA ethical hacking,
 
isn't it? After years of hardening physical systems, networks, OSs, and
 
applications, we have now come full circle to a new dawn of attack. People
 
are now the target of the advanced hacker, and the cross-hairs are focused
 
squarely on their foreheads... literally. It is only a matter of time before
 
corporations fall from the raw effectiveness and  lack of preparedness for this
 
all too common attack.
 
  
===Social engineering for penetration testers===
+
|- style="font-size:11pt" align="center"
by '''[[Speakers#Sharon_Conheady | Sharon Conheady]]'''<br><br>
+
| height="40" | 17:30
'''Abstract:''' 
 
  
In recent years, people have become more familiar with the term "social engineering", the use of deception or impersonation to gain unauthorised access to sensitive information or facilities.
+
|- style="font-size:11pt" align="center"
 +
| height="64" | 18:00
 +
| rowspan="2" | [[Presentations#Building_Hackerspaces_Everywhere | Building Hackerspaces Everywhere]]
 +
| rowspan="2" | [[Presentations#The_Frogs_Who_Desired_A_King:_A_Virtualization_and_Cloud_Computing_Security_Fable_Set_To_Interpretive_Dance | The Frogs Who Desired A King: A Virtualization and Cloud Computing Security Fable Set To Interpretive Dance ]]
  
Does this mean that there are fewer successful social engineering attacks?Unfortunately not.
+
|- style="font-size:11pt" align="center"
 +
| height="64" | 18:30
  
In fact, because computer security is becoming more sophisticated and more difficult to break (although this is still very possible) more people are resorting to social engineering techniques as a means of gaining access to an organisation's resources. Logical security is at a much greater risk of being compromised if physical security is weak and security awareness is low. Performing a social engineering test on an organisation gives a good indication of the effectiveness of current physical security controls and the staff's level of security awareness. But once you have decided to perform a social engineering test, where do you start? How do you actually conduct a social engineering test?
+
|- style="font-size:11pt" align="center"
 +
| height="15" | 19:00
 +
| rowspan="2" | Dinner Break
 +
| rowspan="2" | Dinner Break
 +
| rowspan="2" | Dinner Break
 +
| rowspan="2" | Dinner Break
 +
| rowspan="2" | Dinner Break
 +
| rowspan="2" | Dinner Break
  
During my talk, I will discuss the practical aspects of a social engineering attack, providing plenty of war stories from my career as a social engineer. The key to preventing social engineering attacks from being successful lies in education and awareness. This talk will give the audience an insight into the techniques used by social engineers, whether as part of an ethical social engineering test or as a malicious social engineering attack.
+
|- style="font-size:11pt" align="center"
 +
| height="15" | 19:30
  
===SQL Injection - how far does the rabbit hole go?===
+
|- style="font-size:11pt" align="center"
by '''[[Speakers#Justin_Clarke | Justin Clarke]]'''<br><br>
+
| height="15" | 20:00
'''Abstract:''' SQL Injection has been around for over 10 years, and yet it is still to this day not truly understood by many security professionals and developers. With the recent mass attacks against sites across the world it has again come to the fore of vulnerabilities under the spotlight, however many consider it to only be a data access issue, or parameterized queries to be a panacea.
+
| rowspan="2" | Auction
 +
| rowspan="2" | Auction
 +
| rowspan="2" | Auction
 +
| rowspan="9" | Brucon Afterparty
 +
| rowspan="9" | Brucon Afterparty
 +
| rowspan="9" | Brucon Afterparty
  
This talk starts from what was demonstrated last year at Black Hat in Las Vegas, where a self propagating SQL Injection worm was demonstrated live on stage. Explore some of the deeper, darker areas of SQL Injection, hybrid attacks, and exploiting obscure database functionality.
+
|- style="font-size:11pt" align="center"
 +
| height="15" | 20:30
  
 +
|- style="font-size:11pt" align="center"
 +
| height="15" | 21:00
 +
| &nbsp;
 +
| &nbsp;
 +
| &nbsp;
  
===The Frogs Who Desired A King: A Virtualization and Cloud Computing Security Fable Set To Interpretive Dance===
+
|- style="font-size:11pt" align="center"
by '''[[Speakers#Christofer_Hoff | Christofer Hoff]]'''<br><br>
+
| height="15" | 21:30
'''Abstract:''' Aesop wrote this little ditty about some discontented frogs who lived in a pond. They asked Zeus for a King. They got one. It ate them. The moral of this story is "be careful what you wish for as you might just get it."
+
| &nbsp;
 +
| &nbsp;
 +
| &nbsp;
  
The corresponding analog is that of virtualization and cloud security. It's coming, but it's not going to look much like what security looks like today and it's certainly not what people are expecting. In fact, it may consume us all because we're unprepared for what we're asking for.
+
|- style="font-size:11pt" align="center"
 +
| height="15" | 22:00
 +
| &nbsp;
 +
| &nbsp;
 +
| &nbsp;
  
===Transition to IPv6 on the Internet: Threats and Mitigation Techniques===
+
|- style="font-size:11pt" align="center"
by '''[[Speakers#Eric_Vyncke | Eric Vyncke]]'''<br><br>
+
| height="15" | 22:30
'''Abstract:'''
+
| &nbsp;
 +
| &nbsp;
 +
| &nbsp;
  
While IPv6 security is relatively well known in European Universities, most enterprises and service providers had little exposure to it.
+
|- style="font-size:11pt" align="center"
 +
| height="15" | 23:00
 +
| &nbsp;
 +
| &nbsp;
 +
| &nbsp;
  
This is becoming really worrying because Microsoft Vista, 2008 includes IPv6 and IPv6 is even the preferred communication protocol. While this is probably a good thing, the transition mechanisms (notably the tunneling) can lead to risk exposure...
+
|- style="font-size:11pt" align="center"
 +
| height="15" | 23:30
 +
| &nbsp;
 +
| &nbsp;
 +
| &nbsp;
  
The IPv4-address exhaustion is for 2010, this means that the migration to IPv6 is happening and that it is urgent to expose the security community to IPv6 with the latest news (like secure neighbor discovery which has been designed to secure the ARP-like function with cryptographically generated addresses). The session also cover the threats linked to the dual-stack approach and the use of carrrier grade NAT.
+
|- style="font-size:11pt" align="center"
 +
| height="15" | 0:00
 +
| &nbsp;
 +
| &nbsp;
 +
| &nbsp;
  
===Trusted Cryptography===
+
|}
by '''[[Speakers#Vincent_Rijmen | Vincent Rijmen]]'''<br><br>
 
'''Abstract:''' Until late in the last century, cryptology and cryptographers were working almost exclusively for the military and government organizations. From the 1970s onwards, first companies and later also individuals started to use cryptography to protect their sensitive data. Cryptology became an open and lively field of research.
 
Although in the recent past many people have benefited from the increased use of cryptographic applications, currently there are growing doubts about the trust we can put in cryptology and its applications.
 

Revision as of 01:18, 2 July 2009

  • Wednesday 16/09 - Thursday 17/09: see Training
  • Friday 18/09 - Saturday 19/09: Workshops + Presentations + Lightning Talks

Conference doors and registration will be open at 8:00 on Friday

Click here to see the complete Alphabetical list of speakers
Click here to see the complete Alphabetical list of presentations

Schedule

Hour Speaker Track Workshop Track #1 Workshop Track #2 Speaker Track Workshop Track #1 Workshop Track #2
9:00 Trusted Cryptography Digital ID #1 Physical Locks #1 Social engineering for penetration testers Arduino Workshop #2 Wireless Security #2
9:30
10:00 SQL Injection - how far does the rabbit hole go? “I am walking through a city made of glass and I have a bag full of rocks” (Dispelling the myths and discussing the facts Global Cyber-Warfare)
10:30
11:00 Break Break Break Break Break Break
11:30 How to prepare, coordinate and conduct a cyber attack Arduino Workshop #1 JTAG Workshop #1 A new web attack vector: Script Fragmentation Digital ID #2 VOIP #2
12:00
12:30 Malicious Markup - I thought you were my friend - cycle 3 Botnets, Ransomware, Malware, and Stuff!
13:00
13:30 Lunch Lunch Lunch Lunch Lunch Lunch
14:00
14:30 Rage Against The Kiosk TBD TBD Open Source Information Gathering JTAG Workshop #2 TBD
15:00
15:30 All Your Packets Are Belong to Us - Attacking Backbone Technologies Red and Tiger Team
16:00
16:30 Break Break Break Break Break Break
17:00 Knowing Me Knowing You (The dangers of social networks) Wireless Security #1 VOIP #1 Transition to IPv6 on the Internet: Threats and Mitigation Techniques Physical Locks #2 TBD
17:30
18:00 Building Hackerspaces Everywhere The Frogs Who Desired A King: A Virtualization and Cloud Computing Security Fable Set To Interpretive Dance
18:30
19:00 Dinner Break Dinner Break Dinner Break Dinner Break Dinner Break Dinner Break
19:30
20:00 Auction Auction Auction Brucon Afterparty Brucon Afterparty Brucon Afterparty
20:30
21:00      
21:30      
22:00      
22:30      
23:00      
23:30      
0:00