Loading…
Track 1 [clear filter]
Friday, May 20
 

9:00am EDT

Intro to automotive security
Automotive security has received a major buzz recently, mainly due to researchers like Charlie Miller and Chris Valasek and major recalls in the news.
During the last 3 years our team has performed security evaluations on a large number of ECUs of various models, suppliers and manufacturers. In this talk we will attempt to give an overview of some of the findings we discovered. We will talk about the specific techniques and tools we used and what are some of the recurring bugs we keep encountering. Do not try this at home :)

Speakers

Friday May 20, 2016 9:00am - 10:00am EDT
Scruffy City Hall 32 Market Square, Knoxville, TN 37902

10:00am EDT

Scripting Myself Out of a Job - Automating the Penetration Test with APT2
The review board likes submissions that include references to prior works and research you used in developing your presentation.
Every penetration test begins the same way. Run a NMAP scan, review the results, choose services to enumerate and attack, and perform post-exploitation pillaging. What was once a manual process is now automated!
Nearly every penetration test begins the same way; run a NMAP scan, review the results, choose interesting services to enumerate and attack, and perform post-exploitation activities. What was once a fairly time consuming manual process, is now automated!
Automated Penetration Testing Toolkit (APT2) is an extendable modular framework designed to automate common tasks performed during penetration testing. APT2 can chain data gathered from different modules together to build dynamic attack paths. Starting with a NMAP scan of the target environment, discovered ports and services become triggers for the various modules which in turn can fire additional triggers. Have FTP, Telnet, or SSH? APT2 will attempt common authentication. Have SMB? APT2 determines what OS and looks for shares and other information. Modules include everything from enumeration, scanning, brute forcing, and even integration with Metasploit. Come check out how APT2 will save you time on every engagement.

Speakers
avatar for Adam Compton

Adam Compton

Principal Security Consultant, TrustedSec
Adam Compton has been a programmer, researcher, instructor, professional pentester, father, husband, and farmer. Adam has over 2 decades of programming, network security, incident response, security assessment, and penetration testing experience. Throughout Adam's career, he has worked... Read More →


Friday May 20, 2016 10:00am - 11:00am EDT
Scruffy City Hall 32 Market Square, Knoxville, TN 37902

11:00am EDT

Hack Yourself: Building A Test Lab
We all want to improve our skill sets, right? Reading is great, but there is no experience like actually 'doing it'. In this module, we will discuss how to build your own hacking lab from the ground up, for next to no cost. We will also discuss the various free penetration testing distributions, as well as the intentionally vulnerable virtual machines you can practice anything on from phishing, to web app testing, to exploits, and more.

Speakers
DB

David Boyd

Security Analyst, Contextual Security Solutions


Friday May 20, 2016 11:00am - 12:00pm EDT
Scruffy City Hall 32 Market Square, Knoxville, TN 37902

2:00pm EDT

Forensics Impossible: Self-Destructing Thumb Drives
Many people do not understand that a USB thumb drive is a mini computer, capable of making decisions and reading and writing memory all on its own. Each drive has firmware responsible for implementing the responses to any read or write requests sent to it by a host computer. Forensic tools such as write blockers can prevent certain commands from being sent to the drive, but they have no impact at all on what the drive's firmware chooses to do. What if it chooses to erase everything if it isn't continuously sent a special sequence of commands that only the user knows?
In this talk, I will demonstrate (through code only, no hardware tinkering) how to modify the firmware on a standard USB thumb drive to erase everything (including itself) if custom software isn't running on the PC that the drive is plugged into.

Speakers
avatar for Brandon Wilson

Brandon Wilson

Brandon Wilson is an East Tennessee State University graduate, software developer, application security consultant, and hacker of random things like game consoles and TI graphing calculators. An avid tinkerer of anything USB-related, he has spoken at DerbyCon about BadUSB and appeared... Read More →



Friday May 20, 2016 2:00pm - 3:00pm EDT
Scruffy City Hall 32 Market Square, Knoxville, TN 37902

3:00pm EDT

Level Up! - Practical Windows Privilege Escalation
For attackers, obtaining access to a Windows workstation with limited privileges can really put a damper on your day. Low privileged access can be a roadblock for even the most skilled "undocumented administrators". Local administrator access to a windows machine within an active directory domain often results in the ability to compromise the whole domain. This talk will walk through how attackers and defenders can learn to identify and exploit practical Windows privilege escalation vectors on the Windows 7 OS.

Speakers

Friday May 20, 2016 3:00pm - 4:00pm EDT
Scruffy City Hall 32 Market Square, Knoxville, TN 37902

4:00pm EDT

The Joy of Sandbox Mitigations
When researchers think of Microsoft Windows process mitigations they’re likely to come up with DEP and ASLR. However Microsoft has been adding a number lesser known mitigations ranging from blocking Win32k system calls to reducing a sandbox’s attack surface which already assume RCE has been achieved. This presentation will describe the implementation of these less well known mitigations, some silly bypasses and bugs in their implementations as well as how you can use them in real world code to improve the security of your own applications.

Speakers
avatar for James

James

James is a security researcher in Google’s Project Zero. He has been involved with computer hardware and software security for over 10 years looking at a range of different platforms and applications. With a great interest in logical vulnerabilities he’s been listed as the #1... Read More →


Friday May 20, 2016 4:00pm - 5:00pm EDT
Scruffy City Hall 32 Market Square, Knoxville, TN 37902

5:00pm EDT

The Best Campfire Tales that Reverse Engineers Tell
At a conference, I don't much give a damn what the target was or how big the pwnage was; I watch talks for the clever tricks that the presenters used to get their results. This lecture is just the best tricks from a dozen or more projects, the techniques that we reverse engineers share over drinks and next to campfires.

So gather round, children, and I'll teach you how to distinguish code and data pointers at a glance on the Thumb architecture. I'll teach you how easy it is to write an X86 bootloader, and ways to write an exploit blind, without already having the code of your target. Some of these tricks are easy, some of them are advanced, but all of them are clever and one or two just might be the missing piece to your next reverse engineering project.

Speakers
avatar for Travis Goodspeed

Travis Goodspeed

Travis Goodspeed is ecstatic to live in Knoxville again, where he drives an Ectomobile and a '64 Studebaker.  He collects reverse engineering tricks.


Friday May 20, 2016 5:00pm - 6:00pm EDT
Scruffy City Hall 32 Market Square, Knoxville, TN 37902
 
Filter sessions
Apply filters to sessions.