Visualize your threats - Philipp Krenn
Knowing what is going on in your environment is an important part of staying on top of security issues. But how do you capture relevant metrics and visualize them? One widely-used, open source tool for that job is the Elastic Stack, formerly known as the ELK stack. This talk shows how to ingest relevant metrics from your network and hosts as well as how to easily visualize them to find suspicious patterns and behaviors.
The modern SOC: Adapting the Security Operations model to how we work - Josh Pyorre
Security Operations Centers are a central place where security incidents flow through in an organization, using technologies and ideas such as IDS, IPS, network flow monitoring, threat analysis and incident response to protect and secure an environment. However, the SOC of today is often out of date and out of touch with how we use our machines and data. This is an exploration of techniques for improving the process, with actual real-world examples that anyone can apply without relying on vendors.
When your firewall turns against you - Rene Freingruber and Raschin Tavakoli
This talk will demonstrate how attackers can compromise a company’s network via their firewall system. It’s a common misbelieve that security tools are always secure. The aim of this talk is to show the audience the difference between a secure and a security product. First we discuss how we can remotely detect and identify the firewall system within the target internal network. After that we start a brute-force attack from the internet via the victim’s browser against the internal firewall. We will show how an attacker can bypass different used CSRF protections to trigger actions on the firewall system. Finally, we are going to exploit a memory corruption bug (type confusion bug which leads to a use after free vulnerability) in the PHP binary on the firewall to spawn a reverse root shell.
Exploiting First Hop Protocols to Own the Network - Paul Coggin
This talk will focus on how to exploit a network by targeting the various first hop protocols. Attack vectors for crafting custom packets as well a few of the available tools for layer 2 network protocols exploitation will be covered. Defensive mitigations and recommendations for adding secure visualization and instrumentation for layer 2 will be provided.
0xff and how it evolved - Aaron Kaplan
No abstract yet
The law of TLS breakage - Hanno Böck
Every imaginable TLS implementation fault can be found in the wild. The TLS ecosystem suffers from vendors not caring about the correct implementation of the protocol and not fixing bugs. This not only endangers users of the affected products, it often causes problems for the whole ecosystem and slows down progress. This has led to thoughs how the protocol can be designed to avoid implementation flaws. A particularly nasty implementation flaw is TLS version intolerance - servers that fail if a client tries to connect with a higher TLS version number. For TLS 1.3 the TLS working group is now trying a new approach. With a new version negotiation mechanism and GREASE they try to prevent future implementation flaws. The speaker will give an overview of the breakage in the TLS ecosystem and will also briefly explain an attack on GCM nonces he discovered earlier this year. He will also give some advice how other people can find similar TLS attacks.
The details of the investigation that resulted in the Mamba Ransomware discovery - Renato Marinho
In this talk I will present the details and challenges of handling an incident suffered by a large multinational company with subsidiaries in Brazil, India and the United States that resulted in the Mamba discovery, the first ransomware to use, in fact, the Full Disk Encryption strategy (FDE ). I’m going also to present the entire process of research, publication and collaboration with CERTs from various countries, SANS, research laboratories and international security products players.
Advanced SSH - Leyrer & MacLemon
Productivity and Security Tipps for SSH. Tips and tricks for a more efficient and more secure usage of ssh(d). We will touch on config file options, crypto settings, 2 factor authentication, ProxyCommands with bastion hosts, server key rotation and much more. SSH (Secure Shell) is a must have tool to remotely connect to servers for administrative purposes or file copying. Most users only use a tiny subset of the features modern OpenSSH versions offer. So will try to demonstrate some of the more ‘obscure’ but often very handy options you may not have looked into, yet.
Running a bug bounty - What you need to know - Shpend Kurtishaj
Having a bug bounty program is one of the most cost-effective and productive methods of finding security vulnerabilities today. Bug bounty programs provide substantial value in terms of findings, only require payment for valid results, and bring a level of depth via manual testing that goes beyond the capabilities scanners and other traditional pen-testing tools – often serving as a valuable complement to automated testing. But, as anyone who has tried to run a bug bounty program knows, it’s no simple or small undertaking… Coming from the unique position of being professionals who have helped to create and manage hundreds of bug bounty programs, we’re uniquely positioned to cover key bounty concepts, and provide advice on how to run a successful bug bounty program. Whether you’re already running a bug bounty program, looking to run a bug bounty program, or are a researcher who participates in programs, this talk aims to deepen your knowledge on the subject.
NoSQL means no security? - Philipp Krenn
New systems are always interesting targets since their security model couldn’t mature yet. NoSQL databases are no exception and had some lurid articles about their security, but how does their protection actually look like? We will take a look at three widely used systems and their unique approaches: Redis: Security through obscurity or how you can rename commands MongoDB: Widely lampooned for publicly accessible databases, it actually provides an elaborate authentication and authorization system, which we will cover from a historic perspective and putting an emphasis on the current state Elasticsearch: Groovy scripting has been a major headache, but the new, custom-built scripting language Painless tries to take the pain away literally.
Transport Layer Security beyond crypto – notary services and certificate pinning to the rescue? - Artemios Voyiatzis
The TLS protocol, X.509 digital certificate, and Certificate Authority (CA) are crucial components for realizing security and privacy in an appified IoT world. Edge devices (e.g., smartphones) often come with hundreds of CAs pre-installed, each being equally trusted to issue a certificate. For any URL. What can we do better? We focus on three aspects: that thousands of Android apps still fail to properly handle a TLS certificate; the effectiveness of certificate pinning considering the recent events of WoSign and Mozilla add-ons affecting Tor; and how TLS Notary Services can improve our standing, both in terms of usability and security.
Closing Track - Olaf Schwarz, Martin Schmiedecker, Christian Mehlmauer
Our closing talk