| 
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • Finally, you can manage your Google Docs, uploads, and email attachments (plus Dropbox and Slack files) in one convenient place. Claim a free account, and in less than 2 minutes, Dokkio (from the makers of PBworks) can automatically organize your content for you.

View
 

BeaConSchedule

Page history last edited by Zach Lanier 6 years, 9 months ago

11:00 - BeaCon opens; intro

11:30 - Dan Crowley - Application-level Denial of Service

12:30 Oliver Day - Guerrilla Techniques in Website Defense

12:45 - Paul Drapeau - Steganography in Commonly Used HF Protocols

13:45 - Brent Dukes - Reverse Engineering Unknown Communication Protocols

14:15 - Andrew Murray - SCADA Systems 101

14:45 - TBA

15:45 - Ben Jackson - Running a non-attributable honeypot system via fly by night VPS providers

16:30 - Michael Coppola - Performing Open Heart Surgery on a Furby

17:30 - StoopCon

18:00 - Outro; BeaCon ends 

 


Michael Coppola - Performing Open Heart Surgery on a Furby 

This talk will dive into the world of hardware hacking, as applied to the satanic toy known only as the Furby. We'll discuss various techniques to reverse engineer and instrument the hardware, including identifying unknown chips, dumping memory, sniffing data buses, and boiling chips in corrosive acid.

 

Michael Coppola is a vulnerability researcher working at a defense contractor, as well as an undergraduate student at Northeastern University. His main interests include Linux kernel exploitation and rootkit development, embedded systems, and burning things with a soldering iron. He has been known to hack unsuspecting Androids and bathroom scales.

 

Dan Crowley - Application-level Denial of Service

While traffic flooding attacks are generally what come to mind when one hears the term "Denial of Service", this is only a very small slice of attacks on availability. Traffic flooding is so often used and so popular because there is never a way to fully protect against it, only ways to reduce its usefulness. To borrow a quote: "Brute force always works. If it doesn't work, you're not using enough." However, traffic flooding attacks are a war of attrition. It all comes down to whoever has the most resources.

 

The more interesting attacks on availability are asymmetric; that is, one person with one 28.8k dialup connection can take down an entire web server. What's more, some of these attacks can be very difficult to block using technologies like WAF and IPS, because they look like completely normal traffic. This talk will discuss various asymmetric denial of service attacks from the historical to the modern to provide a broader understanding of how attacks on availability can be achieved.

 

Daniel (aka "unicornFurnace") is a Senior Security Consultant for Trustwave's SpiderLabs team. Daniel denies all allegations regarding unicorn smuggling and questions your character for even suggesting it. Daniel has developed configurable testbeds such as SQLol and XMLmao for training and research regarding specific vulnerabilities. Daniel enjoys climbing large rocks. Daniel has been working in the information security industry since 2004 and is a frequent speaker at conferences including Black Hat, DEF CON, Shmoocon, and SOURCE. Daniel does his own charcuterie.Daniel has won assorted CTF events and locksport competitions. Daniel is covered in BEEEEEEEEES. Daniel also holds the title of Baron in the micronation of Sealand and writes in the third person. 

 

Oliver Day - Guerrilla Techniques in Website Defense

Defending websites has become more difficult as advance tools have proliferated in the underground markets. Organizations that are too small to afford IT staff, let alone security staff, are outgunned and have little chance at keeping attackers out. This talk describes a new strategy in web defense that focuses on cheap and fast recovery of web site attacks. We will discuss automated backup and detection strategies that assume the attacker can and will compromise an account that allows them to write files to the web

 

Oliver Day is an information security professional and has consulted for many Fortune 100 companies in the last ten years. He has developed security audits to detect vulnerabilities in computers remotely, performed penetration tests, and architected security through analysis of engineering designs. His information security pedigree includes tenure at companies such as eEye Digital Security, @stake, Symantec, Rapid7, StopBadware and Akamai.

 

Oliver is also deeply fascinated by urban farming and has a thriving herb garden. He likes to study the applications of biostatistics and epidemiological models to predict the spread of computer disease. He is also an avid student of Mandarin and international relations issues in Asia. He lives with one very happy and slightly chubby cat.

 

Paul Drapeau - Steganography in Commonly Used HF Protocols

A discussion on challenges and opportunities for steganography in amateur radio "sound card" digital modes. I will present a proof of concept steganography implementation in the JT65 HF amateur radio

protocol as a long distance, low infrastructure, covert channel and discuss potential detection techniques. No actual radio signals or messages encoded for the purpose of obscuring their meaning." were

emitted in the making of this presentation.

 

Paul Drapeau (@pdogg77) is currently the Principal Security Researcher for Confer Technologies Inc. He has held an amateur radio license since 1986. Paul has a collection of so many funny hats he can't decide which one to wear during this talk, as Zach has requested.

 

Brent Dukes - Reverse Engineering Unknown Communication Protocols

Reverse engineering unknown communication protocols is a common and often necessary task for malware analysis and hardware hacking. This skill is especially vital when the software/firmware producing the messages is unavailable for analysis, or will create an unnecessary burden of effort. Although many protocols rely primarily on plain text style commands, these protocols are becoming increasingly complex as they are stuffed with more and more binary data. In this talk, I will explore some proprietary protocols encountered over IP, radio communications, USB, and SPI and I2C busses, and examine some of the methods for reverse engineering them. In addition to demonstrating a manual method for reverse engineering, I will present the strengths and weaknesses of common automation practices laid out in whitepapers that outline the many steps of the process. Finally, we will examine one of the few open source tools available to assist a hacker in this reverse engineering process, exploring its features (or lack thereof), and end in a call to action to create an even better tool.

 

Brent Dukes (@thedukezip) is an engineer by day and hacker by night. He finds strange pleasure in hacking consumer electronics to make them do things they're not supposed to. When he emerges from his secret laboratory he can also be found glued to his laptop, competing in CTFs.

 

Ben Jackson - Running a non-attributable honeypot system via fly by night VPS providers

Ben will talk about cheap VPS providers and how they make great homes for honeypots in which you can monitor the ankle biters that poke at your network day in and day out. 

 

Ben spends his time enjoying being a husband, dad, and messing around with anything that has a button on it. He was the author for "Asterisk Hacking" from Syngress, has spoken at various conferences, and has appeared on various media outlets discussing security and privacy. Ben strongly dislikes Thursdays and writing about himself in the third person.

  

Andrew Murray - SCADA Systems 101

What is SCADA? Why is it used? Who still communicates at 9600 baud? This presentation aims to provide an overview on SCADA and other industrial control systems with an emphasis on electric utility systems. We will discuss traditional systems as well as newer technologies and implementations. Topics will include typical system components; network topologies; protocols as well as systems security.

 

Andrew Murray is an electric power engineering consultant working with large utilities and municipal electric departments throughout New England and New York. He has over 15 years experience in the design and implementation of SCADA systems. In recent years Mr. Murray has also been focusing on SCADA security, including training from the Dept. of Homeland Security’s ICS-CERT group.

 

 

Comments (0)

You don't have permission to comment on this page.