Loading…
BruCON 0x0B has ended
Talk [clear filter]
Thursday, October 10
 

09:45 CEST

BruCON Opening
Thursday October 10, 2019 09:45 - 10:00 CEST
01. Westvleteren University

10:00 CEST

Why isn't infosec working? Did you turn it off and back on again?
My name is Rob Fuller, I've been around a bit, not as long as some but longer than others. From the US military to government contracting, consulting, large companies, tiny startups and silicon valley behemoths, from podcasting to television, I've had a storied and humbling career in infosec. Let’s get past complaining about blinky lights and users. Let’s talk about what actually works and what doesn't.

Speakers
avatar for Rob Fuller

Rob Fuller

Rob has over 14 years of experience covering all facets of information security. He has been behind the lines helping to design, build, and defend the US Marine Corps, US Senate, and Pentagon networks - as well as performing penetration tests and Red Team assessments against those... Read More →


Thursday October 10, 2019 10:00 - 11:00 CEST
01. Westvleteren University

11:00 CEST

Security transition from 4G to 5G: are we secure enough?
5G raises the security bar a level above 4G. Although IMSI exposure is prevented in 5G, we found new vulnerabilities to attack devices and subscribers.

In this talk we expose a set of vulnerabilities in the 5G/4G protocols that are found in network operators equipment and also consumer devices such as phones, routers, latest IoT sensors, and even car modems. Our vulnerabilities affect several commercial applications and use cases that are active in 4G networks and are expected to take off in 5G networks.

We developed automated tools to exploit the exposed cellular information and share some of our research traces and data sets to the community. We demonstrate a new class of hijacking, bidding down and battery draining attacks using low cost hardware and software tools.

We did a rigorous testing worldwide to estimate the number of affected base stations and are surprised by the results. Finally our interactions with various vendors and standard bodies and easy fixes to prevent our attacks are discussed.

Speakers
avatar for Altaf Shaik

Altaf Shaik

Altaf Shaik is a principal security researcher at Kaitiaki Labs and currently pursuing PhD at the Technical University of Berlin. He is experienced in analyzing cellular network technologies from radio to networking protocol layers. His recent renowned research includes low-cost 4G... Read More →
avatar for Ravishankar Borgaonkar

Ravishankar Borgaonkar

Dr. Ravishankar Borgaonkar works as a research scientist at Sintef Digital and undertakes research in securing next generation digital communication. His primary research themes are related to mobile telecommunication and involved security threats. This ranges from 2G/3G/4G/5G network... Read More →


Thursday October 10, 2019 11:00 - 12:00 CEST
01. Westvleteren University

12:00 CEST

A hackers view to the upcoming ISO/SAE 21434
ISO/SAE 21434 "Road vehicles – Cybersecurity engineering"

The automotive industry is currently working with the ISO and SAE standardization bodies to make a standard for automotive cyber security, expected to be released in 2020. After all, simply putting sometimes numerous wireless connectivity devices (e.g., GSM/3G/LTE, bluetooth, tire pressure sensors, ...) into a vehicle has again and again turned out to be a playground for attackers, and can haunt both customers and manufacturers in the long run.

This talk will give an overview of the key elements in the draft, and how they play together to minimize the risk of getting pwned while driving 250 km/h on the Autobahn. I will focus on the technical mechanisms as the point-of-view, and how they are usually embodied in a modern car. This will include signed software updates, authenticated CAN bus messages and secure gateways, just to name a few.

Speakers
avatar for Martin Schmiedecker

Martin Schmiedecker

Martin Schmiedecker works as a security consultant during the day, teaches lectures at TU Wien on security & privacy by night. Court certified expert witness, and member of @c3wien. @Fr333k on Twitter.


Thursday October 10, 2019 12:00 - 13:00 CEST
01. Westvleteren University

14:00 CEST

Cloud SIEM: What happened and what’s next?
The successful fusion of cloud native SIEM and AI is a watershed moment in cybersecurity that many are yet to fully grasp. For those organizations tainted by past on-premise SIEM experiences and burdened by promises unfulfilled, cloud SIEM ushers in the dream of real-time threat discovery and mitigation at a cost both the CFO and CISO find compelling.

Cloud SIEM is a watershed moment not because of the realization of its integrated technologies, but for the changes it will affect on operational security teams and risk management processes far into the future.
Being able to preemptively identify and categorize an attack in motion before it escalates, and being able to proactively disarm or neuter that attack before evolving into a viable threat, is well within the grasp of first-generation cloud SIEM. What happens next for cloud SIEM?

This session examines the role of “Threat Hunters” and security analysts when incident identification and response becomes just another API, how SecDevOps will embrace cloud SIEM and spearhead threat response, where and when AI will inevitably have to cede expertise to in-house experts, and how an ROI for enterprise security just landed on the CISO’s lap.

Speakers
avatar for Gunter Ollmann

Gunter Ollmann

Gunter Ollmann serves as Chief Security Officer (CSO) and helps drive the cross-pillar strategy for the Cloud and AI Security groups at Microsoft. He has over three decades of information security experience in an array of cyber security consulting and research roles. Before joining... Read More →


Thursday October 10, 2019 14:00 - 15:00 CEST
01. Westvleteren University

15:00 CEST

I'm unique, just like you: Human side-channels and their implications for security and privacy
Almost everything about us – our handwriting, DNA, faces, voices, fingerprints, even our eyes – can be used to distinguish us from the seven billion other people on the planet. These physical identifiers can allow law enforcement to trace back real-world crimes to offenders, and enable biometric authentication mechanisms. However, such identifiers are often irrelevant when it comes to attempting to track or disrupt threat actors.

In this talk, I will discuss, explore, and explain identifiers which are unintentional, non-physical, and generated as a result of human behaviours and activities, but which can still be used to uniquely identify and/or track individual users in the digital realm. I call these identifiers "human side-channels", and will explore how they work; how they can be used for both attack and defence; and how they can be countered.

I'll examine three human side-channels in particular: forensic linguistics; behavioural signatures; and cultural references. I will start by exploring the theories underpinning these side-channels, which are rooted in personality psychology and the concepts of consistency and distinctiveness as a result of our unique experiences, training, and feedback. I'll then explore how they work; walk through case studies and examples/demos of using them practically in security contexts; and discuss how they could be practically applied to investigate and track threat actors, in situations ranging from hostile social media profiles to post-compromise exfiltration and privilege escalation.

I'll also examine the privacy implications of each technique, and how such characteristics – which are much harder to recognise, obfuscate, or spoof – could be used to erode privacy. I'll go into detail regarding possible countermeasures to disguise your own human side-channels, and I'll wrap up by outlining some ideas for future research in these areas.

Speakers
avatar for Matt Wixey

Matt Wixey

Matt leads technical research for the PwC Cyber Security practice in the UK and is a PhD candidate at University College London. Prior to joining PwC, Matt led a technical R&D team for a law enforcement agency in the UK. His research interests include antivirus and sandboxing technologies... Read More →


Thursday October 10, 2019 15:00 - 16:00 CEST
01. Westvleteren University

16:30 CEST

Catching WMI lateral movement in an enterprise network
Soc analysts face a tough job every day to keep their detection capabilities up with  latest vulnerabilities and threats.
What to start looking for? Where in the network? What about risk of False positives? How frustrating if we missed an attack!

It’s not just about catching the latest, though. For example Windows management instrumentation (WMI). It ’s built right into Windows for years and has become more and more prevalent to attackers. Many administrators and attacker’s love WMI.
Much can be found on its use, however very little seems to be documented on how to detect it on a network level. We gave it a shot.

In this talk, we will have a quick overview on Windows management instrumentation (WMI), our first naive approach to detect it’s usage, the challenges we faced, lessons learned and results.

Part of the results are custom IDS (snort) fingerprints, with some tweaking, could fit your environment. As next step we would like to share it with you. So let’s improve together!

Speakers
avatar for Jaco Blokker

Jaco Blokker

Educated as chemical engineer and witnessed a huge explosion at a chemical plant on the last day at his internship 23 years ago,  Blokker opted for a more secure life within KPN’s ISP’s operational and development teams as system administrator and security officer.  Six years... Read More →


Thursday October 10, 2019 16:30 - 17:30 CEST
01. Westvleteren University

17:30 CEST

Automated adversary emulation using Caldera
MITRE ATT&CK is quickly gaining traction and is becoming an important standard to use to assess the overall cyber security posture of an organization. Tools like ATT&CK Navigator and Caldera facilitate corporate adoption and allow for a holistic overview on attack techniques and how organizations are preventing and detecting them. Furthermore, many vendors, technologies and open-source initiatives are aligning with ATT&CK. Some more information on Caldera from the official documentation (https://github.com/mitre/caldera):

"CALDERA is an automated adversary emulation system that performs post-compromise adversarial behaviour within Windows Enterprise networks. It generates plans during operation using a planning system and a pre-configured adversary model based on the Adversarial Tactics, Techniques & Common Knowledge (ATT&CK™) project. These features allow CALDERA to dynamically operate over a set of systems using variable behaviour, which better represents how human adversaries perform operations than systems that follow prescribed sequences of actions."

MITRE recently released Caldera 2.0 (end of April 2019), which includes a larger focus on "extendibility". During this talk, we will leverage these features for maximum effect. We will highlight some interesting improvement opportunities in Caldera and we will focus on how we developed additional plugins & features. To make this a bit more concrete:

-How can we improve Caldera's reporting engine? (It's currently not possible to get an easy ATT&CK coverage report / deliverable out of the tool). This is of great use if we want to increase usability of the tool and ATT&CK overall!
-How can we build additional plugins for MITRE Caldera to increase the ATT&CK coverage of the tool?
-How can we adapt Caldera to work around common security controls in place at organizations (e.g. Windows 10 security features such as ExploitGuard and AMSI, which hinder Caldera's PowerShell scripting).

This talk will arm infosec professionals with the required skills to further extend their adversary emulation options without breaking the bank for a commercial tool! As our main focus is to increase Caldera adoption and help the community, we will also publicly release developed plugins!

We will go into the nitty-gritty details of our development efforts and will also include several technical demo's that will help transfer knowledge to the audience and encourage their own development efforts!

Note that this is currently work-in-progress, thus the paper that was added to this submission covers what we set out to do, but not the full result. It is in fact the internal NVISO R&D charter that was approved to start our development activities.

It is worth mentioning that the task set out is feasible and we have already successfully adapted our own internal Caldera with additional functionality (e.g. the AMSI bypass was implemented). We are now working on further optimising, stabilising and documenting our work!

We will be able to provide additional details on our results and status around summer time.

Speakers
avatar for Erik Van Buggenhout

Erik Van Buggenhout

Erik has built 10+ years of experience in cyber security topics. Initially focused on penetration testing and red teaming he pivoted to the blue side of things a few years back. His current main focus is on adversary emulation, with the ultimate goal of improving how organisations... Read More →


Thursday October 10, 2019 17:30 - 18:30 CEST
01. Westvleteren University
 
Friday, October 11
 

10:00 CEST

It takes a village..
It takes a village... is a discussion about the challenges we face building security teams and strategies to alleviate our hiring bottlenecks. In a field riddled with unconscious bias, the community must work together to explore alternative recruiting strategies, expand hunting grounds for talent, and actively seek out folks with varied backgrounds and experiences who bring fresh perspectives to our projects and teams. Kimber will discuss mentorship programs and how to retain talent through professional development. She'll also provide some tips for jobseekers who've had a non-traditional path to security and ways to improve visibility and marketability to recruiters and potential employers. Whether searching for talent or seeking new opportunities, the landscape is rapidly changing and the security industry needs new approaches to recruiting and hiring if we're going to Secure All The Things™. 



Speakers
avatar for Kimber Dowsett

Kimber Dowsett

Kimber Dowsett is the Director of Security Engineering at Truss, a software infrastructure consulting firm based out of San Francisco, California. She joined Truss after serving at 18F, an office of U.S. federal employees that collaborates with other agencies to improve how government... Read More →


Friday October 11, 2019 10:00 - 11:00 CEST
01. Westvleteren University

11:00 CEST

Defeating Bluetooth Low Energy 5 PRNG for fun and jamming
Bluetooth Low energy version 5 has been published in late 2016, but we still have
no sniffer supporting this specific version (and not that much compatible devices
as well). The problem is this new version introduces a new channel hopping algorithm
that renders previous sniffing tools useless as devices can no longer be attacked
and connections analyzed. This new algorithm is based on a brand new pseudo-random
number generator (PRNG) to provide better collision avoidance while kicking out
all of our good old sniffing tools.

Unless some random hacker manages to break this not-that-strong PRNG and upgrades
his BLE sniffing tool to support this algorithm ;). In this talk, we will explain
why this PRNG is vulnerable and how it can be easily defeated to sniff and jam
communications between two BLE 5 devices. A new version of BtleJack will be
released during this talk, providing an efficient way to sniff BLE 5 connections
to our fellow IoT hacker family.

Speakers
avatar for Damien Cauquil

Damien Cauquil

Damien is a senior security researcher who joined Digital Security in 2015 asthe head of research and development. He discovered how wireless protocols canbe fun to hack and quickly developed BtleJuice, one of the first Bluetooth LowEnergy MitM framework, and BtleJack, a BLE swiss-army... Read More →


Friday October 11, 2019 11:00 - 12:00 CEST
01. Westvleteren University

12:00 CEST

Weaknesses in WPA3's Dragonfly Handshake
Recently we discovered weaknesses in the Dragonfly handshake of WPA3. But how serious are these issues in practice? In this presentation we will explain the attacks we discovered, and discuss whether they pose a practical risk or not.

In our research, we analysed the security of WPA3. This certification aims to secure Wi-Fi networks, and provides several advantages over its predecessor WPA2, such as protection against offline dictionary attacks and forward secrecy. Unfortunately, we show that WPA3 is affected by several design flaws. Most prominently, we show that WPA3's Dragonfly handshake is affected by password partitioning attacks. These attacks resemble dictionary attacks and allow an adversary to recover the password by abusing timing or cache-based side-channel leaks. Our side-channel attacks target the protocol's password encoding method. The resulting attacks are efficient and low cost: brute-forcing all 8-character lowercase password requires less than 125$ in Amazon EC2 instances. We also discuss backwards-compatible countermeasures against all attacks.

Although all attacks can be mitigated with software changes, our conclusion is that WPA3 does not meet the standards of a modern security protocol. Especially on devices with lightweight processors, vendors may not implement all the costly side-channel countermeasures. This would allow an adversary to perform dictionary attacks even when WPA3 is used.

Speakers
avatar for Mathy Vanhoef

Mathy Vanhoef

Mathy Vanhoef is a postdoctoral researcher at New York University Abu Dhabi. He is most well known for his KRACK attack against WPA2, and the RC4 NOMORE attack against RC4. His research interest is in computer security with a focus on network security, wireless security (e.g., Wi-Fi... Read More →


Friday October 11, 2019 12:00 - 13:00 CEST
01. Westvleteren University

14:00 CEST

Incident response in the cloud: foggy with a ray of sunshine
Over the past few years we have seen organizations move a part of, or even their entire infrastructure to the cloud. With on-premise infrastructure it used to be clear that the security needed to be taken care of by the organization itself. With cloud infrastructure there is quite some confusion about who takes care of which security controls. This confusion has led to several painful incident response cases where we were called in only to discover we hardly had any data to work with. In general, we observe 3 common problems with incident response in the cloud:

1. Lack of knowledge about the different logging options within cloud environments. What is enabled by default and what is not?
2. Increased response times due to the lack of visibility and security knowledge about the cloud environments.
3. Lack of resources available to respond to the incidents, most organizations are not capable due to the limited amount of people and tools to respond timely.

This presentation consists of three key parts highlighting incident response challenges in the cloud, but also how we can purposely use what cloud providers offer us to improve our security operations.

The first section includes some key examples of what went wrong during incidents in cloud environments and lists some key challenges that we face as an incident response team to investigate security incidents in depth.

A second section in the presentation describes the overview of critical logs that are required to do incident response. These logs and settings are mapped on the 2 main cloud providers; Amazon AWS and Microsoft Azure. This will allow you to understand which logs are there by default and which logs should be activated for incident response and forensic investigations.

A 3rd section will introduce automated response, by explaining a use case were a system gets infected, server-less code will be executed to protect other systems and enable advanced analytics on the compromised system. This example is based on Microsoft Azure Security Center and applogic to enforce actions in case a specific alert is triggered.

Speakers
avatar for Jeroen Vandeleur

Jeroen Vandeleur

Jeroen is the security architecture team lead and incident manager at NVISO where he specializes in security architecture, cloud security, and continuous security monitoring. By using his pragmatic and analytical skills, Jeroen assists clients in solving day-to-day security issues... Read More →


Friday October 11, 2019 14:00 - 15:00 CEST
01. Westvleteren University

15:00 CEST

Atomic Threat Coverage: being Threat Centric
We will present our project — Atomic Threat Coverage framework (https://github.com/krakow2600/atomic-threat-coverage), which allows to automatically generate actionable analytics, designed to combat threats (based on the MITRE ATT&CK adversary model) from Detection, Response, Mitigation and Simulation perspectives. This way Atomic Threat Coverage represents a Core of Security Operations Center, creating analytics database with all entities, mapped to all meaningful, actionable metrics, ready to use, ready to share and show to leadership, customers and colleagues.

There are plenty decent projects that provide analytics (or functionality) to counter cyberthreats (Sigma, Atomic Red Team, MITRE CAR). All of them have one weakness — they exist in the vacuum of their area. In reality everything is tightly connected: data for alerts doesn't come from nowhere, and generated alerts don't go nowhere. Data collection, security systems administration, threat detection, incident response etc are parts of bigger and more comprehensive process which requires close collaboration of various departments.

Sometimes problems of one function could be solved by methods of other function in a cheaper, simpler and more efficient way. Most of the tasks couldn't be solved by one function at all. Each function is based on abilities and quality of others. There is no efficient way to detect and respond to threats without proper data collection and enrichment. There is no efficient way to respond to threats without understanding of which technologies/systems/measures could be used to block specific threat. There is no reason to conduct penetration test or Red Team exercise without understanding of abilities of processes, systems and personal to combat cyber threats. All of these require tight collaboration and mutual understanding of multiple departments.

In practice there are difficulties in collaboration due to:

- Absence of common threat model/classification, common terminology and language to describe threats
- Absence common goals understanding
- Absence of simple and straightforward way to explain specific requirements
- Difference in competence level (from both depth and areas perspectives)

That's why we decided to create Atomic Threat Coverage — project which connects different functions/processes under unified Threat Centric methodology (Lockheed Martin Intelligence Driven Defense® aka MITRE Threat-based Security), threat model (MITRE ATT&CK) and provide security teams an efficient tool for collaboration on one main challenge — combating threats.

Speakers
avatar for Daniil Yugoslavskiy

Daniil Yugoslavskiy

Daniil is responsible for Threat Detection in Cindicator Security Operations Center (SOC) in Saint Petersburg, Russia. Before that, he was leading Threat Detection team at Tieto SOC in Czech Republic. Daniil spent more than six years in Practical Computer Security and Network Monitoring... Read More →
avatar for Mateusz Wydra

Mateusz Wydra

Mateusz is a former Threat Detection specialist and currently works as Incident Responder in Tieto SOC in Poland, Krakow. Before Tieto, he was working for Cisco SOC as a Security Analyst. He holds GIAC Certified Forensic Analyst (GCFA) and CCNA Cyber Ops certifications and is a member... Read More →


Friday October 11, 2019 15:00 - 16:00 CEST
01. Westvleteren University

16:30 CEST

Internet-Scale analysis of AWS Cognito Security
This talk will show the results of an internet-scale analysis of the security of AWS Cognito configurations. During this research it was possible to identify 2500 identity pools, which were used to gain access to more than 13000 S3 buckets (which are not publicly exposed), 1200 DynamoDB tables and 1500 Lambda functions.

The talk starts with an introduction to the AWS Cognito service and how it can be configured by the developers to give end-users direct access to AWS resources such as S3 and DynamoDB. Access is restricted by IAM policies which are under the developer's control and, in many cases, do not follow the least privilege principle.

The configuration weakness is first explained step by step for a specific AWS account and Cognito identity pool using a series of demos, the same concepts are then automated to perform an internet-scale analysis of AWS Cognito configurations.

Because Cognito identity pool IDs are UUID4 it was necessary to download thousands of APKs from the Google Play store, decompile them and extract the identifiers. Other sources such as Common Crawl were also used to identify valid identifiers. The tools used to perform these tasks will be made public.

Each Cognito identity pool that was configured with an unauthenticated role was analyzed using an in-depth permission brute-force tool that identifies potential breaches to least privilege principle.

The talk ends with recommendations for developers that want to configure the service in a secure manner, and an analysis of potential reasons for this widespread issue such as poor documentation and examples on AWS site

Speakers
avatar for Andres Riancho

Andres Riancho

Andrés Riancho is an application and cloud security expert that leads the open source w3af project, and provides high-quality security assessment services to companies around the world.In the research field, he identified new techniques which can be used to escalate privileges in... Read More →


Friday October 11, 2019 16:30 - 17:30 CEST
01. Westvleteren University

17:30 CEST

Tales from professional thieves
We will be bringing our combined decades of experience to teach the most common and effective physical security bypasses we use to enter commercial buildings and combine every technique with a war story. The last ~20m will just be our most enthralling stories from physical security engagements we've performed including some hilarious failures and how we social-engineered our way out of them.

Speakers
avatar for Dan McInerney

Dan McInerney

 Dan McInerney is a senior pentester and security researcher, former BlackHat instructor and owner of a top 100 Python Github account stuffed with pentesting tools. Justin Wynn is a senior pentester and physical security expert who has broken into everything from heavily guarded... Read More →
avatar for Justin Wynn

Justin Wynn

Justin Wynn is a senior pentester and physical security expert who has broken into everything from heavily guarded New York skyscrapers to national bank headquarters as well as pioneered efforts in 3d printing working master keys.


Friday October 11, 2019 17:30 - 18:30 CEST
01. Westvleteren University

18:30 CEST

BruCON Closing
Friday October 11, 2019 18:30 - 18:45 CEST
01. Westvleteren University
 
Filter sessions
Apply filters to sessions.