Travis Goodspeed talks about how, using the open source Facedancer framework, you can create user-space emulators for the Mass Storage, Human Interface, FTDI, and Device Firmware Update protocols in Python. Sockets function a little differently, and the protocols do not use ASCII, but the general principle of operation and libraries is no more complicated than in HTTP.
Continuous deployment (Continuous Deployment) helps to avoid long development cycles, because of which developers often do not pay enough attention to the safety of their product. When properly applied, this method can change the software life cycle and turn the team of security personnel from the incident response team into an internal security consulting service that developers can access.
Collecting and analyzing publicly available information about the target (Open Source Inteligence, or OSINT) is a mandatory step in the modern penetration test. However, despite its importance, many skip this stage and immediately begin scanning for vulnerabilities. They make a mistake: collecting information about systems and personnel in the field of testing often plays a crucial role in security audits, and is also a critical factor in the success of an audit using social engineering techniques.
Today, any modern browser can recognize potentially dangerous web pages that require attention (requests to download a file, install a software module, issue privileges to third-party sites) and ask the user to explicitly confirm the operation in a separate window or in the notification panel. This increases the level of user protection, but notification mechanisms do not guarantee 100% security.
Mobile phone or RFID card can be tracked. Members of the OpenBeacon project, Jeff Katz and aestetix, will present their latest discoveries during their presentation, as well as a system that tracks the location of objects in real time. Presenters will demonstrate the visualization examples they created and show how an innocuous device easily turns into a powerful tool.
The report will look at the concept of an aggressive trap (“Defense can be rough”) and options for exploiting such a trap. The topics covered will include information on attacking, filtering and detecting manual attacks, determining the level of technical training of an attacker, and gaining control over the attacker.
“Five Nightmares for Telecom” - these are five stories about how to break into the operator’s network and launch an attack on packet services, gain control over the infrastructure, make money on VoIP or self-service portals. Some attacks have had precedents in the past, while some remain a fantasy, which, hopefully, will not become a reality.
The report of Vladimir Vorontsov, the founder, leader and leading expert of ONsec, is devoted to the analysis of the principles of the work of modern solutions to recognize attacks against Web applications (Web Application Firewalls). The author compares the main algorithms for detecting attacks, points out their advantages and disadvantages. Concrete examples of circumvention of protective mechanisms are given. The author of the report points out the need to identify a universal method of masking the attack vector through WAF for different algorithms.
The report will present the results of a system analysis of all zero-day vulnerabilities that were found in Java in 2012 and 2013 (CVE-2013-1493, CVE-2013-0431, CVE-2013-0422, CVE-2012-5076, CVE-2012 -4681, CVE-2012-1723, CVE-2012-1507). The purpose of the study is to identify patterns that indicate a common source or a common method for finding these vulnerabilities.
While others are looking for missing links in the evolution of cyber weapons, experts from Positive Technologies suggest looking into the near future, in which to create a ready-made worm for SCADA, you only need the latest version of Metasploit and a bit of VBScript programming skills.
In the technological world, physical security as a component of system security as a whole is often ignored, but it is no less important than timely installation of updates, correct password policies, and user rights. You may have the most secure servers and the most inaccessible network, but this does not help if someone gets direct access to the keyboard or, worse, steals your hardware.
Evader, introduced at Black Hat 2012, can be used to detect security vulnerabilities and implement penetration testing and security checks. Well-known information security specialist Olli-Pekka Niemi (Opi) will talk about the technical aspects of Evader’s work and how to use this program to bypass most of the modern security tools.
Did you know that many process control systems are controlled remotely and therefore can be detected on the Internet (for example, using the SHODAN search engine). Johan Click and Daniel Marcin created their own search engine, the SCADACS Search Engine (SSE), and are going to present a comparison of the first results obtained with the results of SHODAN.
Michel Osterhof (CISSP, CISM, CISA, GCIH) is the lead systems engineer of the RSA division of the EMC company dealing with information security. Any modern company invests heavily in the protection of information resources, brand, intellectual property. However, incidents still occur, because the attackers also do not spare money on developing the means and methods of conducting attacks. RSA knows this firsthand, because the company is constantly under the gun of the intruders.Source: https://habr.com/ru/post/179653/
All Articles