Speakers

More talks to be added shortly. 

  • 21 October
  • 22 October
jamesf.png
StripThumbnail-uk-flag.png

JAMES FORSHAW

The .NET Inter-Operability Operation

One of the best features of the .NET runtime is its in-built ability to call native code, whether that’s APIs exposed from dynamic libraries or remote COM objects. Adding this in-built functionality to a “type-safe” runtime has its drawbacks, not the least the introduction of security issues due to misuse. This presentation will go into depth on how the .NET runtime implements its various interop features, where the bodies are buried and how to use that to find issues ranging from novel code execution mechanisms, elevation of privilege up to remote code execution. The presentation will assume the attendee has some familiarity with .NET and how the runtime executes code.

JAMES FORSHAW BIO

James is a security researcher in Google’s Project Zero. He has been involved with computer hardware and software security for over 10 years looking at a range of different platforms and applications. With a great interest in logical vulnerabilities he’s been listed as the #1 researcher for MSRC, as well as being a Pwn2Own and Microsoft Mitigation Bypass bounty winner. He has spoken at a number of security conferences including Black Hat USA, CanSecWest, Bluehat, HITB, and Infiltrate.

noushin
au.png

NOUSHIN SHABAB

Spring Dragon APT- A Case Study Of Targeted Attacks on APAC Countries

n the beginning of 2017, Kaspersky Lab became aware of new activities by an APT actor we have been tracking for several years called Spring Dragon (also known as LotusBlossom).

Spring Dragon is a long running APT actor that operates on a massive scale. The group has been running campaigns, mostly in countries and territories around the South China Sea, since as early as 2012. The main targets of Spring Dragon attacks are high profile governmental organisations and political parties, education institutions such as universities, as well as companies from the telecommunications sector.

Spring Dragon is known for spear phishing and watering hole techniques. We collected a large set (600+) of malware samples used in different attacks, with customised C2 addresses and campaign codes hardcoded in the malware samples.

This presentation will focus on the evolution of Spring Dragon tools and dive into their TTPs (Techniques, Tactics and Procedures) to reveal the capabilities of this APT actor.

NOUSHIN SHABAB BIO

Noushin Shabab is a cyber security researcher based in Australia specialising in malware reverse engineering and targeted attack investigations. She joined Kaspersky Lab in 2016 as a Senior Security Researcher in Global Research & Analysis Team (GReAT). Her research focuses on the investigations of advanced cyber criminal activities and targeted attacks with primary focus on local threats in APAC region. Prior to joining Kaspersky Lab, Noushin also delved in malware analysis, security research and software development for a security software company overseas. She has first-hand knowledge of rootkit analysis and detection techniques as well as APT malware analysis. 

briang.jpg
jasiel.png
StripThumbnail-pirate-flag.png

ZDI TEAM

Leveraging VMware's RPC Interface for Fun and Profit

Virtual machines play a crucial role in modern computing. They often are used to isolate multiple customers with instances on the same physical server. Virtual machines are also used by researchers and security practitioners to isolate potentially harmful code for analysis and review. The assumption being made is that by running in a virtual machine, the potentially harmful code cannot execute anywhere else. However, this is not foolproof, as a vulnerability in the virtual machine hypervisor can give access to the entire system. While this was once thought of as just hypothetical, two separate demonstrations at Pwn2Own 2017 proved this exact scenario.

This talk details the host-to-guest communications within VMware. Additionally, the presentation covers the functionalities of the RPC interface. In this section of the presentation, we discuss the techniques that can be used to record or sniff the RPC requests sent from the Guest OS to the Host OS automatically. We also demonstrate how to write tools to query the RPC Interface in C++ and Python for fuzzing purposes.

Finally, we demonstrate how to exploit Use-After-Free vulnerabilities in VMware by walking through a patched vulnerability.

ZDI TEAM BIO

Brian Gorenc is the directory of Vulnerability Research with Trend Micro. In this role, Gorenc leads the Zero Day Initiative (ZDI) program, which represents the world's largest vendor-agnostic bug bounty program. His focus includes analyzing and performing root-cause analysis on hundreds of zero-day vulnerabilities submitted by ZDI researchers from around the world.
The ZDI works to expose and remediate weaknesses in the world's most popular software. Brian is also responsible for organizing the ever-popular Pwn2Own hacking competitions.

Jasiel Spelman is a vulnerability analyst and exploit developer for the Zero Day Initiative (ZDI) program. His primary role involves performing root cause analysis on ZDI submissions to determine exploitability, followed by developing exploits for accepted cases.
Prior to being part of ZDI, Jasiel was a member of the Digital Vaccine team where he wrote exploits for ZDI submissions, and helped develop the ReputationDV service from TippingPoint. Jasiel's focus started off in the networking world but then shifted to development until transitioning to security. He has a BA in Computer Science from the University of Texas at Austin. Twitter: @WanderingGlitch

Abdul-Aziz Hariri is a security researcher with the Zero Day Initiative program. In this role, Hariri analyzes and performs root-cause analysis on hundreds of vulnerabilities submitted to the Zero Day Initiative (ZDI) program, which is the world's largest vendor-agnostic bug bounty program. His focus includes performing root-cause analysis, fuzzing and exploit development. Prior to joining ZDI, Hariri worked as an independent security researcher and threat analyst for Morgan Stanley emergency response team.

During his time as an independent researcher, he was profiled by Wired magazine in their 2012 article, Portrait of a Full-Time Bug Hunter. In 2015, Abdul was part of the research team that submitted "Breaking Silent Mitigations - Gaining code execution on Isolated Heap and MemoryProtection hardened Internet Explorer" to the Microsoft bounty program. Their submission netted the highest payout to date from the Microsoft bounty program where the proceeds went to many STEM organizations. 

paulr
warrenm
StripThumbnail-us-flag.png

PAUL RASCAGNERES & WARREN MERCER

Modern Reconnaissance Phase by APT – Protection Layer

The Talos researchers are no stranger to APT attacks. During recent research, we observed how APT actors are evolving and how the reconnaissance phase is changing to protect their valuable 0-day exploit or malware frameworks. During the presentation, we will not speak about a specific malware actor but we will use various different cases to illustrate how the reconnaissance phase is becoming more important and more complex.

This talk will mainly focus on the usage of malicious documents (Microsoft Office and Hangul Word Processor) and watering hole attacks designed to establish if the target is the intended one. We will mention campaigns against political or military organizations targeting USA, Europa and Asia.

The techniques and the obfuscation put in place by these actors will be described in detail. We will explain how the Macros are used and how to desobfuscated them; how the JavaScript and the PowerShell are becoming unmissable languages and how to analyse these languages with standard debugger such as WinDBG; how APT actors includes Flash objects in document to bypass protection and perform reconnaissance on the target; finally, we will see how Python language is used by malware to execute code on MacOS. In some cases, the reconnaissance is performed directly by a first stage malware (PE32) and not directly by the infection vector, we will see an example of the approach that targeted South Korea public sectors at the end of December.

At the end of the presentation, we will show different mitigations in applications (for example in Microsoft Office and Hangul Word Processor) and in the Microsoft Windows Operating System to help attendees protect their constituents against the treats described during the talk. 

PAUL RASCAGNERES & WARREN MERCER BIO

Paul is a security researcher within Talos, Cisco’s threat intelligence and research organization. As a researcher, he performs investigations to identify new threats and presents his findings as publications and at international security conferences throughout the world. He has been involved in security research for 7 years, mainly focusing on malware analysis, malware hunting and more specially on Advanced Persistence Threat campaigns and rootkit capabilities. He previously worked for several incident response team within the private and public sectors. 

Warren Mercer joined Talos coming from a network security background, having previously worked for other vendors and the financial sector. Focusing on security research and threat intelligence, Warren finds himself in the deep, dark and dirty areas of the Internet and enjoys the thrill of the chase when it comes to tracking down new malware and the bad guys! Warren has spent time in various roles throughout his career, ranging from NOC engineer to leading teams of other passionate security engineers. Warren enjoys keeping up to speed with all the latest security trends, gadgets and gizmos; anything that makes his life easier in work helps!

balazs
HU

BALAZS BUCSAY

Trick or XFLTReaT a.k.a. Tunnel All the Things

This presentation will sum up how to do tunnelling with different protocols and will have different perspectives detailed. For example, companies are fighting hard to block exfiltration from their network: they use http(s) proxies, DLP, IPS technologies to protect their data, but are they protected against tunnelling? There are so many interesting questions to answer for users, abusers, companies and malware researchers. Mitigation and bypass techniques will be shown you during this presentation, which can be used to filter any tunnelling on your network or to bypass misconfigured filters.

Our new tool XFLTReaT is an open-source tunnelling framework that handles all the boring stuff and gives users the capability to take care of only the things that matter. It provides significant improvements over existing tools. From now on there is no need to write a new tunnel for each and every protocol or to deal with interfaces and routing. Any protocol can be converted to a module, which works in a plug-and-play fashion; authentication and encryption can be configured and customised on all traffic and it is also worth mentioning that the framework was designed to be easy to configure, use and develop. In case there is a need to send packets over ICMP type 0 or HTTPS TLS v1.2 with a special header, then this can be done in a matter of minutes, instead of developing a new tool from scratch. The potential use (or abuse) cases are plentiful, such as bypassing network restrictions of an ISP, the proxy of a workplace or obtaining Internet connectivity through bypassing captive portals in the middle of the Atlantic Ocean or at an altitude of 33000ft on an airplane.

This framework is not just a tool; it unites different technologies in the field of tunnelling. While we needed to use different tunnels and VPNs for different protocols in the past like OpenVPN for TCP and UDP, ptunnel for ICMP or iodined for DNS tunnelling, it changes now. After taking a look at these tools it was easy to see some commonality, all of them are doing the same things only the means of communication are different. We simplified the whole process and created a framework that is responsible for everything but the communication itself, we rethought the old way of tunnelling and tried to give something new to the community. After the initial setup the framework takes care of everything. With the check functionality we can even find out, which module can be used on the network, there is no need for any low-level packet fu and hassle. I guarantee that you won’t be disappointed with the tool and the talk, actually you will be richer with an open-source tool.

BALAZS BUCSAY BIO

Balazs Bucsay (@xoreipeip) is a Senior Security Consultant at NCC Group in the United Kingdom who does research and penetration testing for various companies. He has presented at many conferences around the world including Honolulu, Atlanta, London, Oslo, Moscow, and Vienna on multiple advanced topics relating to the Linux kernel, NFC and Windows security. Moreover he has multiple certifications (OSCE, OSCP, OSWP, GIAC GPEN) related to penetration testing, exploit writing and other low-level topics; and has degrees in Mathematics and Computer Science. Balazs thinks that sharing knowledge is one of the most important things in life, so he always shares his experience and knowledge with his colleagues and friends. Because of his passion of technology, he starts his second shift in the evenings, right after work to do further research.

jungeng
China.png

YANG JUNFENG (@BLUERUST)

How I Generically Bypassed CFG

Over the years, Microsoft has introduced many forms of exploit mitigation in an effort to drive up the costs of exploitation. In Windows 10, Microsoft introduced the control flow guard (CFG) mitigation, further increasing the difficulty of exploitation on the Windows platform. However, as history has shown, nothing is perfect. Even though CFG has already been around for some time and many researchers have contributed to improving CFG, subtle flaws still exist.

In this talk, I will present several amazing exploitation techniques which bypass CFG easily and generically, given a read/write primitive - something not uncommon in modern exploits. These techniques I will share can be applied to exploit various software such as Edge, IE, Adobe Reader, Flash and Microsoft Office. I will also share some exploitation tricks I have developed, some of which are novel enough to earn bounties with Microsoft's Mitigation Bypass programme.

YANG JUNFENG (@BLUERUST) BIO

Yang Junfeng is currently a staff researcher at DiDi Research America. He previously worked at NSFOCUS and FireEye as a vulnerability researcher. Junfeng has a keen interest in anything security and especially exploitation. He received a bounty from the Microsoft Mitigation Bypass programme for his contributions. ( Bounty Hunters: The Honour Roll https://technet.microsoft.com/en-us/security/dn469163.aspx )

VitalyKamluk 150x190 bw
russia

VITALY KAMLUK

Chasing Ghosts In The Wires

Kaspersky Lab research team has spent almost a year tracking an ellusive threat actor that was responsible for one of the biggest cyber heists in history: Bangladesh Central Bank attack, which resulted in $81 mln USD theft with initial target over $951 mln USD. Some time after Bangladesh incident, we discovered the attackers in few other unusual places around the world and interrupted their attempts to steal large amounts of money.

This talk will focus on advanced custom tools and smart techniques used during the attacks. Many of those tools and techniques rendered traditional incident response and forensic analysis useless. The presentation will contain answers of how such problems should be addressed in a better way. Considering that the attackers are still out there "in the wires", the presention will conclude with our top recommendations to all potential targets.

While the presentation will be based on specific investigation, it contains valuable general insights into what a modern top-notch cyberattacks look like.

VITALY KAMLUK BIO

Vitaly has been involved in malware research at Kaspersky Lab since 2005. In 2008, he was appointed Senior Antivirus Expert, before going on to become Director of the EEMEA Research Center in 2009. He spent a year in Japan focusing on major local threats affecting the region. In 2014 he was seconded to the INTERPOL Global Complex for Innovation in Singapore, where he worked in the INTERPOL Digital Crime Center specialising in malware reverse engineering, digital forensics and cybercrime investigation.

Prior to joining Kaspersky Lab, Vitaly worked as a software developer and system administrator. He is a graduate of the Faculty of Applied Math and Computer Science at the Belarussian State University

Vitaly has presented at many public international security conferences including Blackhat USA,Blackhat Asia,Defcon,Hitcon,BSides LasVegas,PHDays,ZeroNights,FIRST,Source Boston as well as multiple closed door invite-only security industry events such as Underground Economy, DCC, InBot and more. 

yuhong
minzheng
China.png

YU HONG (REDRAIN)

A Ghost from Postscript

PostScript is a programming language introduced by Adobe for image and text printing. Although this language is not well known, it is indispensable for printing. We have studied PostScript and GhostScript (an engine of PostScript) since last year. And we found several interesting security vulnerabilities in them.

In this talk, we first introduce the grammar specification of PostScript and discuss the security weaknesses of this language. After that, we show several vulnerabilities of GhostScript that can cause arbitrary file read, arbitrary code execution and sandbox escape. In addition, we extend our PostScript security study to other well-known image processing software (e.g., ImageMagick, Evince) used GhostScript engine. The result shows that even the latest version of these software still have 0-day vulnerabilities for PostScript language processing. 

YU HONG (REDRAIN) BIO

Yu Hong (redrain) is a Senior Security Researcher at from 360CERT of Qihoo 360. With more than 7 years of experience in security research and web application penetration testing,he has discovered and reported several vulnerabilities and received acknowledgement for his contributions from various companies including Apple, Baidu, Tencent, Alibaba and more. Yu has gave presentations on HITB, hitcon 

Min (Spark) Zheng is a security expert @Alibaba mobile security. He received his Ph.D. degree in the CSE department of the Chinese University of Hong Kong. His research focuses on malware analysis, smartphone (Android & iOS) security, system design and implementation. Before receiving Alibaba A-Star offer award in 2015, he worked in FireEye, Baidu and Tencent. He was the champion of GeekPwn 2014 and AliCTF 2015. And his won the "best security researcher" award in FIT 2016, China for detecting the XcodeGhost virus and WormHole vulnerability. His personal interests include films, computer games and CTF (capture the flag).
sparky.jpg
au.png

SEAN PARK (SPARKY)

Neural Blacklist: Fighting Mutating Polymorphic URLs

Latest malware attacks use more and more polymorphic URLs to reduce the chance of being caught on their initial infection sites, malware drop sites and landing pages. For instance, Cryptolocker (a.k.a. Torrentlocker), being one of the most notorious ransomware families, takes random folder and file name as part of the initial infection URL structure. Various Domain Generation algorithms (DGAs) have patterns that human beings easily recognize but the automation finds it hard to detect. RIG-EK, the most popular exploit kit this year, also uses special random patterns in the drop sites. To make matters worse, these polymorphic URL patterns mutate over time, which makes the detection job extremely challenging. From the defender's perspective, it is crucial to stop users from accessing these malicious URLs in order to break the chain of infection. Traditionally this URL pattern matching has been dealt with by regular expressions and handcrafted algorithms. However, URL polymorphism and constant mutation renders these traditional approaches very costly and unsatisfactory at its best.

Recently deep learning has proven to perform really well especially in recognizing non-linear patterns, which human brain's neural network is good at. With not much of a surprise, my research shows it also works great at solving highly engineered malicious URLs. In this talk, I will demonstrate how to leverage the state of the art Attention Long Short Term Memory (LSTM) to detect variable length malicious URL patterns. I will also visualize how and why this neural network separates different classes of URLs in such a high accuracy. This work has been evaluated against a large corpus of Akamai logs and the latest malicious URL dataset, and recorded a nearly perfect precision and recall rate. Along with a very short training time, this model also  allows us to integrate it into production systems with minimal deployment overhead and maintenance cost.

SEAN PARK (SPARKY) BIO

Sparky is a senior malware scientist at Trend Micro trying to solve highly difficult problems using deep learning. His main focus is deep learning based threat detection including unsupervised malware clustering using convolutional autoencoder, malware metamorphism detection using Semantic Hashing with Fourier transform, Cryptolocker URL detection using multi-layer gated recurrent unit with attention mechanism, OSX Malware detection using convolutional autoencoder, exploit detection using hierarchical LSTM, real time unsupervised malware email campaign clustering using DBSCAN, and machine learning model benchmarking platform for online In-the-wild samples.

He previously worked for Kaspersky, FireEye, Symantec, and Sophos. He also created a critical security system for banking malware at a top Australian bank. 

TonTon Huang
Chia Mu Yu
TW

HSIEN-DE HUANG & CHIA-MU YU & HUNG-YU KAO

Look! Ransomware is there: Large Scale Ransomware Detection with Naked Eye

Ransomware such as WannaCrypt and Petya have caused significant financial loss and even have endangered human life (e.g., ransomware attack on UK hospitals). Ransomware on desktop has gained much attention from academic and industry. However, we see that the number of ransomware on Android phones remains steady increasing, but gains much less attention. As Android has been the most popular smartphone OS and a substantial number of credentials are kept only in smartphones, the data loss incurs serious inconvenience and loss. Here, we present our deep learning-based ransomware detection system, coloR-inspired convolutional neuRal network-based androiD ransomware Detection (R2D2). R2D2 was originally developed to sweep the malware, but we found it particularly useful in detecting ransomware. A unique feature is its end-to-end training, without human intervention. Such an end-to-end training points out a direction that we no longer need tedious search for roust ransomware features for detection. Most importantly, based on R2D2, we develop techniques to encode ransomware as so-called ransomware image, such that the ransomware from the same family exhibit the same pattern and even non-experts can detect and even determine the ransomware family with their the naked eye.

HSIEN-DE HUANG & CHIA-MU YU & HUNG-YU KAO BIO

 Hsien-De Huang (a.k.a. TonTon) is working for Leopard Mobile (Cheetah Mobile Taiwan Agency). His current major research interests include Deep Learning, Malware Analysis, Android Reverse Engineering, Type-2 Fuzzy Logic, and Ontology Applications. He also is a Ph. D. candidate (IKM Lab.) in the Dept. Computer Science and Information Engineering at National Cheng Kung University, Taiwan. He also was a visiting Ph. D student in the UK for research project “2010 Initiative Research Cooperation among Top Universities between UK and Taiwan" at University of Essex, UK and in the research project “2012 NSC-INRIA International Program - Associate Team (II)” at INRIA Saclay, France. In the past few years, he was a Software Developer at Verint Systems (Taiwan), Senior Security Engineer at Acer e-Enabling Data Center(Acer eDC) and Project Assistant Researcher at the National Center for High-Performance Computing (NCHC). http://TWMAN.ORG is his personal website.

Chia-Mu Yu received his Ph.D degree from National Taiwan University in 2012. He is currently an assistant professor at National Chung Hsing University, Taiwan. He was a research assistant in the Institute of Information Science, Academia Sinica. He was a visiting scholar at Harvard University, Imperial College London, Waseda University, and University of Padova. He was a postdoc researcher at IBM Thomas J. Watson Research Center. He serves as an associate editor of IEEE Access and Security and Communication Networks. His research interests include cloud storage security, IoT security, and differential privacy.

Hung-Yu Kao received the B.S. and M.S. degree in Computer Science from National Tsing Hua University in 1994 and 1996 respectively. In July 2003, he received the PhD degree from the Electrical Engineering Department, National Taiwan University. He is currently the Director of Institute of Medical Informatics and a professor of Department of Computer Science and Information Engineering of National Cheng Kung University. He was a post-doctoral fellow of Institute of Information Science (IIS), Academia Sinica from 2003 to 2004. His research interests include Web information retrieval / extraction, search engine, knowledge management, data mining, social network analysis and bioinformatics.

johnb
au.png

JOHN BIRD

In Soviet Russia, Radare2 Debugs You!

This talk will be all about Radare2 - one of the new reversing/debugging/code analysis offerings on the market. It's fast, capable, opensource, free and its user base is growing quickly.

By the end of this you will (hopefully) be able to navigate some of its core functionality as well as get an overview of its other components (like rabin2, rafind2, ragg2, rasm2 etc).

You will also get to see some CTF challenges being solved <blink>live on stage</blink>. Nah, just kidding - solved them a long time ago...just wanted to see if that blink tag bit would make it into the speakers page. If so there might be a lame XSS vuln. Hmmm, lets try this <script>alert('xss')</script>. Yeah, I'll just leave that bit there.

JOHN BIRD BIO

John is just some /dev/urandom guy. Really - nothing to see here....so move on.  He did present in 2013 on GPU cracking password stuff and that went ok... so feel free to rock up.

z2
China.png

ZINUO HAN

A Whole New Efficient Fuzz Strategy for Stagefright: Porting and Optimization

In this presentation, I will present how I found several critical vulnerabilities in Stagefright media framework. First of all, I start with a brief overview on the Stagefright security status. Next, I review the previous fuzz strategies and point out their disadvantages. Then, a new efficient fuzz strategy will be presented. The features of the proposed fuzz strategy include: the new attack surface, the porting of multiple core components, as well as a set of special tricks for improving fuzz efficiency. Finally, a dozen of CVEs found by the above method will be shown to you.

From this presentation, you can learn how to reproduce the known vulnerabilities and discover new vulnerabilities in Stagefright more effectively. In addition, these experiences can also be applied to other Android native programs written by C/C++.

ZINUO HAN BIO

Zinuo Han(ele7enxxh) is a security researcher at Chengdu Security Response Center, Qihoo 360, mainly focus on vulnerability discovery and vulnerability analysis on Android last year. He has rich experiences in File format fuzzing and discovered quite a few vulnerabilities this year.

aaron bw
nz.png

AARON FENWICK (MULTIPLEX3R)

Hacking SkyNet - Anatomy of an intelligent Industrial Control System

AARON FENWICK (MULTIPLEX3R) BIO

Father, Husband, Hacker, Electronics enthusiast and Penetration Tester @ PwC specialising in Operational Technology - I spend my work time travelling around the world to some pretty inhospitable places hacking into Industrial Control Systems for various clients and giving advice to help secure these systems from a practical perspective. I am a Crest CRT, OSCP and OSCE - That being said, I have electrocuted myself more than once :(

Ryan Holeman 150x190
Alek Amrani
StripThumbnail-pirate-flag.png

RYAN HOLEMAN & ALEK AMRANI

HODOR: Holding Open Doors and Often Reconnecting

Finding or obtaining user credentials is a fairly simple task and can be done in numerous ways.  From writing a 5 line python script that validates credential dumps to using fake login portals to mine credentials.  Unfortunately, pesky security teams and automated alerts are becoming more robust and can quickly detect and remediate credential compromise.  This remediation can put a damper on using all your shiny new validated credentials. 

What if you could use your valid credentials even after a user account reset?  This is where Hodor come in.  Hodor is a reusable,  easy to use framework to assist in holding credential sessions open after a compromise. Built to be generic and reusable, Hodor abuses the fact that credential resets typically don’t reset all authentication mechanisms (sessions, temporary credentials, api tokens, etc).  On your next harvest, let Hodor help you to overcome your security roadblocks and preserve your hard earned access.

RYAN HOLEMAN & ALEK AMRANI BIO

Ryan Holeman resides in Austin Texas where he runs Atlassian's Security Intelligence team. He is also an advisor for the endpoint security software company Ziften Technologies. He received a Masters of Science in Software Engineering from Kent State University. His graduate research and masters thesis focused on C++ template metaprograming. He has spoken at many respected venues such as Black Hat, DEF CON, ShmooCon, Lockdown, BSides and Notacon and has published papers though venues such as ICSM and ICPC . You can keep up with his current activity, open source contributions and general news on his blog. His spare time is mostly spent digging into various network protocols, random hacking, creating art, and shredding local skateparks. 

Alek is part of the Atlassian security engineering team. Self procrolaimed AHA! heckler, idiot triathlete, obsessed travel hacker, and CTF connisoeur. 

    "Doer of things, duder of peoples." -- WanderingGlitch
    "Wrecks $hit, trolling, and heckling. Also runs too much." -- hackgnar
    "Some professional words that sound good." -- zxcvbnm
    "Actually runs long distances for fun." -- unicornfurnace

 

default2.png
default5.jpg
au.png

TY MILLER & PAUL KALININ

The Active Directory Botnet

Botnets and C&C servers are taking over the internet and are a major threat to all of us ... but what happens when these botnets and C&C servers start existing and operating inside the walls of our organisations? What if these botnets and C&C servers could bypass all of our network controls? What if these botnets and C&C servers could communicate internally across our security zones and organisations? What if micro-segmentation suddenly became useless?

This brand new attack technique makes this nightmare a reality by turning your Active Directory Domain Controllers into C&C servers that can command a powerful internal botnet. This attack technique is a fundamental flaw within the way that nearly every organisation implements their Active Directory solution, which leaves a gaping hole within their security and their ability to contain security breaches.

This is achieved by leveraging standard Active Directory attributes and features to force your Domain Controllers to act as a central communication point for all internally compromised systems.

Due to the architecture of nearly every Active Directory implementation on the planet, almost all servers, workstations, laptops, mobile devices, and wireless devices throughout our organisations can connect to a Domain Controller for authentication purposes.

This provides the ability for The Active Directory Botnet to communicate through a network of strategically placed Active Directory C&C servers. This enables all of your firewalls and network access controls to be bypassed through this central authentication mechanism that automatically synchronises our botnet traffic across all of your Domain Controllers throughout your organisation.

This means that our Active Directory Botnet can not only communicate across WAN sites globally, but if your Active Directory is configured to sync to the cloud, then this introduces a whole other level.

So how does the Active Directory Botnet work? Standard Active Directory accounts support over 50 user attributes that can be combined to create a communication channel between any compromised domain machine located throughout your organisation.

The Active Directory Botnet Client injects unique data entries into their corresponding AD account attributes within the target Domain Controller, and begins polling to identify other compromised systems within the domain. At this point, any Active Directory Botnet Client within the domain can identify compromised machines and begin issuing commands to be executed on either individual systems or across all infected endpoints.

The Active Directory Botnet Clients then execute the commands and begin tunnelling the command output back through their corresponding Active Directory account attribute fields, which are then collected by the Active Directory Botnet Client that issued the original command.

Not only does the Active Directory Botnet enable remote command execution for any domain system, it also has the capability to provide a transparent TCP data channel that ultimately turns your entire security architecture into a flat network.

A series of live demonstrations of this attack will be performed during the presentation to show the attack in action, including remote command execution, backdoor uploads, and multiple transparent data transfer techniques.

The primary way of preventing this attack is to lock down access to change standard user attributes in AD, monitor regular changes to Active Directory standard user attributes that are not typically changed on a regular basis, and by rearchitecting security zones to use different Active Directory Forests. This attack is a clear violation of the way that Active Directory is typically used; however, due to the overwhelming insecure architecture implementations of Active Directory, and the difficulty of changing Active Directory architectures, this new attack technique will be effective for many years to come.

TY MILLER & PAUL KALININ BIO

Ty Miller is the Managing Director of Threat Intelligence Pty Ltd (www.threatintelligence.com) who is a Specialist Security Company based in Australia. Ty holds a position on the Black Hat Asia Review Board, the CREST ANZ Board of Directors and leads the CREST Technical Team.

He is a long term trainer for Black Hat running “The Shellcode Lab” and “Practical Threat Intelligence”, and is a presenter at security conferences including Ruxcon, Black Hat USA, Black Hat DC, and Hack In The Box, amongst many others. This includes presenting on “Reverse DNS Tunneling Shellcode” at Black Hat USA, “BeEF Bind Shellcode” at Ruxcon, and others including “Machine Learning and Modern Malware Mitigations”, “Securing Your Startup to Secure Big Brands”, “Modern Threat Detection and Prevention” and “Can your application be breached?”.

Ty has developed attack techniques for global security firms including the “DNS Channel Payload” for Core Impact and is a co-author of “Hacking Exposed Linux 3rd Edition”.

Paul Kalinin is a Senior Security Consultant at Threat Intelligence Pty Ltd. Paul has presented his security research at Black Hat and ran the Practical Threat Intelligence training at Black Hat USA.

Paul has been working in the IT industry for 20 years with the last 8 years being dedicated as a security specialist focusing on penetration testing. Paul has achieved a range of industry certifications such as CISSP, PCI QSA, CEH and CREST.

Paul's areas of expertise include web and mobile application penetration testing, internal and external infrastructure penetration testing, wireless infrastructure penetration testing, red teaming and open source intelligence specialist.

Paul has been a key player in the development of penetration testing tools, exploits, methodologies and cyber threat intelligence gathering within the Threat Intelligence team. 

timkornau
de.png

TIM KORNAU

The many Dimensions of Relationships

A presentation about how to use fuzzy executable and function similarity at scale. We will go over past approaches and why they failed. We will describe the general idea of fuzzy executable and function similarity and introduce the basic math concepts behind our approach. We will introduce concepts used for detection on executable and function level. We will show how "close relative" relationships between executables can aid analysts workflows. We will show how "distant relative" relationships can be identified via our approach and how they can be used. We will show how prevalence can be used to further strengthen the approach. 

TIM KORNAU BIO

Tim Kornau is a software engineer at Google Threat Analysis Group. He has previously worked as software engineer at zynamics. Tim holds a Masters from Ruhr University Bochum in IT-Security.