Talks at Hack Red Con 2022
Keynote RoundTable Day 1
Discussion from top security experts on topics like: how to stay positive in the current virtual workplace, how in demand are cyber security jobs, what does the future of cyber security look like, what can someone new do to break into the field. Followed up with a QA from the audience.
Zach Stashis Moderator, Founder Hack Red Con &
Red Seer Security
Principal and Founder of Enclave Security, SANS Author and Instructor
CEO Global Wave Consulting
Cyber Solutions Engineer II
The Walt Disney Company
War Stories Covert Physical, Wireless, and Red Team Assessments Against Government and Commercial Clients.
For each issue, they'll dive into techniques used to trick security guards into handing over access cards, employees allowing keyloggers to be plugged into systems, bypassing expensive access controls into Data Centers, C-Level executives handing over laptops, and MUCH more.
Covert Entry Specialist
Covert Entry Specialist
Using Molecular Communication Systems to Activate In Vivo Bio-nanorobotic Devices
This presentation will explain how in vivo devices are deployed in one use case which will highlight vulnerabilities inherent in the process. Nano devices are deployed in a person as we send a signal from one part of the body to the other, but there are security pitfalls along the way which could be problematic for personalized medicinal applications.
Gregory Carpenter is Chief Security Officer of Knowledge Bridge International. He is a Fellow at the Royal Society for the Arts and was selected the National Security Agency’s Operations Officer of the Year in 2007. He serves on the Board of Directors for ATNA Systems, is a Senior Advisor for ARIC, Inc., and previously sat on the Board of Advisors for EC-Council University and the International Board of Advisors for the Mackenzie Institute. He is a retired military officer of 27 years and has held numerous senior positions in government and private business. Gregory holds a Bachelor of Science degree, a Master of Science degree, and a Doctorate in Public Health. He is a Certified Information Security Manager and ISO-9000 lead auditor.
Digital Forensics & Incident Response (DFIR) - Mobile Forensics
Katrina Khanta will provide an overview Digital Forensics & Incident Response (DFIR), present her smartphone forensics research, and discuss how you can leverage your current skills to succeed in the Cybersecurity industry. This presentation aims to eliminate self-doubts and inspire the audience to pursue their curiosities through various methods and techniques on how to get started.
Cyber Solutions Engineer II at The Walt Disney Company
AWS IAM Privilege Escalation Redux
You have gained access to an AWS account but lack permissions to complete your objectives. You attempt every privilege escalation path documented online, but none of them are successful. The objectives now seem impossibly distant; your battery is low and it’s getting dark.
This talk will present a set of IAM privilege escalation paths that I have not seen documented online* accompanied by anecdotes of adventures in cloud security. Attendees will learn new tricks for IAM privilege escalation in AWS along with a methodology for evaluating potential priv esc paths.
int eighty (of Dual Core)
int eighty (he/him) is a computer crime enthusiast, and the rapper in Dual Core. Occasional memes and hacking content on Twitter as @int0x80.
BBOT (Bighuge BLS OSINT Tool) is an OSINT framework by hackers for hackers.
This talk will tell the story of how we at Black Lantern Security got tired of the tedious process of running so many different tools, and set out to make OSINT fun again by creating one tool to rule them all.
BBOT is written in Python. It is modular (with over 50 modules) and designed to automate the entire OSINT process and beyond -- from subdomain enumeration, to port scanning, to web screenshots, to vulnerability discovery, and more. There will be demos!
Hacker at Black Lantern Security.
Hidden Threat of Social Media - Social Engineering & OSINT
Learn how, terrorists, criminals, and spies, “bad guys” take the seemingly innocuous information your employees post online and use it to compromise your company's network. Specifically, participants will learn how these “bad guys” use this information to create infected e-mails/documents that will compromise your network. In these instances, it does not matter how robust your IT budget is, because the offender has totally bypassed it.
Stacy M. Arruda
FBI - Supervisory Special Agent (Retired),
Founder & CEO of Arruda Group
Bootstrapping your AppSec program
Bootstrapping your AppSec program. We dive into what I have learned from being apart of growing AppSec programs with companies like 1Password and Red Canary. We will take a look at secure SDLC, social engineering a culture and leadership that works. Application security is a strange place in InfoSec and I want to make it better and more effective while not hindering business. This talk was a great success at RVAsec this year.
Security Engineer at Red Canary
Spilling the Beans: How to Spot a Bad Pentest
Ever wondered what the magic is behind a penetration test? Did you receive a pentest report that does not line up with your expectations? Do you want to get more out of your consulting partners or want to know the secret to landing that job at a consulting firm? Come join us as we spill the beans and disclose how the (halal) sausage is made. We will discuss pentesting from the perspective of both the client and the consultant. If you're looking to land a job at a consultancy, this talk is for you too. As we peel the curtain and talk through real-world examples, everyone walks out with the magic sauce.
Director of Offensive Security
Director of Cyber Security
Human-Machine Teaming - AI in Cybersecurity
Artificial Intelligence is a pervasive part of our lives today and cybersecurity teams and adversaries alike have learned to harness the speed and power of machines to strengthen their capabilities. With machine learning becoming one of the most important tools of defense, leaders must balance the overwhelming speed and accuracy advantage of AI with the need for measured and intuitive interactions with a real-world human element.
Chief Cybersecurity Evangelist & Head of Technical Marketing at Sentinel One
Offense sells tickets: Lessons learned from training the next generation of Pentesters
Offense sells tickets, defense wins games, rebounding wins championships.” — Pat Summitt
When we talk about training red teams or pentesters a lot of people direct students on how to hone their attack skills. The students are taught to scan, attack, exploit, pivot and get root. With this singularly focused directive we're doing a disservice to the red teamers of the future. As legendary coach Pat Summit said, offense sells tickets but defense wins games. Having highly skilled attack cyber ninjas only will get your red teamers so far in the game without focusing on the value that defense and rebounding (learning from failed attacks) brings to making well rounded hackers. In this talk Tennisha Martin talks about lessons learned from training the next generation of red team hackers..
Founder Black Girls Hack, Advisory Board Member RaicesCyberOrg, CEO of BGH Security Corporation
Insider Threat Awareness
Individuals entrusted with access to or knowledge of an organization represent potential risks, and include current or former employees or any other person who has been granted access, understanding, or privilege. Trusted insiders commit intentional or unintentional disruptive or harmful acts across all infrastructure sectors and in virtually every organizational setting. Using case studies and incident analysis, this presentation will help you understand the importance of detecting potential insider threat activity and recognizing risk indicators.
Cyber Security Advisor. Cybersecurity Infrastructure
Security Agency, Department of Homeland Security
Surefire Symbiosis: Data, Security, and Privacy with the NIST Frameworks. Implementing Cyber Security and Privacy.
In nature, organisms such as ant colonies and fungus mutually benefit from their interactions. The NIST CSF and Privacy Frameworks were created to symbiotically reduce duplication of security and privacy efforts as well as decrease risk in the environment. In this presentation, I will provide an overview of the interwoven domains and explain strategies for implementing these control libraries in a mutually beneficial way. You may also learn a little biology in this 50 minute presentation.
Principal and Founder of Enclave Security, SANS Author and Instructor
Improv Comedy as a Social Engineering Tool
Have you ever gotten an “urgent call about your car warranty” or a demand that “you need to pay the IRS by credit card right now”? Social Engineering is the practice of talking your way into or out of situations, and is often employed by the underhanded, but can also be used to defend against those very attacks.
The rules of improv comedy can apply to many social interactions, including bluffing your way to compromise a target. The constantly changing situations of improv are great practice for accepting unexpected circumstances, and happily going with the flow.
Dave Mattingly was a NASA rocket scientist while also a comedy and punk radio DJ. He led a sci-fi and RPG publishing company, while writing anti-terrorism software for DHS. He’s an itinerant preacher, entrepreneur, award-winning speaker, and occasional improv comic. In short, he doesn’t know what he wants to do when he grows up.
Data Master, Tech Speaker, Entreprenerd, OSINT Wonk, Preacher, Publisher, All-Purpose Geek, 413 Experience on Clubhouse
Red Teaming, Pen Testing, Research
This talk will include what is different about red teaming, how to tie it and upgrade your pentesting, working with blue teams,. how to start a detection and engineering Ops team. Developing your purple team from your red team. Simple tricks to upgrade your red team to a response and readiness team.
Director of Offensive Security Innovation, Research and Advanced Testing at OnDefend
“The Intelligence Value of Russian Data Dumps”
A talk designed to inform the attendees of the complexity, interconnections, and intelligence value of Russian data dumps. This talk will show the data dumps individually and interpersonal connections between groups of individuals utilizing intelligence methodologies. Data dumps show us the inner workings, likes, dislikes, future plans, and internal conversations that were never meant to be public; that changes with this talk.
Jon “Wally” Prather is a seasoned intelligence professional with a wide range of subject matter expertise and is the Senior Intelligence Analyst for SecurityScorecard Cyber Risk Intelligence Team (CRI). Wally is proficient in multiple intelligence disciplines including HUMINT Targeting, HVI Targeteer, and Network Analysis with 20 years’ experience, primarily in maritime counterterrorism/ counterinsurgency operations with the US Marine Corps, Special Operations and Irregular Warfare. Wally has operational experience providing in-depth intelligence analysis and direct support to combat and interagency operations in the Middle East, Southeast Asia, and Africa with over four years deployed to combat, hostile and sensitive environments to include East Africa, Afghanistan, and Iraq. Wally now applies intelligence processes and methodologies to cyber data with unique and innovative results.
Senior Staff Intelligence Analyst, SecurityScorecard Cyber Risk Intelligence Team
Greenfielding a cyber security program for billion-dollar healthcare company
This talk is for everyone; engineers, analysts, future managers/leaders, and especially those “lucky” enough to become an “accidental CISOs”. Alex Kot will take you on a journey of a single cyber security employee to a staff of 12. From shoestring budget to 15 tools and hundreds of processes. Most importantly will share the importance of a Cyber Security Steering Committee and the business partners to stay successful. Alex will go through many misnomers and hurdles to help future ISOs not fumble through the same problems. Alex will share some of the pet peeves he saw in other companies to build a collaborative and successful program. Alex will showcase various engineering efforts and processes to properly mature and report your cyber security program.
Alex Kot is the AVP of Cyber Security at Aveanna. Aveanna is one of the largest home healthcare providers. At Aveanna Alex helped greenfield the Cyber Security program, matured the program to a proactive state, and helped the company go public. Alex provided engineering, architecting, and leadership experience to previous companies in the financial, retail, and payment processing industries.
Alex is a frequent presenter at various Information Security conferences such as NotACon, Circle City Con, and various Bsides including keynoting at Bsides Cleveland.
AVP of Cyber Security at Aveanna Healthcare
From exploiting my smart-home into controlling thousands of smart-devices around the world - Virtual from Tel Aviv, Isreal
In our scenario, thousands of HDL smart devices could have been exploited & remotely controlled in the wild. 4 unique vulnerabilities have been found and presented here - We show how they can be utilized by a sophisticated attacker to stealth-access smart-devices remotely, change, control and take advantage of their data. Also, we show how a full data-extraction of smart-devices managing accounts: private data and credentials could have been extracted as well. This unique attack scenario demonstrates the high-security impact of deploying IoT devices over any organization, especially when using dedicated IoT hardware and proprietary components which are interconnected and even remotely managed. A coordinated responsible disclosure was done and thankful to HDL responsiveness & approach - All was fixed.
Categories: IoT, Security Vulnerabilities, Web-Apps / Application Security
Offensive Security. Founder @ Wild Pointer
Hacker-In-Residence, Advisor YL Ventures
A brief overview of the United States Secret Service mission, with an emphasis on cybercrime. Followed by case study examples of digital forensic investigations.
C. Aaron Ghabart
United States Secret Service
Louisville Field Office
How to Rob a Bank Over the Phone
ROBBING A BANK OVER THE PHONE - HOW AN EXPERT SOCIAL ENGINEER CAN CONVINCE YOU TO DO ANYTHING.
In this intense keynote, Joshua brings the audience along for the ride on one of the most advanced social engineering attacks he's ever executed - robbing a bank over the phone.