Talks at Hack Red Con 2022

Keynote RoundTable Day 1 

Discussion from top security experts on topics like: how to stay positive in the current virtual workplace, how in demand are cyber security jobs, what does the future of cyber security look like, what can someone new do to break into the field. Followed up with a QA from the audience.

zachary stashis.jpg
new-linkedin-logo-white-black-png.png
Zach Stashis  Moderator, Founder Hack Red Con &
Red Seer Security
kelli Tarala.jpg
new-linkedin-logo-white-black-png.png
Kelli Tarala
Principal and Founder of Enclave Security, SANS Author and Instructor
IMG_3385.jpg
new-linkedin-logo-white-black-png.png
Charles Shirer
CEO Global Wave Consulting
new-linkedin-logo-white-black-png.png

Katrina Khanta
Cyber Solutions Engineer II
The Walt Disney Company

370x370_Ed-Skoudis.jpg
new-linkedin-logo-white-black-png.png
Ed Skoudis
President SANS Institute

War Stories Covert Physical, Wireless, and Red Team Assessments Against Government and Commercial Clients.

For each issue, they'll dive into techniques used to trick security guards into handing over access cards, employees allowing keyloggers to be plugged into systems, bypassing expensive access controls into Data Centers, C-Level executives handing over laptops, and MUCH more.

dark wolf solutions.jpg
new-linkedin-logo-white-black-png.png

Brent White
Covert Entry Specialist

wehackpeople-logo.webp
new-linkedin-logo-white-black-png.png

Tim Roberts
Covert Entry Specialist

Desktop Support to CISO, the path matters

Jeff started at the bottom and worked his way up.  In this discussion he will discuss the path and very real, actionable efforts you can take to aid and assist in your path of upward mobility.

Jeff Jarecki Volta.jpg
new-linkedin-logo-white-black-png.png

Jeff Jarecki
CISO, Volta

IMG_6864 - Copy.JPG
new-linkedin-logo-white-black-png.png

Gregory Carpenter
Chief Security Officer at KnowledgeBridge International Inc.

Using Molecular Communication Systems to Activate In Vivo Bio-nanorobotic Devices

 

This presentation will explain how in vivo devices are deployed in one use case which will highlight vulnerabilities inherent in the process. Nano devices are deployed in a person as we send a signal from one part of the body to the other, but there are security pitfalls along the way which could be problematic for personalized medicinal applications.

 

Gregory Carpenter is Chief Security Officer of Knowledge Bridge International. He is a Fellow at the Royal Society for the Arts and was selected the National Security Agency’s Operations Officer of the Year in 2007. He serves on the Board of Directors for ATNA Systems, is a Senior Advisor for ARIC, Inc., and previously sat on the Board of Advisors for EC-Council University and the International Board of Advisors for the Mackenzie Institute. He is a retired military officer of 27 years and has held numerous senior positions in government and private business. Gregory holds a Bachelor of Science degree, a Master of Science degree, and a Doctorate in Public Health. He is a Certified Information Security Manager and ISO-9000 lead auditor.

In Rust I Trust Using Rust with the Offensive Mindset

Using the Rust programming language during a penetration test  the success and failures and  what I learned from it. 

IMG_3385.jpg
new-linkedin-logo-white-black-png.png

Charles Shirer
CEO Global Wave Consulting, Pentester, Senior RedTeamer

Digital Forensics & Incident Response (DFIR) - Mobile Forensics

Katrina Khanta will provide an overview Digital Forensics & Incident Response (DFIR), present her smartphone forensics research, and discuss how you can leverage your current skills to succeed in the Cybersecurity industry. This presentation aims to eliminate self-doubts and inspire the audience to pursue their curiosities through various methods and techniques on how to get started. 

new-linkedin-logo-white-black-png.png

Katrina Khanta

Cyber Solutions Engineer II at The Walt Disney Company

AWS IAM Privilege Escalation Redux

You have gained access to an AWS account but lack permissions to complete your objectives. You attempt every privilege escalation path documented online, but none of them are successful. The objectives now seem impossibly distant; your battery is low and it’s getting dark.

 

This talk will present a set of IAM privilege escalation paths that I have not seen documented online* accompanied by anecdotes of adventures in cloud security. Attendees will learn new tricks for IAM privilege escalation in AWS along with a methodology for evaluating potential priv esc paths.

int_eighty_solo_DFW- Dual Core.jpeg
new-linkedin-logo-white-black-png.png

int eighty (of Dual Core)
int eighty (he/him) is a computer crime enthusiast, and the rapper in Dual Core. Occasional memes and hacking content on Twitter as @int0x80.

BBOT (Bighuge BLS OSINT Tool) is an OSINT framework by hackers for hackers.

This talk will tell the story of how we at Black Lantern Security got tired of the tedious process of running so many different tools, and set out to make OSINT fun again by creating one tool to rule them all.

BBOT is written in Python. It is modular (with over 50 modules) and designed to automate the entire OSINT process and beyond -- from subdomain enumeration, to port scanning, to web screenshots, to vulnerability discovery, and more. There will be demos!

image.png
The Techromancer  
Hacker at Black Lantern Security.

Hidden Threat of Social Media - Social Engineering & OSINT

Learn how, terrorists, criminals, and spies, “bad guys” take the seemingly innocuous information your employees post online and use it to compromise your company's network. Specifically, participants will learn how these “bad guys” use this information to create infected e-mails/documents that will compromise your network.  In these instances, it does not matter how robust your IT budget is, because the offender has totally bypassed it.

IMG_0151_JPG.webp
new-linkedin-logo-white-black-png.png

Stacy M. Arruda
FBI - Supervisory Special Agent (Retired),
Founder & CEO of Arruda Group

Bootstrapping your AppSec program

Bootstrapping your AppSec program. We dive into what I have learned from being apart of growing AppSec programs with companies like 1Password and Red Canary. We will take a look at secure SDLC, social engineering a culture and leadership that works. Application security is a strange place in InfoSec and I want to make it better and more effective while not hindering business. This talk was a great success at RVAsec this year.

David Girvin.jpg
new-linkedin-logo-white-black-png.png

David Girvin
Security Engineer at Red Canary

Spilling the Beans: How to Spot a Bad Pentest

Ever wondered what the magic is behind a penetration test? Did you receive a pentest report that does not line up with your expectations? Do you want to get more out of your consulting partners or want to know the secret to landing that job at a consulting firm? Come join us as we spill the beans and disclose how the (halal) sausage is made. We will discuss pentesting from the perspective of both the client and the consultant. If you're looking to land a job at a consultancy, this talk is for you too. As we peel the curtain and talk through real-world examples, everyone walks out with the magic sauce.

happy alp.jpg
new-linkedin-logo-white-black-png.png

Qasim Ijaz
Director of Offensive Security

aveanna healthcare.png
new-linkedin-logo-white-black-png.png

Andrew Clinton
Director of Cyber Security

Human-Machine Teaming - AI in Cybersecurity

 

Artificial Intelligence is a pervasive part of our lives today and cybersecurity teams and adversaries alike have learned to harness the speed and power of machines to strengthen their capabilities. With machine learning becoming one of the most important tools of defense, leaders must balance the overwhelming speed and accuracy advantage of AI with the need for measured and intuitive interactions with a real-world human element.

mleland-hi-res.png
new-linkedin-logo-white-black-png.png

Michael Leland 
Chief Cybersecurity Evangelist & Head of Technical Marketing at Sentinel One

Offense sells tickets: Lessons learned from training the next generation of Pentesters

Offense sells tickets, defense wins games, rebounding wins championships.” — Pat Summitt

When we talk about training red teams or pentesters a lot of people direct students on how to hone their attack skills. The students are taught to scan, attack, exploit, pivot and get root. With this singularly focused directive we're doing a disservice to the red teamers of the future. As legendary coach Pat Summit said, offense sells tickets but defense wins games. Having highly skilled attack cyber ninjas only will get your red teamers so far in the game without focusing on the value that defense and rebounding (learning from failed attacks) brings to making well rounded hackers. In this talk Tennisha Martin talks about lessons learned from training the next generation of red team hackers.. 

tnisha.jpg
new-linkedin-logo-white-black-png.png

Tennisha Martin
Founder Black Girls Hack, Advisory Board Member RaicesCyberOrg, CEO of BGH Security Corporation

Insider Threat Awareness

Individuals entrusted with access to or knowledge of an organization represent potential risks, and include current or former employees or any other person who has been granted access, understanding, or privilege. Trusted insiders commit intentional or unintentional disruptive or harmful acts across all infrastructure sectors and in virtually every organizational setting. Using case studies and incident analysis, this presentation will help you understand the importance of detecting potential insider threat activity and recognizing risk indicators.  

CISA_Logo.png
new-linkedin-logo-white-black-png.png

Colin Glover
Cyber Security Advisor. Cybersecurity Infrastructure
Security Agency, Department of Homeland Security 

Talk about Infosec, Redteam, Pentesting, Cybersecurity, and Offensive Security - Talk Topic TBD

TBD

tyler robinson.jpg
new-linkedin-logo-white-black-png.png

Tyler Robinson
Managing Director of Offensive Security & Research at Trimarc

Surefire Symbiosis: Data, Security, and Privacy with the NIST Frameworks. Implementing Cyber Security and Privacy. 

In nature, organisms such as ant colonies and fungus mutually benefit  from their interactions. The NIST CSF and Privacy Frameworks were created to symbiotically reduce duplication of security and privacy efforts as well as decrease risk in the environment. In this presentation, I will provide an overview of the interwoven domains and explain strategies for implementing these control libraries in a mutually beneficial way. You may also learn a little biology in this 50 minute presentation.

kelli Tarala.jpg
new-linkedin-logo-white-black-png.png

Kelli Tarala
Principal and Founder of Enclave Security, SANS Author and Instructor

Improv Comedy as a Social Engineering Tool

Have you ever gotten an “urgent call about your car warranty” or a demand that “you need to pay the IRS by credit card right now”? Social Engineering is the practice of talking your way into or out of situations, and is often employed by the underhanded, but can also be used to defend against those very attacks.

 

The rules of improv comedy can apply to many social interactions, including bluffing your way to compromise a target. The constantly changing situations of improv are great practice for accepting unexpected circumstances, and happily going with the flow.

 

Dave Mattingly was a NASA rocket scientist while also a comedy and punk radio DJ. He led a sci-fi and RPG publishing company, while writing anti-terrorism software for DHS. He’s an itinerant preacher, entrepreneur, award-winning speaker, and occasional improv comic. In short, he doesn’t know what he wants to do when he grows up.

dave mattingly.jpg
new-linkedin-logo-white-black-png.png

Dave Mattingly
Data Master, Tech Speaker, Entreprenerd, OSINT Wonk, Preacher, Publisher, All-Purpose Geek, 413 Experience on Clubhouse 

Red Teaming, Pen Testing, Research

This talk will include what is different about red teaming, how to tie it and upgrade your pentesting, working with blue teams,. how to start a detection and engineering Ops team. Developing your purple team from your red team. Simple tricks to upgrade your red team to a response and readiness team.

Joe Headshot Version 1 (1).JPG
1906_BlindHacker_Hoodie.jpg
new-linkedin-logo-white-black-png.png

Joe Brinkley
Director of Offensive Security Innovation,  Research and Advanced Testing at OnDefend

Threat Analysis - Talk TBD

TBD

Clint Walker.jpg
CISA_Logo.png
new-linkedin-logo-white-black-png.png

Klint Walker
Cybersecurity Advisor, Cybersecurity and Infrastructure Security Agency, U.S. DHS

“The Intelligence Value of Russian Data Dumps”
 

A talk designed to inform the attendees of the complexity, interconnections, and intelligence value of Russian data dumps.  This talk will show the data dumps individually and interpersonal connections between groups of individuals utilizing intelligence methodologies.  Data dumps show us the inner workings, likes, dislikes, future plans, and internal conversations that were never meant to be public;  that changes with this talk.   
 

Jon “Wally” Prather is a seasoned intelligence professional with a wide range of subject matter expertise and is the Senior Intelligence Analyst for SecurityScorecard Cyber Risk Intelligence Team (CRI). Wally is proficient in multiple intelligence disciplines including HUMINT Targeting, HVI Targeteer, and Network Analysis with 20 years’ experience, primarily in maritime counterterrorism/ counterinsurgency operations with the US Marine Corps, Special Operations and Irregular Warfare. Wally has operational experience providing in-depth intelligence analysis and direct support to combat and interagency operations in the Middle East, Southeast Asia, and Africa with over four years deployed to combat, hostile and sensitive environments to include East Africa, Afghanistan, and Iraq.  Wally now applies intelligence processes and methodologies to cyber data with unique and innovative results. 

Wally.jpg
new-linkedin-logo-white-black-png.png
Wally Prather
Senior Staff Intelligence Analyst, SecurityScorecard Cyber Risk Intelligence Team

Greenfielding a cyber security program for billion-dollar healthcare company

This talk is for everyone; engineers, analysts, future managers/leaders, and especially those “lucky” enough to become an “accidental CISOs”.  Alex Kot will take you on a journey of a single cyber security employee to a staff of 12.  From shoestring budget to 15 tools and hundreds of processes.  Most importantly will share the importance of a Cyber Security Steering Committee and the business partners to stay successful.  Alex will go through many misnomers and hurdles to help future ISOs not fumble through the same problems.  Alex will share some of the pet peeves he saw in other companies to build a collaborative and successful program.  Alex will showcase various engineering efforts and processes to properly mature and report your cyber security program.

Alex Kot is the AVP of Cyber Security at Aveanna. Aveanna is one of the largest home healthcare providers. At Aveanna Alex helped greenfield the Cyber Security program, matured the program to a proactive state, and helped the company go public. Alex provided engineering, architecting, and leadership experience to previous companies in the financial, retail, and payment processing industries.

Alex is a frequent presenter at various Information Security conferences such as NotACon, Circle City Con, and various Bsides including keynoting at Bsides Cleveland.

Alex Kot.jpg
new-linkedin-logo-white-black-png.png

Alex Kot
AVP of Cyber Security at Aveanna Healthcare

From exploiting my smart-home into controlling thousands of smart-devices around the world - Virtual from Tel Aviv, Isreal

 In our scenario, thousands of HDL smart devices could have been exploited & remotely controlled in the wild. 4 unique vulnerabilities have been found and presented here - We show how they can be utilized by a sophisticated attacker to stealth-access smart-devices remotely, change, control and take advantage of their data. Also, we show how a full data-extraction of smart-devices managing accounts: private data and credentials could have been extracted as well. This unique attack scenario demonstrates the high-security impact of deploying IoT devices over any organization, especially when using dedicated IoT hardware and proprietary components which are interconnected and even remotely managed. A coordinated responsible disclosure was done and thankful to HDL responsiveness & approach - All was fixed.

Categories: IoT, Security Vulnerabilities, Web-Apps / Application Security

Barak Steinberg.jpg
new-linkedin-logo-white-black-png.png

Barak Sternberg
Offensive Security. Founder @ Wild Pointer
Hacker-In-Residence, Advisor YL Ventures

A brief overview of the United States Secret Service mission, with an emphasis on cybercrime. Followed by case study examples of digital forensic investigations. 

Logo_of_the_United_States_Secret_Service.svg.png

C. Aaron Ghabart

United States Secret Service 

Louisville Field Office

How to Rob a Bank Over the Phone

ROBBING A BANK OVER THE PHONE - HOW AN EXPERT SOCIAL ENGINEER CAN CONVINCE YOU TO DO ANYTHING.

In this intense keynote, Joshua brings the audience along for the ride on one of the most advanced social engineering attacks he's ever executed - robbing a bank over the phone.

Joshua C.jpg
new-linkedin-logo-white-black-png.png

Joshua Crumbaugh
CEO & Chief Hacking Officer PhishFirewall