Speakers (preliminary) - DeepSec IDSC 2022 Europe

Deep Dive Into Malicious Office Documents For Offensive Security Professionals

Didier Stevens (NVISO)

Malicious Office documents have been on the radar for many years now. But do you know how to create and tailor them efficiently to achieve successful red team engagements? This training will first teach you how to analyse MS Office files (both “old” OLE and “new” XML formats) and PDF files, to better understand how to create them and evade detection. MS Office documents that execute code via macros. And we will take a very quick look at PDF too. Didier Stevens will teach you how to use his Python tools to analyse MS Office documents and PDF documents. Then we will move on to the creation of malicious documents, and Didier will teach you how to use his tools for Microsoft Office and PDF creation for offensive security. Several of these tools are private, but you get to keep them when you take this training. Most of the time we will use Excel, because its rows and columns offer a convenient substitute for a graphical user interface. But the techniques work with all applications that fully support VBA (Visual Basic for Applications), like Word, but also non-office applications like AutoCAD.


No prior knowledge of malicious Office documents is required to take this training.
We will use VBA programs and write our own programs that penetration testers need. VBA has an interface to the Windows API. We will learn to use this API to perform pentesting actions from within Office, like a port scan, and also how to use this API to inject and execute shellcode inside the Word/Excel process. And building on this shellcode technique, we will also learn how to package our own DLLs so that they can execute in Word/Excel’s process memory, without touching the disk. This is not a programming class. Knowledge of VBA is not required. Some basic scripting skills like knowledge of for loops and if statements is useful. The basics of VBA will be explained in class, and we will learn to use Didier’s tools and how to modify them to suit the task at hand. No exploits are necessary to achieve this goal, everything can be done with VBA without requiring vulnerabilities. We will learn how to reuse VBA functions and modules from the provided tools to create goal-specific documents (Word, Excel, …).


Over the years, Didier has developed many tools and techniques to “abuse VBA”. Non-exhaustive list of Didier’s tools shared during this class:
• Taskmanager with shellcode injector, process hollowing, parent process selection, .NET injector, …
• Filemanager and container to drop and exfiltrate, modify and encode arbitrary files
• Network tool (ping, port scan, service detection, communication, …)
• Document to perform reconnaissance and exfiltration
• Enumerate installed programs & patches
• Enumerate executables modifiable by the user
• CMD & Regedit running inside Word/Excel process
• Tool to create Excel files on different operating systems, without dependencies with MS Office (Mono required)
• Python tool to create / modify Office OLE and OOXML files, without dependencies with MS Office
• Python tool to hack ZIP containers
• Tool to uncover AV signatures to better evade AV detection
• …

 

SYSTEM REQUIREMENTS

  • A Windows laptop or VM
  • Microsoft Office installed, 32-bit preferred (for example Office 2016 or 2019)
  • Administrative rights
  • Rights to disable AV

Didier Stevens (Microsoft MVP, SANS ISC Handler, Wireshark Certified Network Analyst, …) is a Senior Analyst working at NVISO (https://www.nviso.be). Didier is a pioneer in malicious PDF document research and malicious MS Office documents analysis, and has developed several tools to help with the analysis of malicious documents like PDF and MS Office files. Didier regularly participates in pentests and red team engagements to create task specific documents. You can find his open source security tools on his IT security related blog. http://blog.DidierStevens.com

Mobile Network Security (closed)

James Bart Stidham (Telecom Experts LLC)

Mobile Device Security and Cellular Networks: Hacking, Malware, and Exploits in 2022 - Mobile devices and cellular networks are critical military and intelligence assets in the Russo-Ukrainian War. This presenter led efforts at DHS and NIST to quantify and document just how exploitable both sides of this system are, and the implications for corporations,
political leadership, militaries, and the “mere civilians" caught in the fray. This deep dive will examine what we know, from rumors to highly publicized events, of attacks that touch on all aspects of this technical landscape. It will review key exploits, and provide live demonstrations of several including geolocation attacks, attacks against cell towers, and remote device bricking.

Bart Stidham has worked extensively in secure communications and mobile security R&D. For more than a decade, officials at the National Institute of Standards and Technology (NIST), the US State Department, USAID, and the Department of Homeland Security (DHS) have engaged Bart for his expertise in mobile security research and development.

Bart led efforts to develop new technologies resistant to tracking for use by dissidents in authoritarian countries for the US State Department and USAID, as well as architecting systems to detect such tracking. He later contributed to the first in-depth mobile security research projects at NIST and DHS and the resulting papers. He investigated the security of two critical US cellular systems and potential upgrades: the US Wireless Emergency Alert (WEA) protocol, including the FEMA IPAWS Open system that drives it, and the Wireless Priority Service (WPS).

All of these efforts relied on Bart’s deep understanding of cellular network technologies, surveillance and tracking systems, and how they work.

Bart’s experience spans government and commercial markets. Prior to launching his own company, he worked as an enterprise architect and systems designer for Accenture and ThoughtWorks, a security architect, and CTO at True North Communications. He has also worked as a contractor with the GSMA – the professional body that oversees all cell phone operations globally.

Mobile Security Testing Guide Hands-On (closed)

Sven Schleier (WithSecure)

The training will be offered remote only.

This course teaches you how to analyse Android and iOS apps for security vulnerabilities, by going through the different phases of testing, including dynamic testing, static analysis and reverse engineering. Sven will share his experience and many small tips and tricks to attack mobile apps that he collected throughout their career and bug hunting adventures.

At the beginning of the first day we start by giving an overview of the Android Platform and it’s Security Architecture. It is no longer mandatory for students to bring their own Android device, instead a cloud-based virtualized Android device will be provided for each student, by using Corellium.

These are some of the topics that will be covered during the course:

● Frida crash course to kick-start with dynamic instrumentation on Android apps
● Intercepting network traffic of apps written in mobile app frameworks such as Google’s Flutter
● Identifying and exploiting a real word Deep-link vulnerability
● Explore the differences and effectiveness of Reverse Engineering Android Apps through patching Smali, Xposed and Dynamic Instrumentation with Frida
● Analyze Local Storage of an Android App
● Using Brida to bypass End2End Encryption in an Android app
● Usage of dynamic Instrumentation with Frida to:
○ bypass Frida detection mechanisms
○ bypass multiple root detection mechanisms

On day 2 we are focusing on iOS and will begin with an overview of the iOS Platform and Security Architecture (Hardware Security, Code Signing, Sandbox, Secure Boot, Security Enclave etc.). After explaining what an IPA container is and the iOS file system structure, we start creating an iOS testing environment with Corellium and deep dive into various topics and techniques, including:
● Analyzing iOS applications that use non-HTTP traffic including ways of intercepting the traffic
● Frida crash course to kick-start with dynamic instrumentation for iOS apps
● Bypassing SSL Pinning with SSL Kill Switch and Objection
● Evaluate different implementations of Touch ID / Face ID and ways to bypass them
● Testing methodology with a non-jailbroken device by repackaging an IPA with the Frida Gadget
● Testing stateless authentication mechanisms such as JWT in an iOS Application
● Using Frida for Runtime Instrumentation of iOS Apps to bypass:
○ Anti-Jailbreaking mechanisms
○ Frida detection mechanism
○ and other client-side security controls

The course consists of many different labs developed by us and the course is roughly 50% hands-on and 50% lecture.

At the end of each day a small CTF will be played to investigate an app with the newly learned skills and there will be prizes :-)

After successful completion of this course, students will have a better understanding of how to test for vulnerabilities in mobile apps, how to mitigate them and how to execute tests consistently. The course is based on the OWASP Mobile Security Testing Guide (MSTG) and is conducted by one of the authors himself. The OWASP MSTG is a comprehensive and open source guide about mobile security testing for both iOS and Android.

Sven is the Technical Director of WithSecure in Singapore, specialized in penetration testing and application security. Next to offensive security engagements he has supported and guided software development projects for Mobile and Web Applications during the whole SDLC to build security in from the start.

Besides his day job Sven is one of the core project leaders and authors of the OWASP Mobile Security Testing Guide and OWASP Mobile Application Security Verification Standard and has created the OWASP Mobile Hacking Playground. Sven is giving talks and workshops about Mobile Security worldwide to different audiences, ranging from developers to students and penetration testers.

Network Threat Hunting & Incident Response

Michael Meixner, Rainer Sykora CISSP (Computerforensic & more GmbH)

WHAT DOES "THREAT HUNTING" MEAN?
- Threat Hunting technics on network level
- Threat Hunting on Microsoft Windows Active Directory
- Threat Hunting on Linux Systems / Memory Forensics
- Incident Response process


WHO SHOULD TAKE THIS TRAINING?
- IT-Security Administrators
- IT-Administrators with knowledge of protocols and basic LINUX skills
- Security analysts looking to hone their threat hunting skills
- Junior analysts looking to forward their security career
- Environments needing to quickly identify compromised systems
- IT Security Management and Leadership
- Active Directory / Windows Engineers


AUDIENCE SKILL LEVEL
Students should have a working understanding of IP communications. They should also have a basic understanding of network threat hunting.


STUDENT REQUIREMENTS
- Bring your own Notebook with local admin rights
- Min. 8 GB RAM and 100GB free disk space
- VMWare Player installed
- The ability to connect to the Ubuntu system via SSH


KEY TAKEAWAYS
- Acquiring and analyzing Linux memory
- Understand security risks and defensive mitigations
- Hardening Active Directory
- Identify tools and processes for network threat hunting
- How to set up a threat hunting environment
- Threat score system to prioritize artifacts
- Leveraging network findings to pivot into a forensic analysis

Mr. Michael Meixner, CISSP is the managing director of the renowned computer forensics company Computerforensic & more GmbH based in the south of Vienna. Mr. Meixner deals with IT security, threat hunting, incident response, cyber crime such as hack or phishing attacks, data theft, digital preservation of evidence, computer forensic analysis and much more to protect against cyber attacks. As a generally sworn and court-certified expert, Mr. Meixner offers forensic data backup, data reconstruction, data analysis, the preservation of evidence that can be used in court and the preparation of expert opinions. As part of numerous events on the subject of IT security and cybercrime, he passes on his knowledge in a practical way as a speaker.

R.S. gained his first relevant experience in the development of proxy servers and other application-level security products in the 90s. This brought him into close contact with the first commercial web filter solutions at an early stage, which soon prompted him to reorient himself. As a security officer in the health care sector, he was concerned for many years with the interoperability of various systems from OSI layer 0 to the very top. He gained theoretical knowledge - in the form of various data law and protection training courses - while working as a sysadmin in charge of networks, firewalls, proxies, virtualisation, storage and so on. He is currently employed as a technical consultant and architect at TEMS GmbH.

Online Training 28./29.11: Black Belt Pentesting / Bug Hunting Millionaire

Dawid Czagan (Silesia Security Lab)

Mastering Web Attacks with Full-Stack Exploitation

This training will take place online on 28./29.11

HackerOne bug hunters have earned over $100 million in bug bounties so far. Some of HackerOne customers include the United States Department of Defense, General Motors, Uber, Twitter, and Yahoo. It clearly shows where the challenges and opportunities are for you in the upcoming years. What you need is a solid technical training by one of the top HackerOne bug hunters.

Modern web applications are complex and it's all about full-stack nowadays. That's why you need to dive into full-stack exploitation if you want to master web attacks and maximize your payouts. Say 'No' to classical web application hacking. Join this unique hands-on training and become a full‑stack exploitation master.

Watch 3 exclusive videos (~1 hour) to feel the taste of this training:
- Exploiting Race Conditions: https://www.youtube.com/watch?v=lLd9Y1r2dhM
- Token Hijacking via PDF File: https://www.youtube.com/watch?v=AWplef1CyQs
- Bypassing Content Security Policy: https://www.youtube.com/watch?v=tTK4SZXB734 

Key Learning Objectives

After completing this training, you will have learned about:

  • REST API hacking
  • AngularJS-based application hacking 
  • DOM-based exploitation 
  • Bypassing Content Security Policy 
  • Server-side request forgery 
  • Browser-dependent exploitation 
  • DB truncation attack 
  • NoSQL injection 
  • Type confusion vulnerability 
  • Exploiting race conditions 
  • Path-relative stylesheet import vulnerability 
  • Reflected file download vulnerability 
  • Subdomain takeover 
  • XML attacks 
  • Deserialization attacks 
  • HTTP parameter pollution 
  • Bypassing XSS protection 
  • Clickjacking attack 
  • window.opener tabnabbing attack 
  • RCE attacks
  • and more…



What Students Will Receive

Students will be handed a VMware image with a specially prepared testing environment to play with all bugs presented in this training (*). When the training is over, students can take the complete lab environment home to hack again at their own pace.

(*) The download link will be sent after signing a non-disclosure agreement and subscribing to Dawid Czagan's newsletter.


Special Bonus

The ticket price includes FREE access to Dawid Czagan's 6 online courses:

  • Start Hacking and Making Money Today at HackerOne
  • Keep Hacking and Making Money at HackerOne 
  • Case Studies of Award-Winning XSS Attacks: Part 1 
  • Case Studies of Award-Winning XSS Attacks: Part 2 
  • DOUBLE Your Web Hacking Rewards with Fuzzing 
  • How Web Hackers Make BIG MONEY: Remote Code Execution

 

What Students Say About This Training

This training has been very well-received by students around the world. References are attached to Dawid Czagan's LinkedIn profile (https://www.linkedin.com/in/dawid-czagan-85ba3666/ . They can also be found here (https://silesiasecuritylab.com/services/training/#opinions ) - by training participants from companies such as Oracle, Adobe, ESET, ING, …

What Students Should Know

To get the most of this training intermediate knowledge of web application security is needed. Students should be familiar with common web application vulnerabilities and have experience in using a proxy, such as Burp Suite Proxy, or similar, to analyze or modify the traffic.

What Students Should Bring

Students will need a laptop with 64-bit operating system, at least 4 GB RAM (8 GB preferred), 35 GB free hard drive space, administrative access, ability to turn off AV/firewall and VMware Player/Fusion installed (64-bit version). Prior to the training, make sure there are no problems with running 64-bit VMs (BIOS settings changes may be needed). Please also make sure that you have Internet Explorer 11 installed on your machine or bring an up-and-running VM with Internet Explorer 11 (you can get it here: https://developer.microsoft.com/en-us/microsoft-edge/tools/vms/ ).

Dawid Czagan (@dawidczagan) is an internationally recognized security researcher and trainer. He is listed among the top hackers at HackerOne. Dawid Czagan has found security vulnerabilities in Google, Yahoo, Mozilla, Microsoft, Twitter and other companies. Due to the severity of many bugs, he received numerous awards for his findings.

Dawid Czagan shares his security bug hunting experience in his hands-on trainings “Hacking Web Applications – Case Studies of Award-Winning Bugs in Google, Yahoo, Mozilla and More” and “Black Belt Pentesting / Bug Hunting Millionaire: Mastering Web Attacks with Full-Stack Exploitation”. He delivered security training courses at key industry conferences such as Hack In The Box (Amsterdam), CanSecWest (Vancouver), 44CON (London), Hack In Paris (Paris), DeepSec (Vienna), NorthSec (Montreal), HITB GSEC (Singapore), BruCON (Ghent) and for many corporate clients. His students include security specialists from Oracle, Adobe, ESET, ING, Red Hat, Trend Micro, Philips and thengovernment sector (references are attached to Dawid Czagan's LinkedIn profile (https://www.linkedin.com/in/dawid-czagan-85ba3666/ ). They can also be found here: https://silesiasecuritylab.com/services/training/#opinions ).

Dawid Czagan is a founder and CEO at Silesia Security Lab – a company which delivers specialized security testing and training services. He is also an author of online security courses. To find out about the latest in Dawid Czagan’s work, you are invited subscribe to his newsletter (https://silesiasecuritylab.com/newsletter ) and follow him on Twitter (@dawidczagan) and LinkedIn (https://www.linkedin.com/in/dawid-czagan-85ba3666/ ). 

Online Training: Hacking JavaScript Desktop apps: Master the Future of Attack Vector

Anirudh Anand (7ASecurity)

This course is a 100% hands-on deep dive into the OWASP Security Testing Guide and relevant items of the OWASP Application Security Verification Standard (ASVS), so this course covers and goes beyond the OWASP Top Ten.

Long are the days since desktop apps were written in Delphi. What is common between Microsoft Teams, Skype, Bitwarden, Slack and Discord? All of them are written in Electron: JavaScript on the client.

JavaScript Desktop apps share traditional attack vectors and also introduce new opportunities to threat actors. This course will teach you how to review JavaScript desktop apps, showcasing Node.js and Electron but using techniques that will also work against any other desktop app platform. Ideal for Penetration Testers, Desktop app Developers as well as everybody interested in JavaScript/Node.js/Electron app security.

Get a FREE taste for this training, including access to video recording, slides and vulnerable apps to play with:
1.5 hour workshop - https://7asecurity.com/free-workshop-desktop-apps

All action, no fluff, improve your security analysis workflow and immediately apply these gained skills in your workplace, packed with exercises, extra mile challenges and CTF, self-paced and suitable for all skill levels, with continued education via unlimited email support, lifetime access, step-by-step video recordings and interesting apps to practice, including all future updates for free.

Teaser Video: https://www.youtube.com/watch?v=Qckegc2gbfo

Anirudh Anand is a security researcher with a primary focus on Web and Mobile Application Security. He is currently working as a Senior Security Engineer at CRED and also Security Trainer at 7asecurity. He has been submitting bugs and contributing to security tools for over 7 years. In his free time, he participates in CTF competitions along with Team bi0s (#1 security team in India according to CTFtime). His bounties involve vulnerabilities in Google, Microsoft, LinkedIn, Zendesk, Sendgrid, Gitlab, Gratipay and Flipboard.

Anirudh is an open source enthusiast and has contributed to several OWASP projects with notable contributions being in OWTF and Hackademic Challenges Project. He has presented/trained in a multitude of conferences including c0c0n, BlackHat Arsenal, BlackHat Europe Arsenal, HITB Dubai, Offzone Moscow, Ground Zero Summit Delhi and Xorconf.

Practical Secure Code Review

Seth Law (Redpoint Security, Inc.)

Ready to take your bug hunting to a deeper level? Ever been tasked with reviewing source code for SQL Injection, XSS, Access Control and other security flaws? Does the idea of reviewing code leave you with heartburn? This course introduces a proven methodology and framework for performing a secure code review, as well as addressing common challenges in modern secure code review. Short circuit your development of a custom secure code review process by gleaning from Seth & Ken's past adventures in performing hundreds of code reviews and the lessons we’ve learned along the way. We will share a proven methodology to perform security analysis of any source code repository and suss out security flaws, no matter the size of the code base, or the framework, or the language.

Seth Law is an experienced Application Security Professional with over 15 years of experience in the computer security industry. During this time, Seth has worked within multiple disciplines in the security field, from software development to network protection, both as a manager and individual contributor. Seth has honed his application security skills using offensive and defensive techniques, including tool development. Seth is employed as a security consultant, co-hosts the Absolute AppSec podcast with Ken Johnson, and is a regular speaker at developer meetups and security events, including Blackhat, Defcon, CactusCon, and other regional conferences.

[Video Courses + Online Support] Web Hacking Expert: Full-Stack Exploitation Mastery

Dawid Czagan (Silesia Security Lab)

Modern web applications are complex and it’s all about full-stack nowadays. That’s why you need to dive into full-stack exploitation if you want to master web attacks. Say ‘No’ to classical web application hacking, join this unique online training, and take your professional pentesting career to the next level.


I have found security bugs in many companies including Google, Yahoo, Mozilla, Twitter and in this online training I will share my experience with you. You will dive deep into full-stack exploitation of modern web applications and you will learn how to hunt for security bugs effectively.

 
This online training is composed of 



• Almost 5 hours of high-quality video courses with lots of recorded demos (LIFETIME access; the courses are listed below)



• 2 hours of live online training support (you can ask any questions you have about the attacks presented in the video courses and finding security bugs in companies like Google, Yahoo, Mozilla, Twitter)



Almost 5 hours of high-quality video courses with lots of recorded demos

You will get lifetime access to these 5 video courses:
1. Bypassing Content Security Policy in Modern Web Applications
- Introduction
- Bypassing CSP via ajax.googleapis.com  (FREE VIDEO)
- Bypassing CSP via Flash File
- Bypassing CSP via Polyglot File
- Bypassing CSP via AngularJS


2. Hacking Web Applications via PDFs, Images, and Links
- Introduction
- Token Hijacking via PDF  (FREE VIDEO)
- XSS via Image
- User Redirection via window.opener Tabnabbing


3. Hacking AngularJS Applications
- Introduction
- AngularJS: Template Injection and $scope Hacking  (FREE VIDEO)
- AngularJS: Going Beyond the $scope
- AngularJS: Hacking a Static Template
- Summary


4. Exploiting Race Conditions in Web Applications
- Introduction
- Exploiting Race Conditions – Case 1  (FREE VIDEO)
- Exploiting Race Conditions – Case 2
- Case Studies of Award-Winning Race Condition Attacks


5. Full-Stack Attacks on Modern Web Applications
- Introduction
- HTTP Parameter Pollution  (FREE VIDEO)
- Subdomain Takeover
- Account Takeover via Clickjacking

Lifetime access to these 5 video courses will be granted before participating in the live online training session. More information can be found in the section ”What students will receive”.
 

2 hours of live online training support

  •  Is anything not clear after watching the video courses? No worries, I am here to help you! You can ask any questions you have about the attacks presented in the videos.
  •  Do you want to take your professional pentesting career to the next level and have some questions? No problem, ask me anything you want!
  • Are you looking for some advice on how to find security bugs in companies like Google, Yahoo, Mozilla, Twitter (bug bounty programs)? Ask your question and I will do my best to help you.

 
What students should know

  • Common web application vulnerabilities

 
What students will learn

  • Become a web hacking expert
  • Dive into full-stack exploitation of modern web applications
  • Learn how hackers can bypass Content Security Policy (CSP)
  • Discover how web applications can be hacked via PDFs, images, and links
  • Explore how hackers can steal secrets from AngularJS applications
  • Check if your web applications are vulnerable to race condition attacks
  • Learn about HTTP parameter pollution, subdomain takeover, and clickjacking
  • Discover step by step how all these attacks work in practice (DEMOS)
  • Take your professional pentesting career to the next level
  • Learn from one of the top hackers at HackerOne

 
What students will receive
Students will receive lifetime access to 6 hours of high-quality video courses with lots of recorded demos (hosted on the 3rd party platform Grinfer; subject to terms of use and privacy policy). The access link will be sent after subscribing to my newsletter and before participating in the live online training session (during the live online training session, there will be time to ask questions about the attacks presented in the video courses and bug hunting at HackerOne – training support for the video courses).

 
What students say about my trainings
References are attached to my LinkedIn profile (https://www.linkedin.com/in/dawid-czagan-85ba3666/). They can also be found here (https://silesiasecuritylab.com/services/training/#opinions) - training participants from companies such as Oracle, Adobe, ESET, ING, …



Dawid Czagan (@dawidczagan) is an internationally recognized security researcher and trainer. He is listed among the top hackers at HackerOne. Dawid Czagan has found security vulnerabilities in Google, Yahoo, Mozilla, Microsoft, Twitter and other companies. Due to the severity of many bugs, he received numerous awards for his findings.

Dawid Czagan shares his security bug hunting experience in his hands-on trainings “Hacking Web Applications – Case Studies of Award-Winning Bugs in Google, Yahoo, Mozilla and More” and “Black Belt Pentesting / Bug Hunting Millionaire: Mastering Web Attacks with Full-Stack Exploitation”. He delivered security training courses at key industry conferences such as Hack In The Box (Amsterdam), CanSecWest (Vancouver), 44CON (London), Hack In Paris (Paris), DeepSec (Vienna), NorthSec (Montreal), HITB GSEC (Singapore), BruCON (Ghent) and for many corporate clients. His students include security specialists from Oracle, Adobe, ESET, ING, Red Hat, Trend Micro, Philips and thengovernment sector (references are attached to Dawid Czagan's LinkedIn profile (https://www.linkedin.com/in/dawid-czagan-85ba3666/ ). They can also be found here: https://silesiasecuritylab.com/services/training/#opinions ).

Dawid Czagan is a founder and CEO at Silesia Security Lab – a company which delivers specialized security testing and training services. He is also an author of online security courses. To find out about the latest in Dawid Czagan’s work, you are invited subscribe to his newsletter (https://silesiasecuritylab.com/newsletter ) and follow him on Twitter (@dawidczagan) and LinkedIn (https://www.linkedin.com/in/dawid-czagan-85ba3666/ ). 

[Video Courses + Online Support] Web Hacking Secrets: How to Hack Legally and Earn Thousands of Dollars at HackerOne

Dawid Czagan (Silesia Security Lab)

HackerOne is your big opportunity. This is the platform where you can hack legally and at the same time you can make money. You can hack many different companies like Twitter, Yahoo, Uber, Coinbase, and a lot more. And you can get paid for your findings, for example $100, $1,000, or even $10,000 per one bug. It’s just amazing. All you need is Internet connection and knowledge. Yes – you need knowledge to go from zero to thousands of dollars at HackerOne, and in this online training I’m going to share my knowledge with you.

I’m one of the top hackers at HackerOne and I know quite a lot about hacking and making money that way. In this online training I’ll present many award-winning bugs. The more you play with award-winning-bugs the more knowledge you get and the more knowledge you have, the more money you can make. I’ll also discuss a successful bug hunting strategy that I have been using in the recent years. What’s more, I’ll present a lot of demos, because I want you to see how all these things work in practice.


This online training is composed of 



 6 hours of high-quality video courses with lots of recorded demos (LIFETIME access; the courses are listed below)



• 2 hours of live online training support (you can ask any questions you have about the attacks presented in the video courses and bug hunting at HackerOne)
 

6 hours of high-quality video courses with lots of recorded demos

You will get lifetime access to these 6 video courses:


1. Start Hacking and Making Money Today at HackerOne
- HackerOne: Your Big Opportunity
- Getting Started with 5 Bugs
- Automatic Leakage of Password Reset Link  (FREE VIDEO)
- How to Get Access to the Account of the Logged Out User
- Insecure Processing of Credit Card Data
- Disclosure of Authentication Cookie
- User Enumeration


2. Keep Hacking and Making Money at HackerOne
- How to Impersonate a User via Insecure Log In  (FREE VIDEO)
- Sensitive Information in Metadata
- Disclosure of Credentials
- Insecure Password Change
- Dictionary Attack


3. Case Studies of Award-Winning XSS Attacks: Part 1
- XSS via Image
- XSS via HTTP Response Splitting
- XSS via Cookie  (FREE DEMO)
- XSS via AngularJS Template Injection


4. Case Studies of Award-Winning XSS Attacks: Part 2
- XSS via XML  (FREE VIDEO)
- XSS via location.href
- XSS via vbscript:
- From XSS to Remote Code Execution


5. DOUBLE Your Web Hacking Rewards with Fuzzing
- The Basics of Fuzzing
- Fuzzing with Burp Suite Intruder - Overview
- Fuzzing for SQL Injection - Demo  (FREE VIDEO)
- Fuzzing for Path Traversal – Demo
- Fuzzing with Burp Suite Intruder: Tips and Tricks


6. How Web Hackers Make BIG MONEY: Remote Code Execution
- From SQL Injection to Remote Code Execution   (FREE VIDEO)
- From Disclosure of Software Version to Remote Code Execution
- Remote Code Execution via File Upload
- Remote Code Execution via Deserialization


Lifetime access to these 6 video courses will be granted before participating in the live online training session. More information can be found in the section ”What students will receive”.



2 hours of live online training support

  • Is anything not clear after watching the video courses? No worries, I am here to help you! You can ask any questions you have about the attacks presented in the videos.
  • Do you want to start hacking at HackerOne and have some questions? No problem, ask me anything you want about bug hunting at HackerOne.
  • Are you already a bug hunter at HackerOne and need some advice on how to go to he next level? Ask your question and I will do my best to help you.

 
What students should know

  • Basic hacking skills
  • Basic knowledge of web application security
  • Basic understanding of XSS attacks (cross-site scripting)

 
What students will learn

  • Master web application security testing
  • Become a successful bug hunter
  • Go from zero to thousands of dollars at HackerOne.
  • Double your web hacking rewards with fuzzing
  • Learn how hackers earn thousands of dollars per one bug
  • Discover how to find these bugs step-by-step in practice (recorded DEMOS)
  • Learn from one of the top hackers at HackerOne




What students will receive
Students will receive lifetime access to 6 hours of high-quality video courses with lots of recorded demos (hosted on the 3rd party platform Grinfer; subject to terms of use and privacy policy). The access link will be sent after subscribing to my newsletter and before participating in the live online training session (during the live online training session, there will be time to ask questions about the attacks presented in the video courses and bug hunting at HackerOne – training support for the video courses).
 
What students say about my trainings
References are attached to my LinkedIn profile (https://www.linkedin.com/in/dawid-czagan-85ba3666/). They can also be found here (https://silesiasecuritylab.com/services/training/#opinions) - training participants from companies such as Oracle, Adobe, ESET, ING, …



Dawid Czagan (@dawidczagan) is an internationally recognized security researcher and trainer. He is listed among top hackers at HackerOne. Dawid Czagan has found security vulnerabilities in Google, Yahoo, Mozilla, Microsoft, Twitter and other companies. Due to the severity of many bugs, he received numerous awards for his findings.

Dawid Czagan shares his security bug hunting experience in his hands-on trainings “Hacking Web Applications – Case Studies of Award-Winning Bugs in Google, Yahoo, Mozilla and More” and “Black Belt Pentesting / Bug Hunting Millionaire: Mastering Web Attacks with Full-Stack Exploitation”. He delivered security training courses at key industry conferences such as Hack In The Box (Amsterdam), CanSecWest (Vancouver), 44CON (London), Hack In Paris (Paris), DeepSec (Vienna), NorthSec (Montreal), HITB GSEC (Singapore), BruCON (Ghent) and for many corporate clients. His students include security specialists from Oracle, Adobe, ESET, ING, Red Hat, Trend Micro, Philips and government sector (recommendations: https://silesiasecuritylab.com/services/training/#opinions).

Dawid Czagan is a founder and CEO at Silesia Security Lab – a company which delivers specialized security testing and training services. He is also an author of online security courses. To find out about the latest in Dawid Czagan’s work, you are invited subscribe to his newsletter (https://silesiasecuritylab.com/newsletter) and follow him on Twitter (@dawidczagan) and LinkedIn (https://www.linkedin.com/in/dawid-czagan-85ba3666/).





DeepSec Opening

DeepSec

The start of the beginning: Our short opening ceremony.

The DeepSec Team

Complexity killed the Cat

René Pfeiffer (DeepSec Conference Organisation)

Information technology can deal with complex scenarios and complex data structure. The information age has created powerful tools that made even more useful technologies and research possible. Computers can deal with a lot of data, enabling researchers to create more complex algorithms. Big data has become mainstream. Artificial intelligence is only a few years away, given the pace of progress. The GPT-3 language model is a stepping stone into a bright future. With the help of these tools, the problems of information security are no problems at all. There's a catch: The bright new future needs resources and is built on the foundation of complexity. Follow this presentation for a tour through the real challenges of information technology and the information society.

René „Lynx“ Pfeiffer was born in the year of Atari's founding and the release of the game Pong. Since his early youth he started taking things apart to see how they work. He couldn't even pass construction sites without looking for electrical wires that might seem interesting. The interest in computing began when his grandfather bought him a 4-bit microcontroller with 256 byte RAM and a 4096 byte operating system, forcing him to learn Texas Instruments TMS 1600 assembler before any other programming language.

After finishing school he went to university in order to study physics. He then collected experiences with a C64, a C128, two Commodore Amigas, DEC's Ultrix, OpenVMS and finally GNU/Linux on a PC in 1997. He is using Linux since this day and still likes to take things apart und put them together again. Freedom of tinkering brought him close to the Free Software movement, where he puts some effort into the right to understand how things work – which he still does.

René is a senior systems administrator, a lecturer at the University of Applied Sciences Technikum Wien, and a senior security consultant. He uses all the skills in order to develop security architectures, maintain/improve IT infrastructure, test applications, and to analyse security-related attributes of applications, networks (wired/wireless, components), (cryptographic algorithms), protocols, servers, cloud platforms, and more indicators of modern life.

Wireless Keystroke Injection As An Attack Vector During Physical Assessments

Simonovi Sergei (Scientific Cyber Security Association / Caucasus University)

A lot of wireless input devices are vulnerable to keystroke injection due to the lack of security mechanisms, which makes it a perfect attack vector. During the attack, an attacker can send any text string to the victim machine acting as a remote keyboard, which can lead to quick and stealthy compromise of the system. No antivirus software shall spot the attack, as the keyboard, even remote, is not malicious by itself and is always trusted.

Sergei was passionate about computers from childhood . He started his  IT Career as a service technician, slowly moving towards network and system administration, then to DevOps and finally ending up in cyber security. Became AWS Certified in 2019. Obtained the OSCP Certification in April of 2022.

We Are Sorry That Your Mouse Is Admin - Windows Privilege Escalation Through The Razer Co-installer

Oliver Schwarz (SySS GmbH)

Device-specific co-installers have repeatedly allowed for Windows privilege escalation.
Through Windows' plug'n'play concept, attackers don't need to rely on any preinstalled software on the victim client. All they need is a peripheral device associated with the vulnerable driver – or simpler, a hacking device that simply impersonates such device.

In this talk, I'll report on my responsible-disclosure journey for a DLL hijacking in the Razer Synapse service for gaming devices. The journey starts with me trying to fake a vulnerability and suddenly realizing that the vulnerability is actually real. It continues with a support team that apologized to me for my escalated privileges. You will also learn about a number of fixing attempts and insights about Windows’ access control that helped to circumvent these attempts. The final twist: we recently discovered that the fix we ended up approving can be fooled quite easily. In other words: this story is the sequel to what we have published before.

The main purpose of the presentation is to entertain you by sharing the anecdotes from this interesting journey and demoing the attack. But besides that, admins, developers and researchers will also learn about the security risks that arise from co-installers and placing binaries into directories where they don’t belong. Finally, I want to motivate researchers to have a closer look into other co-installers. Interesting Windows privilege escalation vulnerabilities seem to wait out there.

Oliver works as a pentester for the German IT security company SySS GmbH.
Besides finding vulnerabilities in applications and networks, he also enjoys presenting hacks to layman audiences, for fun and awareness. This was also how he discovered the vulnerability presented in his talk.

Before his practical hacking career, Oliver worked as academic security researcher and did his PhD at KTH Royal Institute of Technology on the formal verification of separation kernels.

Secure and Flexible Precision Farming - with Drones

Dr. Markus Tauber (Research Studios Austria Forschungsgesellschaft mbH)

Increasing challenges in food provision along with the need for environmental protection require a rethinking in the agricultural sector. Digitalization and automation approaches, such as precision farming, provide a promising approach to optimize resource usage and efficiency. The provision of passive digital services for monitoring and managing small scale farms has the potential to reshape the sector, as it supports existing infrastructures and ecosystems near the consumer rather than introducing large scale automated agricultural systems which are more volatile to supply chain disruptions. But like every IoT based service, it requires security concepts to prevent unsatisfactory situations and increases the trust in its usage.

 

I am currently working as chief scientific officer that the Research Studios Austria (RSA FG) where we focus on Artificial Intelligence, Data Science, Competence Based Training, XR, Smart Agent Technologies, Training and Learning Platforms and more.

Until recently I have been working as FH-Professor at the University of Applied Sciences Burgenland, where I was responsible for coordinating the Master's Program "Cloud Computing Engineering". In a second role I have been leading the related research area Cloud & CPS Security in the University and in its subsidary Forschung Burgenland.

The Need For a Human Touch In Cyber Security

Erlend Andreas Gjære (Secure Practice)

In a technical world of cyber, crypto and cloud, it is easy to forget that in the end, we are all humans. While social engineering has always been a craft of its own on the attacker side, our efforts as human defenders are scattered between various technical measures and not always very effective awareness training - sometimes even counterproductive ones.

However, regardless of cyber specialization, some people skills are needed to maximize impact. This goes all the way from building alliances, communication and "selling" your ideas, to building more resilient processes, organizations and software through empathy for both our technical and non-technical colleagues. Heck, we can even apply certain people skills to understand our adversaries better, profile their motivations, and predict their next actions.

Therefore, this talk will explore a variety of techniques freely available to anyone looking to boost their output of efforts to stop cybercriminals.

Erlend Andreas Gjære is a specialist in security and people, with a focus on security awareness, training and culture, risk, behavior and user experience. He received his MSc degree in Informatics from the Norwegian University of Science and Technology (NTNU) in Norway, and then worked six years as a research scientist, before transitioning to industry work as a consultant and security manager. He is now co-founder & CEO Secure Practice, working to unlock a more human approach to reducing cyber risk.

GitHub Actions Security Landscape

Ronen Slavin (Cycode)

GitHub Actions, the recent (from 2018) CI/CD addition to the popular source control system, is becoming an increasingly popular DevOps tool mainly due to its rich marketplace and simple integration.

As part of our research of the GitHub Actions security landscape, we discovered that in writing a perfectly secure GitHub Actions workflow, several pitfalls could cause severe security consequences. For example, many developers would use event input data to improve their workflow process. However, this data could be controlled by an attacker, and potentially compromise the build process. Unless the developers are proficient in the depths of GitHub best-practices documents, these workflows would have mistakes. Such mistakes are costly - and could cause a potential supply-chain risk to the product.

During the talk, we’ll walk you through our journey on how we found and disclosed vulnerable workflows in several popular open-source tools, delved into GitHub Actions architecture to understand the possible consequences of these vulnerabilities, and present what could be the mitigations for such issues.

Ronen Slavin is Chief Technology Officer and co-founder of Cycode with expert knowledge in cybersecurity. Previously, he was the CTO and co-founder of Filelock that uniquely developed a solution to protect data even after a breach has occurred. Fileock was acquired by Reason Software in 2018 where Ronen moved to Lead the development of their Windows endpoint protection solution and security research. Prior to that Ronen worked on offensive cybersecurity research for a technology firm building commercial tools for government agencies. Ronen served roles as an R&D team leader, developer and architect in the Israeli Intelligence Corps and holds an M.Sc. in Computer Science with focus on Cyber Security from Bar Ilan University.

Developing and testing ICS related challenges for the Haaukins CTF platform

Robert Nedergaard Nielsen, Kristian Helmer Kjær Larsen (Aalborg University)

Haaukins is a highly accessible platform for security education, which allows users to try out ethical hacking and penetration testing through a browser. It makes it possible to conduct trainings for even large groups without the need for installing virtual environments or other tools – the participants can work on their own laptops just through their web browser of choice and have access within a couple of minutes.
Haaukins is designed with training in mind rather than for competition. For this reason, several features are implemented such as Dynamic Flags, so the teams cannot exchange flags between each other, and a randomization of IP addresses throughout the challenges, so teams really must work their own way through.
Haaukins allows the teacher/instructor to set up an event using a web interface web interface, by specifying a set of challenges and the number of labs needed. The process of setting up the labs is then fully automated. When the event is ready the students can then enroll themselves to the event automatically getting a lab assigned on enrollment.
Contributing new challenges to the challenge pool is easily done, as these can consist of any set of docker images or VirtualBox machines.
Following the recent trends within cybersecurity the focus of developing new challenges for Haaukins has recently been focused on how to develop challenges within ICS/OT.
Testing the newly developed challenges working with commonly used protocols withing ICS/OT and simple supply chain attack on people within the industry has received very good feedback.

T.B.A.

Protecting Your Web Application/API With CrowdSec

Klaus Agnoletti (CrowdSec)

Protecting your web applications and apis are more important than ever. Especially these days where one can deploy their application in the cloud, where everything but the application itself is a standardized application constantly updated for you by continuous patch processes, it is more evident than ever that the biggest risk is present in the code you produce yourself and expose to the internet.

But what are the risks? And how to mitigate them? And is it true that APIs don't need to be secured as much as your website?
All competent security professionals know that there's no such thing as a silver bullet, so obviously creating an AppSec program is inevitable to achieve a sufficient security posture.

But how do we handle the remaining risks?
CrowdSec is a FOSS security tool that can be used for those (as well as many other risks). I'll show you how to achieve this without it costing an arm and a leg.

Klaus Agnoletti has been an infosec professional since 2004. As a long time active member of the infosec community in Copenhagen, Denmark he co-founded BSides København in 2019. Currently as Head of Community in CrowdSec one of his current roles is to spread the word and inspire an engaging community.

Auditing Closed Source Trusted Applications for Qualcomm Secure Execution Environment (QSEE)

Hector Marco & Fernando Vano (Cyber Intelligence S.L.)

Smartphones have become essential devices for carrying out many daily activities, including security-sensitive tasks such as authentication and payments. The security of sensitive data in modern mobile devices rely on hardware-enabled Trusted Execution Environments, amongst which ARM TrustZone is one of the most widely used. Qualcomm Secure Execution Environment (QSEE) is one of the most widespread commercial TEE solutions in the smartphone space, used by many different devices such as Xiaomi, Motorola and several devices of the Google Nexus and Pixel series.

In order to audit the QSEE environment, security researchers have to face different challenges. On the one hand, the software components of QSEE (i.e., trusted operating system and trusted applications) are not open sourced and can be quite complex, which requires a considerable extent of reverse engineering efforts to conduct analysis and to assess their security. On the other hand, to the best of our knowledge there are no publicly available emulators for QSEE Trusted Applications that assist in debugging and auditing their code.

In this talk, we share the knowledge we obtained from a careful reverse engineering examination of different QSEE Trusted Applications and operating systems (QSEE-OS), showing the different versions of QSEE-OS and the differences with regard to how trusted applications are loaded in each of the QSEE-OS versions. Besides, we will present the different tools we have developed throughout our research to assist in the security evaluation of QSEE, including a debugger for QSEE Trusted Applications fully integrated with GDB and Ghidra and a coverage-based fuzzer for QSEE Trusted Applications. Such tools are essential for us to better understand the internals and behaviour of the trusted applications, to find attack surfaces and to identify vulnerable code for further analyzing and fuzzing.

Hector Marco is a cybersecurity expert with more than 15 years of experience. He holds a PhD in cybersecurity where he found multiple vulnerabilities that have been awarded by Google and Packet Storm Security. He is the founder of Cyber Intelligence S.L., a Spanish experienced company specialized in software and hardware security. The company has developed their own tools and methods which allow to perform unique pentestings and vulnerability assessments. Cyber Intelligence has led several national and international security contracts and has successfully evaluated multiple products discovering multiple 1- and 0-day vulnerabilities.

Fernando Vano is a Lead Security Researcher at Cyber Intelligence S.L., where he specializes in smartphone security, reverse engineering and fuzzing. He holds a PhD in cybersecurity and his main research interests include mobile devices, memory management in cloud computing, critical infrastructures and virtualization technologies. During the last few years, he has participated in many cybersecurity research projects. Fernando is author of many articles on computer security and cloud computing. He has contributed on several occasions as a reviewer for international scientific conferences and reputable scientific journals.

Iran: A Top Tier Threat Actor

Steph Shample (Middle East Institute)

This presentation,conducted hundreds of times throughout the United States on Wall Street, at various American universities, and throughout the US Defense sector, will go into detail on the evolution of the Iranian cyber program, its current state and most common malware, as well as what geopolitical events and relationships influence Iranian cyber actors. It will also detail why Iran needs to be taken seriously as a digital threat, as they indeed operate at the same level as malicious Russian and Chinese threat actors.

Steph Shample is a Non-Resident Scholar with the Middle East Institute's Cyber Program and Senior Analyst at Team Cymru.

For the past 16 years, her career has focused on analyzing Iran in various capacities, including its tense relationships with Middle Eastern countries as well as their bordering states, and countering Iranian roles in terrorism, proliferation, and narcotics.

During her military career, Steph gained operational experience across the Middle East, Levant, and Central and South Asia. She also completed two deployments to Afghanistan, one military and one as a civilian.

Communicative Incident Response

Hauke Gierow, Paul Gärtner (PIABO)

Crisis communication is probably the hardest part of communication to get right - and the most important. Combine this with a successful attack attempt on a companies network that completely shatters operation and you have all the ingredients for disaster.

But especially in situations like this it is imperative to stay calm and remain in contact with the outside world. In this talk we will relay best practices for crisis communication and how they specifically apply to IR situations.

We will show the best and the worst attempts to manage a crisis - and demonstrate, that situations like this can be used to reposition a company and build trust, rather than loosing it.

Hauke has been in cybersecurity communications for ten years - and currently leads the cybersecurity practice of PIABO, Europes leading agency for tech pr and communications. He served as head of communications at G DATA CyberDefense, was an editor at Golem.de and built the cybersecurity program of Reporters Without Borders.

Paul is a communications professional creating narratives and visibility for international deeptech companies. As practice director he runs PIABOs communication activities for companies in the blockchain space. He likes to keep an eye out for anything new and innovative.

Working In Warzones In Theory And In Practice

Enno Lenze (Berlin Story)

The difference between theory and practice is much smaller in theory than in practice. This also applies to physical and digital security in war zones. While those at home imagine journalists driving certified armored vehicles and using special encrypted devices, in practice it is often a Toyota Corolla and WhatsApp. Why is that the case? I will try to explain the different aspects and reasoning behind the decisions on digital and physical security based on real-world experiences and examples.

Enno Lenze, born in Bochum in 1982, started his own business as an IT consultant at the age of 18. Later administered LAMP systems and then started reporting from the world’s crisis areas and war zones as a journalist: Kurds against IS, protests in Hong Kong, Israel against Hamas, Afghanistan under the Taliban and since March from Ukraine. This experience is also used for consulting companies and individuals going into these areas for the first time.

End-to-end Health Data Privacy Using Secure 5G Data Channels

Dr. Razvan Bocu (Transilvania University of Brasov, Romania, Department of Mathematics and Computer Science)

The integrated collection of personal health data represents a relevant research topic, which is enhanced further by the development of next generation mobile networks that can be used in order to transport the acquired medical data. The gathering of personal health data has become recently feasible using relevant wearable personal devices. Nevertheless, these devices do not possess sufficient computational power, and do not offer proper local data storage capabilities. This paper presents an integrated personal health metrics data management system, which considers a virtualized symmetric 5G data transportation system. The personal health data is acquired using a client application component, which is normally deployed on the user’s mobile device, regardless if it is a smartphone, smartwatch, or another kind of personal mobile device. The collected data is securely transported to the cloud data processing components, using a virtualized 5G infrastructure and homomorphically encrypted data packages. The system has been comprehensively assessed through the consideration of a real-world use case, which is presented.

Razvan Bocu Transilvania University of Brasov. Department of Mathematics and Computer Science, Brasov 500091, Romania (razvan.bocu@unitbv.ro). Dr. Bocu is a Research and Teaching Staff Member in the Department of Mathematics and Computer Science at the Transilvania University of Brasov, Romania. He received a B.S. degree in Computer Science from Transilvania University of Brasov in 2005, a B.S. degree in Sociology from Transilvania University of Brasov in 2007, an M.S. degree in Computer Science from the Transilvania University of Brasov in 2006, and a Ph.D. degree from the National University of Ireland, Cork, in 2010. He is the author or coauthor of 42 technical papers, together with eight books and book chapters. Dr. Bocu is an editorial reviewing board member for the following technical journals in the field of Information Technology and Biotechnology: Journal of Network and Computer Applications, IEEE Transactions on Dependable and Secure Computing, IEEE Access, International Journal of Computers Communications & Control, Sensors, Symmetry, Algorithms, Big Data and Cognitive Computing, and several other ones.

Workshop: Trying out ICS challenges in a CTF (1/2)

Robert Nedergaard Nielsen, Kristian Helmer Kjær Larsen (Aalborg University')

In this session we’ll play with the Haaukins CTF platform presented in the “Developing and testing ICS related challenges for the Haaukins CTF platform”. The participants will be presented with friendly CTF where they can try out some of the existing ICS challenges and come with feedback on these and ideas for new challenges.

T.B.A.

OPSEC - The Discipline Of The Grey Man

Robert Sell (Trace Labs)

During operations, it is not unusual for us to get excited about the target and to prematurely begin before we have adequately prepared. As a result, this can not only spoil an operation but can cause dire life-threatening consequences. This talk goes over why OpSec is so important, failures people often make and how we can greatly improve our operational security during intelligence gathering and operations. While I will cover sock puppets and other techniques in detail, I will also cover physical considerations, habits and other areas where risks can be generated unless the operator is careful and diligent.

Robert is the founder and president of Trace Labs, a non profit organization that crowdsources open source intelligence (OSINT) to help locate missing persons. He has spoken at conferences and podcasts around the world on subjects such as social engineering, open source intelligence, physical security, insider threats, operational security and other topics. Robert primarily works in the aerospace industry where he assists newly acquired organizations to secure their environments. This includes all aspects of security in regions around the world. In 2017 and 2018 he competed at the Social Engineering Village Capture the Flag contest. He placed third in this contest (both years). In 2018, he actually ran his own Trace Labs OSINT CTF while participating (and placing 3rd) in the SECTF at Defcon Vegas. Robert is also a ten year volunteer with Search and Rescue in British Columbia, Canada. In his search & rescue capacity, Robert specializes in tracking lost persons and teaching first responders how to leverage OSINT.

Identification of the Location in the 5G Network

Giorgi Akhalaia (Caucasus University, Scientific Cyber Security Association)

Mobile devices can provide the majority of everyday services: like emergency, healthcare, security services. The development of mobile devices itself triggered the 5G network deployment. The new telecom standard will create a new ecosystem with a variety of industries and will exceed the limit of telecom communication. With new standards, functionality, services, products always arise new cyber threats. The operating spectrum in the 5G Network is divided into 3 categories: Low, Middle and High Bands. Actually, the third category, high band, also known as mmWave provides majority benefits of the new standard. This band covers from 6 GHz to 100 GHz operating spectrums. Because of the limitation of this frequency range, devices connected to high-band have to be near to the cell-tower. Otherwise, buildings will interrupt the connection. So, when a user is connected to a mmWave tower, only one tower is enough to determine the location of device, instead of 3 towers, which is usually used in previous standards. By default, mobile devices always scan cell-towers to choose that one with stronger signal. Our study is about to interrupt the scanning operation and make devices connect only to high-band towers without measuring signal strength. As towers are always sending their identities, like IDs and locations, we can map all of them after we stole active tower information from a user and determine its location.

Giorgi Akhalaia is Ph.D candidate of computer science. Giorgi has defended his Master’s degree at Caucasus University, Caucasus School of Technology (Program: IT Management). Giorgi is an Assistant-Professor at Caucasus University and at International Black Sea University (department Cyber Security). He is cyber security trainer at the Scientific Cyber Security Association and Orient Logic Academy. Giorgi is a cyber security specialist and actively involved in the Cyber Security Center, CST (Caucasus University), which is the official representative of BITSENTINEL in the region. From 2014, he was involved in scientific studies at the Institute of Earth Sciences and by 2016, Mr. Akhalaia was promoted as an Acting Head of Scientific Geodesy Network of Georgia. He is responsible for managing and maintaining online and data servers, data collecting and processing as well as for upgrading and development of services and staff of the department.
In 2019, Giorgi was involved in various international and local projects. Right now, he is security oriented IT System Admin in the project of Seismic Network Expansion in the Caucasus and Central Asia (Project between 7 countries), funded by The US Department of Energy. In 2020 he won the PhD fund from Shota Rustaveli National Science Foundation of Georgia. Project title is “5G Network security”. In the framework of this fund, a micro 5G lab will be created for testing and deploying new security functions.
https://orcid.org/0000-0002-4194-2681

Workshop: Trying out ICS challenges in a CTF (2/2)

Robert Nedergaard Nielsen, Kristian Helmer Kjær Larsen (Aalborg University')

In this session we’ll play with the Haaukins CTF platform presented in the “Developing and testing ICS related challenges for the Haaukins CTF platform”. The participants will be presented with friendly CTF where they can try out some of the existing ICS challenges and come with feedback on these and ideas for new challenges.

T.B.A.

Ukrainian-Russian Warfare In Cyberspace: Technological And Psychological Aspects

Sergiy Gnatyuk (National Aviation University)

On 24th of February, 2022, the life of Ukrainians has changed fundamentally. Russian troops attacked peaceful Ukrainian cities and civilian infrastructure, using all possible means and bridgeheads – land, sea, air and cyberspace. Predictably, given the technological conditions, the cyberspace has become one of the main arenas of combat in this war. Powerful cyber-attacks (more than 1,100 attacks so far) on the state's critical information infrastructure were accompanied by destructive information and psychological effects and special psychological operations (PSYOP). However, as in other domains, Ukraine persevered in cyberspace, fought back and counterattacked the enemy.

At DeepSec up-to-date information on the specifics of cyber-attacks on the technological infrastructures (DoS-attacks, malicious software, unauthorized data collection, etc.) will be presented and analyzed, as well as attacks on the population (mis- and disinformation, deep fakes, etc.). Current initiatives and projects developed by the state (SSSCIP, CERT-UA, Cyber Police) together with IT and cyber volunteers to consolidate efforts and counter Russian aggression in cyberspace will be considered. Current cyber projects of NAU Cybersecurity R&D Lab and the Scientific Cyber Security Association of Ukraine will be also presented and discussed.

Sergiy Gnatyuk holds a PhD and DSc (second academic research degree in Ukraine) in Cyber Security, he is a Professor in Computer Science. Sergiy is a Professor and the Vice-Dean of the Faculty of Cybersecurity, Computer and Software Engineering at National Aviation University as well as Scientific Advisor of the NAU Cybersecurity R&D Lab https://cyberlab.fccpi.nau.edu.ua Dr. Gnatyuk is Co-Founder and President of the Scientific Cyber Security Association of Ukraine (SCSA-UA) https://scsa.org.ua Also, Sergiy is a Cyber Security expert and consultant for state and private Ukrainian and international organizations. He is a speaker and organizer of many international cyber security events as well as an author of many books, patents and papers. Main research interests are cyber security, cryptography, QKD, 5G security, incidents response, CIIP and others.

A Survey Of Secure In-vehicle Communication

Miltos D. Grammatikakis (Hellenic Mediterranean University)

We aim to review existing research on protocols, patterns, and generic paradigms that support secure in-vehicle communications. In addition, we present methods, tools, and related open source development platforms for preliminary experimentation. We also examine how to to leverage lightweight cryptography into security solutions, including integrating Crypto ICs (e.g., Zymbit Zymkey, Microchip ATECC series). Finally, we examine interactions between security and traditional quality-of-service characteristics (message efficiency and reliability), and propose interesting open problems related to the design of secure and reliable gateways for automotive solutions and beyond.

Miltos D. Grammatikakis is a Professor in the Department of Electrical and Computer Engineering at the Hellenic Mediterranean University in Greece. His expertise is on distributed, parallel, and embedded systems design/development. More recently, he enjoys working at the intersection of embedded security, real-time, and reliability issues.

Post-quantum Verkle Signature Scheme

Maksim Iavich (Caucasus University, Scientific Cyber Security Association)

Mass production of quantum computers is expected in the near future. Quantum computers can easily break cryptographic schemes that are used in practice. Thus, classical encryption systems become vulnerable to attacks using quantum computers. There are research efforts to find encryption schemes that are resistant to attacks using quantum computers. Digital signatures are an important technology in securing the Internet and other IT infrastructures. A digital signature provides the authenticity, integrity, and identification of data. Digital signatures are used in identification and authentication protocols. So, these secure digital signature algorithms are crucial in terms of IT security.
Today, in practice, digital signature algorithms such as RSA, DSA, ECDSA are used. However, they are not quantum stable as their safety relies on large composite integers, complex factorization and the computation of discrete logarithms.

Maksim Iavich has a Ph.D. in mathematics and is a professor of computer science. In 2018, he was acknowledged as the best young scientist of Georgia in computer science. Maksim is an affiliate professor and the Head of cyber security direction at Caucasus University. He is also Head of the information technologies bachelor and of the IT management master programs. Since 2020, Maksim Iavich is an expert-evaluator at National Center for Education Quality Development of Georgia. Prof. Iavich is a Director of the Cyber Security Center, CST (CU), which is the official representative of BITSENTINEL in the region. He leads bachelor and master IT programs at this university. He is CEO & President of Scientific Cyber Security Association (SCSA). Maksim is cybersecurity consultant in Georgian and international organizations. He is a speaker at international cyber security conferences and is the organizer of many scientific cyber security events. He was the key speaker at Defcamp in 2018-2021. He has many scientific awards in the cyber security field. Maksim is the author of many scientific papers. The topics of the papers are cyber security, cryptography, post-quantum cryptography, quantum cryptography, mathematical models, and simulations.
FELLOWSHIPS AND AWARDS:
-2020 Scholar, DeepSec, Austria
-2019 Best paper award, IVUS-2019, Vytautas Magnus University, Lithuania
-2018–2019 The best young scientist of Georgia in computer science, Shota Rustaveli National Science Foundation of Georgia, Georgia
-2018 Best paper award, IVUS-2018, Vilnius University Kaunas Faculty, Lithuania
-2015 Scholarship of the young scientist, Shota Rustaveli National Science Foundation of Georgia, Georgia

Towards The Automation Of Highly Targeted Phishing Attacks With Adversarial Artificial Intelligence

Francesco Morano and Enrico Frumento (Cefriel - Polytechnic of Milan)

The work we will present aims to develop a Proof of Concept (PoC) of an attack scenario that uses Artificial Intelligence (i.e., AI) to create a semi-automatic phishing attack. The AI-based PoC used different network types to automatically compose highly targeted phishing emails with information derived from the initial OSINT analysis of the potential victims. The study approaches the problem from a cybercriminal point of view to understand the feasibility of such an attack tactic and prepare for possible defences.

Phishing is a popular way to perform social engineering attacks. According to the Verizon 2022 Data Breach Investigations Report, 82% of data breaches involve human elements and belong to several categories, including phishing, the most common. Using AI tools, this study implements a complete attack chain:

(i) initial collection of victims' data through OSINT,
(ii) generation of phishing email body using a GPT-2 and
(iii) creation of the graphic mimicking the real organisation brand identity (i.e., logo and stylistic features) through other models.

The paper presents the steps needed to prepare an effective phishing strategy and discusses whether and how AI can automate it. This study helps penetration testers and red teams build targeted phishing simulations more rapidly. The result is discussed in terms of the simulated attack's efficiency.

The aim is to provide red and purple teams with a methodological approach to social engineering attacks by continuing the work started by one of the authors in a previous study. The study objective is to explore the AI's potentialities in a full OpSec attack stack: wearing the attackers' hat and performing a full attack. A semi-automatic attack vector created the phishing email.



Dr. Enrico Frumento is a Senior Domain Specialist in the cybersecurity team at Cefriel, ICT Center of Excellence for Research, Innovation, Education and industrial Labs partnerships. He is the author of subject-related publications and books and member of the European CyberSecurity Organisation and the European Digital SME Alliance. His 20+ years of research activity focuses on unconventional security, cybercrime intelligence technologies tactics and techniques, the contrast to the modern social engineering and dynamic assessment of organisations‘ vulnerabilities corresponding to tangible and intangible assets at risk.

Dr. Francesco Morano is a scientific researcher and technical consultant in the Cybersecurity team at Cefriel. He is a member of the Order of Engineers and began his career in scientific research by taking part in several European projects. During his undergraduate and early professional years, he devoted himself to researching the most innovative technologies applied to applied to various fields, including image processing and cybersecruity

Attacking Developer Environment Through Drive-by Localhost Attacks

Joseph Beeton (Contrast Security)

There is a widespread belief that services that are only bound to localhost are not accessible from the outside world. Developers for convenience sake will run services they are developing configured in a less secure way compared to how they would (hopefully!) do in higher environments.


By compromising websites developers use, just injecting JS into adverts served on those sites or just a phishing attack that gets the developer to open a web browser on a compromised page, it is possible to reach out via non pre-flighted http requests to those services bound to localhost, by exploiting common misconfigurations in Spring, or known vulnerabilities found by myself and others. I'll demonstrate during the talk, it is possible to generate a RCE on the developer's machine or other services on their private network.


As developers have write access to codebases, AWS keys, server creds etc., access to the developer's machine gives an attacker a great deal of scope to pivot to other resources on the network, modify or just steal the codebase.

I'm a recovering Java Developer. I started my career as a Java developer writing Archive/Backup software before moving to a large financial company working on webapps and the backend APIs. However, after a while writing yet another microservice isn't that much fun anymore, but breaking them was. So I moved to Application Security and from their to Research. Now I work as Security Researcher for Contrast Security.

Machine Learning Use In OSINT

Giorgi Iashvili (Caucasus University, Scientific Cyber Security Association)

Open source intelligence is one of the important aspects during cyber security activities as it relies on the publicly available sources, such as social networks, websites, blogs etc. This includes data mining and gathering techniques, as well as data extraction and data analysis activities. Open source intelligence is widely used in different fields today. Mainly this process runs manually and is fully managed by humans. Moving from a manual to automated processes in OSINT is vital especially that we work with real-world operations. Different components must be used to build a relevant system to provide automated open source based activities together with training simulations for the Machine Learning.


The structure of the ML approach is the following:
- Requirements: Information used from previous user experience;
- Collection: Web crawlers or / and scrapers;
- Processing exploration: Pattern recognition, Detection of the events, Vision of the automated system;
- Analysis: Matching the pattern, Visualization process, Data analysis;
- Dissemination: Automated responses, Automated Error messages;

The processes will be performed by the machine using automated processes mechanisms.

Giorgi Iashvili has a Ph.D. in informatics and is an associate professor at Caucasus University.  Prof. Iashvili is a Deputy director of the CyberSecurity Center at Caucasus University. He is also the technical director at the  Scientific Cyber Security Association (SCSA). Giorgi Iashvili is the author of many scientific papers. The topics of the papers are cyber security, cryptography, OSINT, hardware security, and AI.




Malware And Exfiltration : A Telegram Story

Godwin Attigah (Google)

Exfiltration and command and control are essential parts of the adversary's kill chain. One of the primary goals of a malicious adversary is to exfiltrate data from an environment undetected and uninterrupted.

As a result, several attackers have opted for third-party services typically sanctioned for use in most enterprises. The accepted status of such applications coupled with an established developer ecosystem makes services such as Slack and Telegram suitable for their exfiltration and command and control tool of choice.

We have observed the usage of Telegram in different types of malicious activities including but not limited to ransomware, phishing, remote access trojans and stealers. We will discuss active samples found in the wild with a particular emphasis on stealers. Stealers are a class of malware that are primarily interested in gathering information on a host. Recent examples of Telegram in Stealers include Lapsus$ compromise of major enterprises such as Microsoft, Okta, and Nvidia. They are particularly interested in credentials and information related to financial assets (fiat and crypto): E.g.
Saved passwords
Cryptocurrency wallets
Credit cards
Files from personal directories
Direct messaging applications sessions (Telegram, WhatsApp, etc.)
OS information
Machine credentials
Geolocation
Screenshots(in some cases live webcam view)

Our discussion will cover the exfiltration and detection evasion techniques on different platforms, including but not limited to Windows, macOS, and Android. In furtherance of the point, we introduce how malware-as-a-service provides easily accessible kits to entry-level and sophisticated malicious actors, thus reducing entry barriers, particularly in the stealer and ransomware community.

In our analysis, we observed a varied level of attacker operational competency. Attackers falter in several stages of the attack process, and we discuss some of their shortcomings and the best practices when it comes to using Telegram.
The techniques we discuss include:
Correlating attacker identity to the real world
- Image Correlation
- Username correlation
Message Interception via
- Updates
- WebHooks

Throughout the talk, we provide several samples that use Telegram as an exfiltration vector and had one or no detections in VirusTotal. The absence of detections underscore the essence of building an enterprise that is aware of the shortcomings of vendor security products as well as open source intelligence sources. We also provide detections and common patterns we see associated with samples in the space.

Godwin Attigah is a Security Engineer at Google. Before working at Google, they worked at Microsoft's Cyber Defense Operation Center, where they primarily focused on detecting and managing incidents involving state-sponsored actors. Godwin's work in security includes reverse engineering, detection engineering, security tool development, statistical modeling, and machine learning. Godwin holds a Masters's Degree in Computer Science from Johns Hopkins University and a BSc in Mathematics and Computer Science from the University of North Carolina at Chapel Hill.
Godwin works on global issues outside of cybersecurity, including but not limited to reducing global deaths from indoor pollution.

Industrial-Security vs. IT-Security - What Can We Learn From Each Other?

Michael Walser (sematicon AG)

In the age of digitalisation, classic IT and industry are moving ever closer together. Devices are being networked and more and more smart devices are flooding the production hall. However, IT security is often disregarded in the process. Every device in the network can be compromised and requires an adapted strategy. Experience from 30 years of IT security gives the industry an orientation - but does not solve its problems. The challenges are often completely different, and the situation often requires completely different approaches. We try an approach and show experiences from the work with our customers and partners and give food for thought on what an IT security strategy for industry can look like and what both worlds can learn from each other.

Michael Walser is a board member and CTO of the Munich-based security company sematicon AG. In this role, he is responsible for the company's technical strategy and advises customers on the secure implementation of the digital transformation. After graduating in electrical engineering, he worked for many years as a consultant and advisor on successful IT security projects with a focus on cryptography and identity and access management worldwide and was responsible for implementation.

Trace Labs OSINT Search Party for Missing Persons CTF (1/4)

TraceLabs (TraceLabs)

The Trace Labs Search Party CTF is a nontheoretical, gamified effort that allows for the crowdsourcing of contestants to perform a single task: Conduct open source intelligence operations to help law enforcement find missing persons. The search will be done in teams and supervised by a team of judges.

See the description here: https://deepsec.net/docs/C0311_Trace_Labs_Missing_Persons_CTF.pdf

The Trace Labs community is made up individuals from around the globe who all unite for one common mission, using OSINT to find missing persons and reunite them with their families. The work that we do would not be possible without this amazing community.

The Core Team at Trace Labs works alongside the global community to bring all of this together for the mission. Learn more about who they are below!

Signature-based Detection Using Network Timing

Josh Pyorre (Cisco Talos, Pyosec)

Malware often has behaviors that can be used to identify other variants of the same malware families, typically seen in the code structure, IP addresses and domains contacted, or in certain text strings and variable names within the malware.

However, it may be possible to identify malware, or anomalous behavior by analyzing the timing in between network transactions. My presentation will explore this idea using network captures of malicious activity amongst potentially normal network traffic, analyzed quickly with Python. We'll explore this on network data with full visibility into the transactions as well as noisier encrypted traffic, where we'll attempt to identify unusual activity based only on bandwidth.

Josh Pyorre is a Security Research Engineering Technical Leader with Cisco Talos. He has been in security since 2000, working as a researcher and analyst at organizations such as Cisco, NASA, and Mandiant, and a principal product manager for advanced threat protection at Zscaler.
Josh has presented at conferences and locations around the world, including DEFCON, RSA, B-Sides, Source, Derbycon, InfoSecurity, DeepSec, Qubit, and at various companies and government organizations. He was also the host and producer of the security podcast, 'Root Access'. His professional interests involve network, computer and data security with a goal of maintaining and improving the security of as many systems and networks as possible.

Detecting The Unknowns – Mobile Network Operators Cyber Resilience In Responding To Zero-day Exploit

Imran Saleem (Mobileum)

Mobile networks are globally interconnected via private/public networks. Mobile signalization, being the core of the telecoms, is widely used, hence mobile networks are always at risk of exposure to data leaks. Signaling firewalls are the first line of defense, which could prevent known attacks, but are typically inadequate to identify zero-day exploits or sophisticated bypass techniques.

Besides, the threat actors are no longer stagnant and bound to a geographical area. Rather, they are moving around the world leveraging cloud-based deployments using various interconnect points geographically dispersed, making it more arduous to detect new patterns.
Massive exploitation of victim networks by sophisticated bypass techniques has been seen where operators are incapable of correlating the entire frame of the security chain because of limited view. Not knowing if the damage has been done and under the hypothesis that they are protected it comes as a surprise when a high-profile individual becomes the victim of this series of a coordinated unnoticed chain of events.


In this engagement, the research outputs TTP used by an APT performing zero-day exploit via Interconnect signaling that left a significant impact on operators globally. The critical vulnerability was silently exploited across different high-risk markets with coverage seen in almost every continent. The vulnerability aims to bypass signalling firewalls and security controls to get hold of initial data access like real IMSI for the subscriber, Serving Node address for the network where the subscriber is attached and can potentially perform subsequent attacks like, Call Interception, billing fraud, tracking, surveillance, 2FA bypass.

A responsible vulnerability disclosure for this zero-day exploit was submitted to the GSMA CVD program who assigned a CVD number CVD-2021-0052 and after impact assessment, nature and severity placed the discovery in the “hall of fame” accessible at the acknowledgment page.

https://www.gsma.com/security/gsma-mobile-security-research-acknowledgements/

Imran Saleem is a Security Researcher, with more than 17 years of experience in Telecom and Security. He has also served as a Cyber Security Consultant for Fortune 100 companies in the past. Imran holds a master’s degree in Cyber Security and maintains CISSP, CISM, CDPSE, and other highly sought-after security certifications. His past work areas combine Threat Intelligence, Security Design & Architecture, security risk assessment, privacy impact assessment, and data analytics.
Imran’s currently engaged in threat Intelligence and security research providing a global threat intelligence perspective to Mobile Network operators.
Imran is a speaker who participated in and contributed to various international bodies like GSMA and the World Economic Forum. Significant contributions to GSMA Security guidelines related to interconnect signaling of mobile networks. He also serves as a member of GSMA CVD PoE (Panel of Expert). His work has been acknowledged in the GSMA “Hall of fame” for critical vulnerability disclosure.
https://www.gsma.com/security/gsma-mobile-security-research-acknowledgements/

Trace Labs OSINT Search Party for Missing Persons CTF (2/4)

TraceLabs (TraceLabs)

The Trace Labs Search Party CTF is a nontheoretical, gamified effort that allows for the crowdsourcing of contestants to perform a single task: Conduct open source intelligence operations to help law enforcement find missing persons. The search will be done in teams and supervised by a team of judges.

See the description here: https://deepsec.net/docs/C0311_Trace_Labs_Missing_Persons_CTF.pdf

The Trace Labs community is made up individuals from around the globe who all unite for one common mission, using OSINT to find missing persons and reunite them with their families. The work that we do would not be possible without this amazing community.

The Core Team at Trace Labs works alongside the global community to bring all of this together for the mission. Learn more about who they are below!

Vanquish: Analysis Everywhere With Smartphones

Hiroyuki Kakara (Trend Micro Incorporated)

I couldn’t sleep well until I developed the “Vanquish.” I couldn’t fully enjoy Disneyland until I developed the “Vanquish.” I was always thinking about 2nd and subsequent payloads of malware of my interest. I was always hoping that C2 servers are available until I reached my malware analysis desktop. But the Vanquish changed my life. He tries to collect all the samples that appear in twitter accounts of your interests. He analyzes those samples and tries to get the next stage samples when I am in bed. And I can ask him to analyze malware from your iPhone even while I’m in Disneyland.
The core of the Vanquish is the system which crawls specified twitter accounts every specified minute, parses hashes from the tweet bodies or web sites tweeted, downloads the sample from malware sharing sites, and puts it in a sandbox. The results are posted to the Slack workspace. Also, I can order ad hoc analysis to the Vanquish by specifying hashes.
The Vanquish uses Slack for its I/O interface. Not only does he output results to the Slack workspace, but he also accepts commands from Slack to adjust crawl parameters, start ad hoc query, etc. With this, I don’t need to be in front of my desktop but only need an iPhone to communicate with Vanquish.
The presentation at DeepSec 2022 will introduce the concept of the Vanquish as well as additional features like malware parsing which can be implemented into your in-house research infrastructure.

Hiroyuki Kakara is working as a Cyber Threat Researcher for the Threat Intelligence Center of Trend Micro Incorporated in Japan. He is engaged in research on APTs and delivers threat intelligence to Japanese government organizations. Technically, his research activity consists of incident response, malware analysis, forensics, OSINT, and utilization of his company's internal telemetry. He is also an instructor of the Trend Micro internal security expert training. He co-works with some Japanese parliament members to have a better national security against cyber threats. He presented at DeepINTEL 2019, 2020 and 2021. 

The Story Continues: Hacking Some More "Secure" Portable Storage Devices

Matthias Deeg (SySS GmbH)

Encrypting sensitive data at rest has always been a good idea, especially when storing it on small, portable devices like external hard drives or USB flash drives. Because in case of loss or theft of such a storage device, you want to be quite sure that unauthorized access to your confidential data is not possible. Unfortunately, even in 2022, "secure" portable storage devices with 256-bit AES hardware encryption and sometimes also biometric technology are sold that are actually not secure when taking a closer look.

In this presentation, I will talk about how a customer request led to further research resulting in several cryptographically broken "secure" portable storage devices. This research continues the long story of insecure portable storage devices with hardware AES encryption that goes back many years. With this presentation, I want to raise the awareness of security issues and practical attacks against vulnerable "secure" portable USB storage devices, and tell an interesting story.

Matthias Deeg is interested in information technology - especially IT security - since his early days and has a great interest in seeing whether security assumptions in soft-, firm- or hardware hold true when taking a closer look. Since 2007 he works as IT security consultant for the IT security company SySS GmbH and is head of Research & Development.

His research results concerning different IT security topics were presented on different national and international IT security conferences (e.g. Black Alps, BSidesVienna, Chaos Communication Congress, CONFidence, DeepSec, Hacktivity, Hack.lu, PHDays, Ruxcon, t2, ZeroNights). He also published several IT security papers, security advisories, and security-related YouTube videos.

Trace Labs OSINT Search Party for Missing Persons CTF (3/4)

TraceLabs (TraceLabs)

The Trace Labs Search Party CTF is a nontheoretical, gamified effort that allows for the crowdsourcing of contestants to perform a single task: Conduct open source intelligence operations to help law enforcement find missing persons. The search will be done in teams and supervised by a team of judges.

See the description here: https://deepsec.net/docs/C0311_Trace_Labs_Missing_Persons_CTF.pdf

The Trace Labs community is made up individuals from around the globe who all unite for one common mission, using OSINT to find missing persons and reunite them with their families. The work that we do would not be possible without this amazing community.

The Core Team at Trace Labs works alongside the global community to bring all of this together for the mission. Learn more about who they are below!

Cypher Query Injection - The New "SQL Injection" We Aren't Aware Of

Noy Pearl (Moon Active)

How often do you hear about injections? Probably a lot. Probably most of them are familiar to you and chances are that you are tired of hearing about another SQL injection that was recently found. Graph Databases (e.g. Neo4j, RedisGraph, Amazon Neptune) which are becoming increasingly popular don’t use SQL, but you can still achieve an injection and even go beyond that. We are going to show how by manipulating legitimate functionalities we are able to leverage an injection in Cypher Query to attack the database (DoS), leak sensitive files, access protected endpoints and leverage our attack to perform lateral movement and escalate to other machines as well. We’ll sum up with remediation & mitigation steps and experience with a ready-to-use open-source playground that was created so you could exploit Graph Databases yourself.

Noy is a Security Researcher @ Moon Active. She previously worked as a penetration tester with the focus on web and mobile security. Her main interest is exploring the uncharted territories of less-known attacks & exploitation techniques. She started her speaker journey at BSides (Tel-Aviv), has contributed to the OWASP AppSec IL team as a challenge creator and is interested in everything that the security world has to offer.

Hey You! Get Off my Satellite!

Paul Coggin (nou Systems, Inc)

There are many components and systems that may be targeted in a space system by adversaries including ground station systems and satellites. In this presentation we will discuss ideas for providing cyber resiliency in zero-gravity. Both theoretical and real-world examples of cybersecurity issues concerning satellite systems will be covered. This presentation will step through attack trees for targeting satellite systems. Recommendations best practices for securing satellite systems will be discussed. In addition, new ideas industry is currently developing for improving the cyber resiliency of space systems will be presented.

Paul Coggin is a Cyber SME at nou Systems, Inc. His expertise includes space systems, service provider, and ICS/SCADA network infrastructure attacks, and defenses, as well as large complex network design and implementation. Paul is experienced in leading network architecture reviews, vulnerability analysis, and penetration testing engagements for service provider, enterprise, space systems and tactical networks. Paul is a regular speaker and instructor at international conferences around the world. He has a BS in Math\Computer Science, MS in Systems Management, MS in Information Assurance and Security and a MS in Computer Information Systems. Paul is currently pursuing a MS in Space Systems. In addition, he holds numerous industry network and security certifications.

Trace Labs OSINT Search Party for Missing Persons CTF (4/4)

TraceLabs (TraceLabs)

The Trace Labs Search Party CTF is a nontheoretical, gamified effort that allows for the crowdsourcing of contestants to perform a single task: Conduct open source intelligence operations to help law enforcement find missing persons. The search will be done in teams and supervised by a team of judges.

See the description here: https://deepsec.net/docs/C0311_Trace_Labs_Missing_Persons_CTF.pdf

The Trace Labs community is made up individuals from around the globe who all unite for one common mission, using OSINT to find missing persons and reunite them with their families. The work that we do would not be possible without this amazing community.

The Core Team at Trace Labs works alongside the global community to bring all of this together for the mission. Learn more about who they are below!

Anticipating Damage Control: Communicating About Cybersecurity Within And Outside Organizations

Prof. Matthieu J. Guitton, PhD, FRAI (Université Laval (Quebec City, QC, Canada))

Although cybersecurity aims at protecting individuals and organizations from the threats emerging from the massive use of and dependency upon digitalized spaces, the efforts of cybersecurity experts unfortunately not always succeed in doing so. Therefore, integrated cybersecurity strategies of large organizations should minimally include a plan for damage control.

Damage control strategies are typically handled by public relations experts and tend to follow a classical narrative, combining a mix of both apologizing and reassuring discourses. However, in an age of communication technologies, efficient narrative strategies have to be multi-layered. Indeed, while damage control is typically conceptualized as taking place after the occurrence of a damage causing event, it should also include an anticipatory component, both dealing with communication planning and pre-event communication. Furthermore a damage control narrative can not exclusively focus on a general public relations discourse, but should also include reflexive components, i.e. narrative elements targeted at organization members themselves on the one hand, and addressing the cybersecurity strategy itself on the other hand.

This presentation will explore this specific aspect of damage control specifically addressing communication related to cybersecurity measures and strategies. We will first identify which components of the cybersecurity policy, measures, and training of the organization workforce can be the target of communication. We will then explore how communicating about these aspects can be done within the organization. We will finally discuss how communicating about these elements can be done outside of the organizations specific context and network, before and after the occurrence of damaging events, and how such communication may not only contribute to the degree of security of the assets of the organization, but also to its overall reputation and branding.

Matthieu J. Guitton is Full Professor at the Faculty of Medicine and Full Professor at the Graduate School of International Studies at Université Laval (Quebec City, QC, Canada), Fellow of the Royal Anthropological Institute, and Senior Researcher/Group Leader at the CERVO Brain Research Center (Quebec City, QC, Canada). He is Editor-in-Chief of the Computers in Human Behavior family of journals, which includes Computers in Human Behavior (the world leading journal in the field of cyberpsychology), and Computers in Human Behavior Reports, and serves on several other editorial boards, such as Acta Psychologica (where he acts as the Psychology and Technology Section Editor) and Current Opinion in Behavioral Sciences. A graduate from the University of Rouen and Université Pierre et Marie Curie - Paris VI, he obtained his PhD from the University of Montpellier (France) and was a Koshland Scholar/Postdoctoral Fellow of Excellence at the Weizmann Institute of Science (Israel). He has published over 120 research papers, book chapters, or editorials on subjects ranging from neuropharmacology and health sciences to cyberpsychology, cyberbehavior, or security issues. Some of his recent works have appeared in journals such as Computers in Human Behavior, the International Journal of Intelligence and CounterIntelligence, or the International Journal of Intelligence, Security, and Public Affairs. He has been invited speaker or guest lecturer at numerous universities across the world, such as the Embry-Riddle Aeronautical University (USA), the Russian Academy of Science, or the Renmin University of China.

Practical Mobile App Attacks By Example (online talk)

Abraham Aranguren (7ASecurity)

If you are the kind of person who enjoys workshops with practical information that you can immediately apply when you go back to work, this talk is for you, all action, no fluff :)

Attendants will be provided with training portal access to practice some attack vectors, including multiple mobile app attack surface attacks, deeplinks and mobile app data exfiltration with XSS. This includes: Lifetime access to vulnerable apps to practice, guided exercise PDFs and video recording explaining how to solve the exercises.

Get FREE access to the slides, recording and vulnerable apps to practice with:
https://7asecurity.com/free-workshop-mobile-practical

This talk is a comprehensive review of interesting security flaws that we have discovered over the years in many Android and iOS mobile apps: An entirely practical walkthrough that covers anonymized juicy findings from reports that we could not make public, interesting vulnerabilities in open source apps with strong security requirements such as password vaults and privacy browsers, security issues in government-mandated apps with considerable media coverage such as Smart Sheriff, apps that report human right abuse where a security flaw could get somebody killed in the real world, and more.

The talk offers a thorough review of interesting security anti-patterns and how they could be abused, this is very valuable information for those intending to defend or find vulnerabilities in mobile apps.

This talk is for those who are intending to broaden their knowledge of mobile security with actionable information derived from real-world penetration testing of mobile apps.

Please come caffeinated, the audience will be challenged to spot vulnerabilities at any moment :)

After 13 years in itsec and 20 in IT Abraham is now the CEO of 7ASecurity (7asecurity.com), a company specializing in penetration testing of web/mobile apps, infrastructure, code reviews and training. Co-Author of the Mobile, Web and Desktop (Electron) app 7ASecurity courses. Security Trainer at Blackhat USA, HITB, OWASP Global AppSec and many other events. Former senior penetration tester / team lead at Cure53 and Version 1. Creator of “Practical Web Defense”, a hands-on eLearnSecurity attack / defense course, OWASP OWTF project leader, an OWASP flagship project (owtf.org), Major degree and Diploma in Computer Science, some certs: CISSP, OSCP, GWEB, OSWP, CPTS, CEH, MCSE:Security, MCSA:Security, Security+. As a shell scripting fan trained by unix dinosaurs, Abraham wears a proud manly beard. He writes on Twitter as @7asecurity @7a_ @owtfp or https://7asecurity.com/blog. Multiple presentations, pentest reports and recordings can be found at https://7asecurity.com/publications

Workshop: Hands On EMUX - Emulating ARM and MIPS IoT Firmware (1/2)

Saumil Udayan Shah (saumil.net)

EMUX (formerly known as ARMX) has been under regular development for over 5 years. The latest release brings MIPS emulation capabilities to the framework, expanding the set of targets that can be emulated. This workshop shall be in two parts:

Part 1 (30 minutes)
- Setting up EMUX in 7 minutes
- A tour of EMUX internals
- Case study of how IoT devices are emulated

Part 2 (90 minutes)
- Emulating an IP Camera from flash firmware
- Firmware extraction hands-on
- Building a emulation compatible kernel from scratch
- Managing the root file system
- Putting it all together in EMUX

Students are expected to bring their laptops with a working Docker instance. EMUX is publicly available as a Docker image on https://github.com/therealsaumil

Saumil Shah is the founder of Ringzer0 Training. Saumil is an internationally recognised speaker and instructor, having regularly presented at conferences like Blackhat, RSA, CanSecWest, PacSec, EUSecWest, Hack.lu, Hack-in-the-box, Deepsec and others. He has authored two books titled "Web Hacking: Attacks and Defense" and "The Anti-Virus Book".

Saumil graduated with an M.S. in Computer Science from Purdue University, USA and a B.E. in Computer Engineering from Gujarat University. He spends his leisure time breaking software, flying kites, traveling around the world and taking pictures.

Fighting Fire With Fire – Detecting DNS-tunneling With DNS

Artsiom Holub (Cisco Umbrella)

DNS tunneling used as a covert-channel method to bypass security policies has increased considerably in the landscape of Ransomware attacks in recent years. This can be attributed to CobaltStrike post exploitation tools becoming modus operandi of cybercrime syndicates operating with ransomware. Most of the detections rely on packet inspection which suffers of scalability performance when a large set of sockets should be monitored in real time. Aggregation-based monitoring avoids packet inspection, but has two drawbacks: silent intruders (generating small statistical variations of legitimate traffic) and quick statistical fingerprints generation(to obtain a detection tool really applicable in the field). Our approach uses statistical analysis coupled with behavioral characteristics applied directly in the DNS resolver. The presentation will cover examples of the malicious tools used by threat actors and detections designed to protect from such tools.

Artsiom Holub is a Senior Security Analyst on the Cisco Umbrella Research team. Throughout the course of the day, he works on Security Threat Reports for existing and potential clients, works closely with the Customer Support Team, finds new threats and attacks by analyzing global DNS data coming from Cisco Umbrella resolvers, and designs tactics to track down and identify malicious actors and domains. He is a frequent presenter at major cybersecurity conferences including RSAC, Black Hat and THEFirst. Holub is currently focused on analysis and research of various cybercrime campaigns and building defensive mechanisms powered with ML.

Faking At Level 1 - How Digital Twins Save Your PLCs

Thomas Weber (CyberDanube / Security Reseracher)

Every year, numerous big and small incidents in industrial environments, like power plants, factories, or food supply find their way into newspapers. All those affected industries are backed by highly branched and historically grown Operational Technology (OT) networks.
A big portion of such incidents would have been avoidable, if network segmentation was done correctly and patches for user devices (not always possible in OT) were installed.Despite such known problems, that also lead to compromisation of traditional IT networks, a bunch of unknown vulnerabilities are unfortunately also present in OT infrastructure.


OT in modern factories contains of networked (and smart) devices, especially on level 1, also called the control level, of the Purdue model. Devices, like PLCs, industrial router/switches, data diodes, and more cannot be easily tested if they are in use by the factory. Therefore, solutions for classification and monitoring from different vendors are in use to not put the running infrastructure at risk. These non-intrusive ways for getting a picture about the running infrastructure only give a partial overview of the vulnerability landscape of the OT network but cannot detect unknown vulnerabilities. The testing of such expensive devices instead of using them is often not desired due to the price, and spare items must be available, which is the reason why those devices can't be touched too.


For this reason, digital twins - in terms of virtualization - from the devices in the factory should be created for pentesting purposes. These twins can be build with different tools (open source/ closed source) and have been used for identifying 0-days during an ongoing research project. After the creation, the virtual appliances were connected to form a full fletched OT network, to imitate a real industrial environment. Testing these virtual appliances does not harm the real infrastructure, but provides a lot of valuable information about the systems in scope.

This was tested in practice during engagements and has been recreated and edited for a talk which also includes vulnerabilities that were discovered during such a test setup.

Thomas is co-founder and security researcher at CyberDanube in the field of embedded systems, (I)IoT and OT and wrote numerous security advisories in the past. Besides his past employment, he developed an emulation system for firmware in the course of his scientific work. In the past, he spoke at conferences like HITB, BlackHat, IT-SECX, HEK.SI and OHM(international).

Workshop: Hands On EMUX - Emulating ARM and MIPS IoT Firmware (2/2)

Saumil Udayan Shah (saumil.net)

EMUX (formerly known as ARMX) has been under regular development for over 5 years. The latest release brings MIPS emulation capabilities to the framework, expanding the set of targets that can be emulated. This workshop shall be in two parts:

Part 1 (30 minutes)
- Setting up EMUX in 7 minutes
- A tour of EMUX internals
- Case study of how IoT devices are emulated

Part 2 (90 minutes)
- Emulating an IP Camera from flash firmware
- Firmware extraction hands-on
- Building a emulation compatible kernel from scratch
- Managing the root file system
- Putting it all together in EMUX

Students are expected to bring their laptops with a working Docker instance. EMUX is publicly available as a Docker image on https://github.com/therealsaumil

Saumil Shah is the founder of Ringzer0 Training. Saumil is an internationally recognised speaker and instructor, having regularly presented at conferences like Blackhat, RSA, CanSecWest, PacSec, EUSecWest, Hack.lu, Hack-in-the-box, Deepsec and others. He has authored two books titled "Web Hacking: Attacks and Defense" and "The Anti-Virus Book".

Saumil graduated with an M.S. in Computer Science from Purdue University, USA and a B.E. in Computer Engineering from Gujarat University. He spends his leisure time breaking software, flying kites, traveling around the world and taking pictures.

Melting the DNS Iceberg - Taking Over Your Infrastructure Kaminsky Style

Dipl.-Ing. Timo Longin BSc (SEC Consult Unternehmensberatung GmbH)

What does DNS have in common with an iceberg? Both are hiding invisible dangers! Beneath an iceberg there is... even more ice. However, beneath the DNS there are hiding unexpected vulnerabilities!

If you want to resolve a name via DNS, there are multiple open DNS resolvers all across the Internet. A very commonly used open DNS resolver is Google’s resolver with the IP address 8.8.8.8. However, not every system is using such an open resolver. Hosting providers, ISPs and the like, are often using resolvers that are not directly accessible from the Internet. These are the so called “closed” resolvers.

In my previous research “Forgot password? Taking over user accounts Kaminsky style,” I have unearthed critical vulnerabilities in DNS resolvers of web applications, but I haven’t shared a second thought about the fact that these web applications were most likely using closed resolvers. So, this time I looked at the root of the problem.

In this talk, we’ll take a look at how we can indirectly access these closed resolvers from the Internet. Furthermore, I’ll introduce open-source tools and methods to discover vulnerabilities in them. How we can attack these closed resolvers and potentially compromise thousands of systems, will lastly be shown in a proof-of-concept exploit.

Timo Longin is a security consultant at SEC Consult (an Atos company) at day and a security researcher at night. Aside from everyday security assessments, he publishes blog posts and security tools, holds talks at conferences and universities, and, most importantly, has a passion for CTFs. His main focus is on web applications; however, infrastructure and hardware are not safe from him either. As a well-rounded offensive security researcher, he tries to find forgotten and new attack vectors that make the unthinkable possible.

Cyber Maturity Doesn’t Just Happen. True Tales Of A Cyber Maturity Concept.

Uğur Can Atasoy (TryHackMe)

Having a proper(!) security posture is more challenging than ever. Implementing the bare necessities for usability and security is scalable (literally), but the reality is always full of surprises. Dozens of assets, services, tools, requirements, workforce, risks and threats. How to keep the balance between usability, security and reputation while being honest with yourself?

Many enterprises suffer from “keywords” and “trends” and have to pretend to be “proactive” by implementing the “latest” trends and approaches instead of solving the problems on “bits” that need “change”.

When you look at enterprise-level security incidents, you can quickly notice that they have the latest tools, technologies and services, implemented the “Zero Trust Security” model, achieved base standards and compliance requirements, and hired the experts. Literally, they are prepared for almost all possible risks and threats, but they had a security incident, and the effect is usually more significant than the acceptable risk.

There is no silver bullet for security architecture design and management. Also, it is hard and takes time to create better cyber maturity and cyber readiness/resilience. But there is a simple way that leads to achieving those: self-assessment!

In this talk, I will discuss how enterprises fail to go beyond the “manageable cyber maturity level” that operates in critical sectors with real-life stories. With this presentation, I want to raise awareness of proper cyber maturity implementation and self-assessment requirements. My presentation will cover three different incidents and two real-life example cases.

Ugur Can Atasoy works as a content engineer at TryHackMe. His work and interests are focused mainly on blue and purple teaming. He believes in hybrid approaches and works to produce outcomes from synthesising the technical field and academy.

Before that, he worked as a security specialist and trainer in the higher education, media and defence industry. He provided consultancy services to many businesses in multiple domains, mainly penetration testing, threat hunting, threat intelligence, technical training, vulnerability and cyber maturity assessment.

Hacker To Honcho

Darren Jones & Julian Botham (Valencia Risk)

How do young professionals stand out in the cybersecurity sector nowadays? This is the question tackled by two cybersecurity consultants from Canada in this presentation.

From the perspective of a more recent addition to the cybersecurity industry, Julian Botham describes how his interest in cybersecurity paved the way for a cybersecurity career and the role that research, analysis, and constant growth contributed to that.

With a cybersecurity career spanning over three decades, Darren Jones provides insight in the best ways for young professionals to leave their mark on the work they do. Through his experience, he details the importance of developing team building skills and establishing a niche in a team based on interests and talents.

Darren Jones is an innovative and creative IT leader both in industry and as a consultant. He has led the way to assist clients with cybersecurity reviews, cyber strategy development, solutions implementation, 24x7 security monitoring and incident response. Darren has extensive experience with the NIST CSF and has formulated many cyber strategies using this framework as an anchor.

Julian Botham has been a part of the cybersecurity industry for 3 years and has quickly risen within his company. He is a published author on the Public Policy Forum paper Beyond The Digital Status Quo. On a day-to-day basis, Julian performs penetration tests, vulnerability assessments, and contributes his knowledge of the industry to his peers as a part of a mentorship program.

Your Phishing Assessment Is Bad & You Should Feel Bad

Alexander Riepl (CERT.at)

Sending malicious emails to employees in order to gauge a perceived security awareness is becoming ever more popular with companies large and small taking part in such Phishing assessments.

Despite their popularity, there is a ton of issues with how we do these things. At best, these issues cause them to be actively useless exercises, at worst, they can end up decreasing your security or even have a significant negative impact on your internal culture and erode trust.

This talk looks at how we mostly do these assessments, the various ways that are wrong about it and even tries to provide a few suggestions on how we, as security professionals, can do well.

Alexander Riepl works as a (on the insistence of higher-ups: Senior) Security Analyst for the national Computer Emergency Response Team of Austria, with his work focusing on keeping an eye on threat actors, what's happening around the world to provide geopolitical context & occasionally role-playing as "still a tech guy, I swear" when doing work around Linux security.

Before that he did a brief stint as CSO for a FinTech company, a longer stint as a Security Analyst for totally not the same employer he is working for now, and in his earliest life he spent his days in solitude maintaining datacenters - which means that after a decade in IT professionally, I'd be surprised if there is still something that can surprise me.