BSides CHS 2016

November 12th, 2016 @ College of Charleston

Register Now!


BSidesCHS Slack Code of Conduct

CC license image by Brian Klug (Flickr)

Compete

BSides CTF

Hosted by: Charleston ISSA

11.12.2016

TBD @ 9am-5pm (FREE)

View details »

CC license image by Christophe Verdier (Flickr)

Train

Proficient Web Application Penetration Testing

Taught by Jason Gillam, SecureIdeas

11.11.2016

Beatty Center, @ 1pm (FREE)

View details »

CC license image by Christophe Verdier (Flickr)

Train

Weaponizing Microsoft's Stack

Taught by gh0s7

11.11.2016

Beatty Center, @ 4pm (FREE)

View details »

Electronic Fontier Fundation logo

Give

Lockpick Challenge

Lead by: Jenee Andreacola

11.12.2016

TBD @ ALL DAY (CASH ONLY)

View details »

Fort Defender

InfusionPoints
PhishMe

Palmetto Guards

Phish Labs

Chucktown Calvary

Secure Ideas

Folly Friends

SecureWorks
ZZ Servers
Soteria

Battery Boosters

Charleston InfoSec Group
College of Charleston
Cha-ha
ECPI University
No Starch Press
Hacker Warehouse
Reforge Charleston Makerspace
Charleston ISSA
Michael C. Ippolitto

What is BSides?

BSides is a community-driven framework for building events for and by information security community members. The goal is to expand the spectrum of conversation beyond the traditional confines of space and time. It creates opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration. It is an intense event with discussions, demos, and interaction from participants. It is where conversations for the next-big-thing are happening.

BSides CHS History

BSides Charleston is a 501(c)3 organization that was started in 2012 and has been held at the Charleston, SC. Since its existence BSides Charleston has been attracting security professionals from all over the Lowcountry area for this one day event.

Google+
BSides Logo
College of Charleston

College of Charleston School of Business

Wells Fargo Auditorium - Beatty Center

5 Liberty Street, Charleston, SC

11.12.2016 - 9:00am

Parking garages at 26 St Philip or 81 Wentworth are the best options. $1/30min, $16 daily max. Meters ARE checked on Saturdays, so be prepared to feed them if you choose street parking. Meters are checked til 6pm

Here is a List of Current Talks!

Click Here for the Speaker Schedule

Gerald Auger - Black Box FISMA-based SCA of Public Cloud (IaaS) Providers - @Gerald_Auger

Gerald Auger’s been working within the Information Technology (IT) and Security industry for ten years supporting multiple industries. He is an active CISSP, CISM, and CISA. Gerald has had the distinguished pleasure to work for Booz Allen Hamilton in the public sector, providing cyber security solutions to the DoD, the Dept. of Veterans Affairs and the National Science Foundation United States Antarctic Program. He has earned a master’s in Computer Science and a master’s in Information Assurance, which affords him the ability to analyze a problem set on a technical and engineering level, and cross-cut this analysis with security concepts and thought processes. Gerald is currently working toward a Doctorate of Science in Cyber Security from Dakota State University with a research focus in developing biomedical device risk management frameworks for small and medium-sized healthcare organizations.

Jeff Man - Do We Still Need Pen Testing? - @MrJeffMan

Jeff is a respected Information Security expert, adviser,and evangelist. He has over 33 years of experience working in all aspects ofcomputer, network, and information security, including risk management,vulnerability analysis, compliance assessment, forensic analysis andpenetration testing. He has held security research, management and productdevelopment roles with NSA, the DoD and private-sector enterprises and was partof the first penetration testing "red team" at NSA. For the pasttwenty years, he has been a pen tester, security architect, consultant, QSA,and PCI SME, providing consulting and advisory services to many of the nation'sbest known brands.

April M Jones - OMNOMNOM: A Newbie Chick’s Take on InfoSec - @inkandfyre

April is a Newbie Chica in the InfoSec world. She fell into it purely on accident (she was *almost* pulled kicking and screaming), but had already developed second-hand paranoia due to her connections, so it was a natural next step. Managing to get a newbie-type of position at a Large Unnamed Company, she has begun happily delving into the lighter and darker sides of InfoSec. Sure, she might not have quite the background that most speakers have, but she definitely can provide a new twist on things and a new way of thinking about them. When she's not attending conferences and trying to solve the world's InfoSec issues, she enjoys spinning creative tales and reading.

Jason Gillam - The Hacker Evolution: What have we become? - @jgillam

Jason Gillam is a Principal Security Consultant with Secure Ideas. He has over 15 years of industry experience in enterprise software solutions, system architecture, and application security. Jason has spent most of his career in technical leadership roles ranging from startups to fortune 100 companies and has learned the business acumen necessary to advise everyone from developers to senior executives on security and architecture. Jason co-built and managed an award-winning ethical hacking program at one of the world's largest financial institutions. He also provided numerous application security training and awareness briefings to a large internal technical audience and led the development of best practices code and documentation for the the same. Jason is especially passionate about integration of security best practices with the SDLC. Jason holds his GIAC Web-Application Tester certification. He has spoken at several events including the Charlotte-Metro ISSA Summit, multiple BSides events, Hackfest (Canada), and the UNC Charlotte Cyber Symposium. He is also the author of several Burp extensions including CO2 and Paramalizer, and an active contributor to other open-source projects including MobiSec, SamuraiWTF, and Laudanum

Joe Stewart and James Bettke - Wire Wire - The African Persistent Threat - @joestewart71and @jbettke

Joe Stewart and James Bettke are researchers with Dell SecureWorks, authors of multiple security papers and tools including DCEPT and PDFXpose. In addition to their day jobs performing threat research, Joe and James are also founding members of the SubProto hackerspace in Myrtle Beach.

Patrick Fussell and Josh Stone - Hunting High-Value Targets in Corporate Networks - @pfizzell and @Josh5tone

Josh Stone and Patrick Fussell are penetration testers with PSC, working primarily in the PCI compliance space. Between the two of them, there’s over 15 years of penetration testing experience, and they get to work with some of the world’s largest service providers and merchants.

Jared Haight - Adding PowerShell to your Arsenal with PS>Attack - @jaredhaight

Jared Haight is a Security Engineer with Gotham Digital Science in Charlotte, NC. Before making the transition to Information Security he was a Systems Administrator for a decade where he spent most of his time writing scripts to automate everything he did so he could spend more time looking at pictures of Corgis on the Internet.

Josh Huff - What I learned being an OSINT creeper - @baywolf88

Josh Huff is a Digital Forensics Analyst for private investigation firm in Columbia, SC. He uses his knowledge of security and open source intelligence to break into a security role at Stillinger Investigations early this year. Josh currently uses his OSINT knowledge to assist the investigators with casework while handling the assorted tech landscape of personal devices and computers that come through the forensics lab. he also co-organizes for ColaSec (Columbia's local infosec meetup)

Max Harley - Shellcoding basics - @max_68

Max Harley is a freshman in college who loves security. Max worked for Soteria, a Charleston-local security firm during his senior year in high school. Security is Max's passion, so he strives to become better at it.

Mic Whitehorn-Gillam - Weaponize JS : Making the most of XSS opportunities

Mic Whitehorn-Gillam has been a security enthusiast for as long as he can remember, having started playing around with cryptography before he really knew anything about anything. Professionally, Mic comes from a background in building web applications across a diverse array of server-side technologies including asp.net, java, ruby, and node.js. After spending about a decade as a full-stack developer, Mic combined his passion for security and his experience with web applications to start penetration testing. When he's not working on client engagements or his own development projects, Mic can often been found running on nearest trails.

Leo Pate - Mon'Amie: XXE - @lpate3

Leo is a National Guard Minuteman serving within South Carolina as a Team Leader on the state’s Cyber Team and now employed at SPAWAR as a Network Security Analyst. Graduating from the College of Charleston and the founder of the College’s first Cybersecurity led Leo to work as a Consultant with the homegrown cybersecurity firm located in Charleston dubbed Soteria. Leo also serves as a Program Coordinator and Technical Mentor for NodeSC, a Charleston-based non-profit specializing in cybersecurity education, technology education and business entrepreneurship.

Ralph Collum - Anonymize Me: A Technician's Guide to Hiding from the Internet - @Optimus__Prime

Ralph Collum is a certified information security, risk, and compliance professional with over 8 years experience. He currently holds five industry certifications in security: Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Hacking Forensics Investigator (CHFI), CompTIA Advance Security Practitioner (CASP), and CompTIA Security+.

Mr. Collum specializes in I.T. Training and Consulting for Training Concepts in Columbia with focus in information assurance and software infrastructure management, risk management and vulnerability scanning, penetration testing, group policy content development, and remediation strategy development. His goal is to secure companies by educating them on the methods used by attackers, identifying vulnerabilities, and mitigating issues through appropriate levels of awareness and security.

Ralph now teaches a variety of classes at Training Concepts in Columbia focusing on Information Assurance and SharePoint Development.

Bryan Rhodes - Hacking Young Minds: How to get Students interested in Infosec - @rho_io

After graduating from Clemson University with a degree in Computer Science, Bryan Rhodes has spent more than a decade securing networks for the Department of Defense. He's currently a penetration tester and Red Team operator with a passion for anything InfoSec. Bryan is also Red Team co-lead of the Palmetto Cyber Defense Competition and always enjoys a good CTF!

Jason Davison King Salemno - The Alma Doesn't Fall Far From the Tree - @j_hackz and @kingsalemno

Jason has worked for PhishLabs after graduating school in May 2015. King works as a the Technical Lead and Malware Researcher at PhishLabs.

  • (Keynote Speaker) Security Circus - Kevin Johnson

    (Keynote Speaker) Security Circus - Kevin Johnson

  • Software Vulnerability Discovery and Exploitation during Red Team Assessments - Ryan Wincey

    Software Vulnerability Discovery and Exploitation during Red Team Assessments - Ryan Wincey

  • You spent $20,000 so that my throw away email can have full recon on your internal network? - Chris O'Rourke

    You spent $20,000 so that my throw away email can have full recon on your internal network? - Chris O'Rourke

  • Get-Help: An intro to Powershell and how to use it for evil - Jared Height

    Get-Help: An intro to Powershell and how to use it for evil - Jared Height

  • How to pen test off the grid.. and in the middle of the Pacific - Dave Keene

    How to pen test off the grid.. and in the middle of the Pacific - Dave Keene

  • (Keynote Speaker) InfoSec(Cyber Security) We're Doing It Wrong - Bill Gardner

    (Keynote Speaker) InfoSec(Cyber Security) We're Doing It Wrong - Bill Gardner

  • Internet of Things Hacking - Jason Davison

    Internet of Things Hacking - Jason Davison

  • The State of Information Security Today - Jeff Man

    The State of Information Security Today - Jeff Man

  • Hacking Web Apps - Brent White and Tim Roberts

    Hacking Web Apps - Brent White and Tim Roberts

  • Building BURP Extentions - Jason Gillam

    Building BURP Extentions - Jason Gillam

  • Going Nuclear: Exploiting Mass Emergency Notification Systems - Evan Davison

    Going Nuclear: Exploiting Mass Emergency Notification Systems - Evan Davison

  • FAIL-in-Depth - Marcus J. Carey

    FAIL-in-Depth - Marcus J. Carey

  • diff -q 3rdpartyassessments internalteams | grep qualified assessments - Kelly O'Donnell

    diff -q 3rdpartyassessments internalteams | grep qualified assessments - Kelly O'Donnell

  • Router Fail - John Garrett

    Router Fail - John Garrett

  • (Keynote Speaker) Hacking Culture - Jayson E. Street

    (Keynote Speaker) Hacking Culture - Jayson E. Street

  • Ballin on a Budget - Andrew Morris

    Ballin on a Budget - Andrew Morris

  • Allow myself to encrypt…myself! - Evan Davison

    Allow myself to encrypt…myself! - Evan Davison

  • WUDS You Say SmartAssPhone? - Frank Catucci

    WUDS You Say SmartAssPhone? - Frank Catucci

  • (Keynote Speaker) Dont Be A Tool - KizzMyAnthia

    (Keynote Speaker) Dont Be A Tool - KizzMyAnthia

  • Holistic Operational Security - David Zendzian

    Holistic Operational Security - David Zendzian

  • Building an Open Source Threat Intelligence Program - Edward McCabe

    Building an Open Source Threat Intelligence Program - Edward McCabe

  • Operation Arachnophobia: Don’t Get Caught in the Web - Rich Barger

    Operation Arachnophobia: Don’t Get Caught in the Web - Rich Barger

  • Just Apply the Patch: A tale of Struts 2, broken CVSS scores and IDS evasion - Robert Wessen

    Just Apply the Patch: A tale of Struts 2, broken CVSS scores and IDS evasion - Robert Wessen

  • Passive Recon: Let's Get Creepy! - Gabele Blanc & Philip Hartlieb

    Passive Recon: Let's Get Creepy! - Gabele Blanc & Philip Hartlieb

  • JAVA Shellcode Execution - Ryan Wincey

    JAVA Shellcode Execution - Ryan Wincey

  • JAVA Shellcode Execution - Ryan Wincey

    Waging war on an entire city - Andrew Morris

  • No  Image of this talk available

    Fantasy Defense In-depth - Evan D.

  • No  Image of this talk available

    Social Insecurity - Frank Catucci

  • No  Image of this talk available

    Free phish and malware hosting for life! - Paul Burbage & Dustin Weathers

    Every day websites with simple vulnerabilities in Content Management Systems such as Wordpress are compromised and used to host phishing and malware attacks.

  • No  Image of this talk available

    Using MLP to classify Encrytped Network Traffic - Micheal Reski

  • No  Image of this talk available

    BYOD Party Crashers: How to Protect Against Unauthorized Mobile Access - Brent Morris

  • No  Image of this talk available

    Fuzzing With Peach - Thomas Macklin

  • No  Image of this talk available

    Who Do You Trust? - Robert Castellow

    SalesForce, Google Apps, Cisco, Intuit, and many more use Security Assertion Markup Language (SAML 2.0) to exchange authentication and authorization information between security domains. Learn how to integrate SAML 2.0 services into your application and leverage existing authorization and authentication services so that you can sign in once and navigate smoothly across other trusted domains. This presentation is hands-on and will include real world examples.

  • No  Image of this talk available

    Printer To Pwnd - Deral Heiland

    In this presentation we go beyond the common printer issues and focus on harvesting data from multifunction printer (MFP) that can be leveraged to gain access to other core network systems. By taking advantage of poor printer security and vulnerabilities during penetration testing we are able to harvest a wealth of information from MFP devices including usernames, email addresses, and authentication information including SMB, Email, LDAP passwords. Leveraging this information we have successful gained administrative access into core systems including email servers, file servers and Active directory domains on multiple occasions. We will also explore MFP device vulnerabilities including authentication bypass, information leakage flaws and attacking firmware upgrade patching process to gain root level access to devices. Tying this altogether we will discuss the development of an automated process for harvesting the information from MFP devices with an updated release of our tool PRAEDA.

  • No  Image of this talk available

    SCADA Security - Why is it so hard? - Amol Sarwate

    The presentation will begin by introducing SCADA systems under the hood including RTU, IED, PLC, FEP, PCS, DCS, HMI, sensors, data historians and other SCADA components. The presenter will categories these components into distinct groups based on the functionality that each component provides. The presenter will review the security implications on each of these groups and identify where most of the threats lie. The presentation will take a packet level dive into SCADA protocols like MODBUS and DNP3 and study their security implications. The presentation will give example of attacks that can be carried out against each group and component. The presenter will release an updated version of an open-source tool to identify and inventory SCADA systems using the protocols discussed in this presentation. The presenter will then focus on real world examples of successful and not-so-successful implementations of security controls with SCADA systems. This will include examples of what some large organizations have done, and a discussion about why SCADA security cannot be deciphered just by tools or technical solution. The presentation will conclude with guidance on how control system owners can start implementing additional measures to get to an acceptable security.

  • No  Image of this talk available

    Programing Errors: Why do we begin to try and [except] a rescue? - Adrian (LabThug)

    The talk will cover programming errors and exceptions and also discuss how improper error messages can leak sensitive information. During the talk, I will teach the audience how to recognize, handle, and defeat programming errors, exceptions, and erroneous behavior.

  • No  Image of this talk available

    Mapping The Penetration Tester's Mind: An Auditor's Introduction To PenTesting - Nick D. (Kizz MyAnthia)

    Mapping the Penetration Tester’s Mind is a bridge gap series made to bring information technology professionals, auditors, managers, penetration testers and all those with an interest in information security to an equal understanding. Many times an auditor, manager, or compliance officer understands that a Penetration Test is required and the importance of having it done, but may not understand how it is performed or why certain actions were made. Mapping the Penetration Tester’s Mind will allow these professionals to gain insight in to how a Pen Tester looks at the project from start to finish, including viewing the SOW, applying methodologies and experience, target selection, exploitation, evidence collection, and reporting. Mapping the Penetration Tester’s Mind will not only present the ideals that are used to perform a test, but will also arm the attendees with the information and knowledge to ensure that they are choosing the right Pen Tester for their engagement. This material has never been presented with this type of focus or insight from an experienced tester like this before. Mapping the Penetration Tester’s Mind is sure to provide every attendee a high value of return and a better understanding of the “dark art” of penetration testing making it the bright light at the end of the tunnel.

  • No  Image of this talk available

    Practical Issues in Virtual Machine Covert Channels - Jeffball

    As virtualization is now the norm, physical separation is something of the past. Individual security domains that previously required strict hardware separation, now exist concurrently on one machine. This leaves these system vulnerable to potential data leakage between virtual machines via covert channels. This talk will give a brief introduction on covert channels, and then discuss the design and implementation of a framework to test data leakage via timing and storage covert channels. Special attention will be paid to the methods of synchronization, decoding, and other practical concerns of these covert channels. I'll detail how to use regression and cluster analysis to decode the information obtained from timing covert channels into the originally transmitted bits. Finally I'll conclude with a discussion of five separate covert channels in VirtualBox, VMware Player, and QEMU/KVM, detail the best synchronization and decoding methods for each.

  • No  Image of this talk available

    Top Ten Web Defenses - Jim Manico

    We cannot hack or firewall our way secure. Application programmers need to learn to code in a secure fashion if we have any chance of providing organizations with proper defenses in the current threatscape. This talk will discuss the 10 most important security-centric computer programming techniques necessary to build low-risk web-based applications.

  • No  Image of this talk available

    Encryption and Data Ownership in Cloud Computing - Timothy Mullen

    This session will discuss deep technical aspects of encryption in cloud environments as well as the legal, audit and compliance implications of data ownership and policy requirements for medium and high business impact (MBI and HBI) data in distributed computing topologies.

  • No  Image of this talk available

    Social Engineering…Because It Works - Scott Longheyer

    Employ a few info gathering techniques and common psychological principles to get the job done. The majority of successful security breaches begin with social engineering attacks against people, bringing the external threat to the inside. The current hybrid of technical controls and training in the tech industry has barely scratched the surface of defense, yet social engineering attacks are older than the tech industry itself. We will briefly cover the basics in this session and discuss options that may lower successful attack rates. Void where prohibited; no 0day required.

  • No  Image of this talk available

    Vishing Attacks Explained: A look inside some real world telephone phishing attacks - John LaCour

    In this talk, John LaCour from PhishLabs explains how malicious attacks using telephone phishing techniques to steal from your bank account.