Loading…
BruCON 0x10 has ended
arrow_back View All Dates
Thursday, September 19
 

09:45 CEST

BruCON Opening
Thursday September 19, 2024 09:45 - 10:00 CEST
Thursday September 19, 2024 09:45 - 10:00 CEST
01. Gouden Carolus

10:00 CEST

Keynote: Unite to Stop Evil!
Thursday September 19, 2024 10:00 - 11:00 CEST
Join us to explore the power of shared insight in the battle against today's sophisticated threats, as seen through the eyes of a reverse engineer’s journey. Collective defense can be much more than just sharing signatures—to me it's about guiding diverse talents to forge a strong front against evil. From analyzing APT1 malware, teaching workshops at Brucon, to testifying before US Congress on AI's impact on homeland security, this talk reveals how mentoring and teaching can help others walk a similar path, amplifying our collective impact to secure the future together.
Speakers
avatar for Michael Sikorski

Michael Sikorski

Michael Sikorski (@mikesiko) is the CTO of Unit 42 at Palo Alto Networks where he leads the Threat Intelligence and Engineering teams. He is a renowned expert in reverse engineering and wrote the best seller, “Practical Malware Analysis”. Previously at Mandiant for 15 years, he’s... Read More →
Thursday September 19, 2024 10:00 - 11:00 CEST
01. Gouden Carolus

11:00 CEST

CurveBack: A Backdoor Analysis
Thursday September 19, 2024 11:00 - 12:00 CEST
The evolution of China-nexus based backdoors the last decade has rapidly produced several families that have been documented in great detail. One of the latest additions to this order are SideWalk / ScrambleCross which employ challenging techniques and are difficult to detect without prior knowledge about their functionality. In the fall of 2023, the mnemonic Incident Response Team (mIRT) was engaged to uncover an attack as part of an esponiage campaign, and discovered a previously undocumented backdoor in the evolutional trail. Keeping track of the development of these malware families is essential for defenders. This talk shares the highlights from our analysis of the malware and reflections on how to detect it.
Speakers
avatar for Rafael Lukas Maers

Rafael Lukas Maers

Rafael Lukas Maers has a Master's degree in MathemaMcs and has worked in mnemonic since 2013. He began his cybersecurity career as an analyst, before he ventured into network analysis and developed a world-class decoder for an ICS/OT network protocol. In 2017, he started working as... Read More →
avatar for Stian Jahr

Stian Jahr

Stian Jahr holds a Master’s degree in InformaMon Security and has been part of mnemonic’s Managed Security Services since 2006. He has played a central role in the formaMon and technical management of mnemonic’s Security Services, where he has been focusing on network analysis... Read More →
Thursday September 19, 2024 11:00 - 12:00 CEST
01. Gouden Carolus

13:30 CEST

The Best Of 2023-2024: inside the biggest hacks and facts of the past year
Thursday September 19, 2024 13:30 - 14:30 CEST
It's a struggle keeping track of everything happening day after day, right? Don't blink or you'll miss new vulnerabilities, new techniques and leaks, …

The presenter, Dieter Van Den Bosch, suggested in the feedback form of BruCON back in 2011, that someone should do a presentation on the security highlights of the past year.

We’re 13 years later… and for the second year in a row, Dieter will give that talk himself!

He will take you through a journey of the most active threat actors, some surprising facts that even experts have missed and some of the weirdest things of the past year!
Speakers
avatar for Dieter Van Den Bosch

Dieter Van Den Bosch

Dieter Van Den Bosch is the founder of ThreatExposure, an pioneering Attack Surface Management company specializing in scanning for critical vulnerabilities like emerging zero-days that organizations have exposed to the internet.He started in IT security in 2009 at a major European... Read More →
Thursday September 19, 2024 13:30 - 14:30 CEST
01. Gouden Carolus

14:30 CEST

Bypassing firewalls with API-to-API Hacking: Using Chained Transformations to deliver payloads to 2nd order API's
Thursday September 19, 2024 14:30 - 15:30 CEST
In this talk we'll explore the opportunities that protocol & standards transformations provide for attackers in environments with an API microservice architecture.

Transformation of user input happens automatically when protocols & standards support certain encodings.

When API backends are constructing their own API calls to 2nd order API's using user input, "chained transformations" happen. This allows an attacker to construct payloads that only manifest in harmful form after a certain number of transformations. The payloads are often too obfuscated to be recognized by the perimeter Web Application Firewall.

This type of vulnerability is present even in hardened targets. Pentesters and bugbounty hunters can maximize the attack surface and increase impact using this bug.
Speakers
avatar for Johan Caluwé

Johan Caluwé

Cyber Security Expert @ Centre for Cybersecurity BelgiumMember of Technical Research Team of CERT.beGuest professor "Web Application Pentesting Advanced" @ Howestuniversity of applied sciencesBug bounty hunter & ethical hacker
Thursday September 19, 2024 14:30 - 15:30 CEST
01. Gouden Carolus

16:00 CEST

A Typhoon in a Teacup? Evaluating Reporting on High Profile Threats
Thursday September 19, 2024 16:00 - 17:00 CEST
For over two years, US and “Five Eye” entities have focused significant attention on the threat posed by an activity cluster initially identified by Microsoft as “Volt Typhoon.” Linked to People’s Republic of China (PRC) cyber operations, Volt Typhoon is notable for effective, persistent use of living off the land behaviors via proxied command and control (C2) infrastructure to target civilian and dual-use critical infrastructure entities. The entity has been described as the most concerning threat to US infrastructure and interests by multiple commercial and government entities – yet for all this attention specifics on the group and their operations remain maddeningly scarce in public, available reporting.

In this discussion, we will examine the nature of high-profile, yet vaguely described, threats such as Volt Typhoon, and what lessons we can learn from such activities. Particularly, we will look at natural tensions in information disclosure that may uniquely align with insights into the Volt Typhoon threat, where counter-cyber operations may play as large a role (and potentially greater) in tracking this adversary as traditional intrusion analysis. Through this discussion we will look into how information sensitivity for cyber threat intelligence reporting may clash directly with the actionability of such information, and how this both plays into direct defense and more broadly in public messaging around concerning (but objectively vague) threats.

To conclude, we will explore the natural tension between disclosure and action for intelligence operations, and the potential harm that may result when secretive items are broadcast widely in public discourse. Using Volt Typhoon as a high-profile and relevant example, attendees will learn to better advocate for and hold reporting entities to account for threat reporting, while also highlighting the need to execute care and discretion in public messaging on the part of commercial and government authorities.
Speakers
avatar for Joe Slowik

Joe Slowik

Joe Slowik has over 15 years of experience across multiple information security domains. Currently, Joe performs in-depth research into critical infrastructure threats for MITRE while also leading the CTI and ICS functions of the ATT&CK project. Previously, Joe has worked primarily... Read More →
Thursday September 19, 2024 16:00 - 17:00 CEST
01. Gouden Carolus

17:00 CEST

Saddle up the system, y'all: A Texas handbook to Linux EDR baseline configurations.
Thursday September 19, 2024 17:00 - 18:00 CEST
While there's often a strong focus on securing Windows environments against malicious activities, due to their widespread use, it's crucial not to underestimate the potential for Linux based systems to be exploited in a similar fashion.

Wrangling those EDR tools on Linux is downright essential, given its varied attack vectors and plenty of trickster trails to navigate. Linux setups are pretty common in server, cloud and IoT environments, each bringing their own flavor of security showdowns.

With Linux's robust privilege management, you need to set up your EDR solutions in a way that they can effectively oversee and respond to unusual activities. By engaging in active EDR testing on Linux, a comprehensive approach to security is ensured, covering a wide range of threats and system complexities. It's like having your digital glam squad handle all the security drama, so you can focus on the fabulousness!
Speakers
avatar for Melina Phillips

Melina Phillips

I am an Offensive Security Engineer with 10 years of IT experience and 6 years specifically focused on IT Security. As an Offensive Security Engineer, I leverage my expertise and passion for red teaming to identify vulnerabilities and develop effective strategies to protect my organization... Read More →
Thursday September 19, 2024 17:00 - 18:00 CEST
01. Gouden Carolus
 
  • Filter By Date
  • Filter By Venue
  • Filter By Type
  • Timezone


Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
Filtered by Date -