BSides Basingstoke 2024

19/07/2024

Time Track 1 Track 2
10:00-10:10 Welcome - Committee
10:10-10:35 Keynote: Old Maid, new tricks - Backdooring Linux Full Disk Encryption for remote forensic password recovery. - Tom Cope
10:35-11:00
11:00-11:25 SEM-sational Silicon Sleuthing: Electron Microscopy for Reverse Engineers - James McKee Psychological Safety: why Security is digging a hole - Rebecca Markwick
11:25-11:50
11:50-13:00 Lunch - The Dice Tower
13:25-13:50
13:50-14:15 Operational Technology: The latest battlefield in the ongoing cyber war - Ben Oakley Social Engineering Honeypots - Raf Tomaszewski
14:15-14:40 Dezinformatsia: Russian Active Measures in the 2020s - Will Thomas
14:40-15:00 Break
15:00-15:25 What's in a Name? Writing our own DNS tunneling protocol on the fly, and other AWS misadventures, all in a pen test - Sunny Chau I Know What You Did Last Summer - Sam MacDonald
15:25-15:50
15:50-16:15 To Pay or Not To Pay: Criminal Ransoms - Ian Thornton-Trump Unveiling the insider - Pete Neve
(NOT RECORDED)
16:15-16:40 A Trivial Bug in a Complicated Camera - Ben R and Mike S
(NOT RECORDED)
16:40-17:05 Charity Auction and Closing Remarks - Committee
17:05-??:?? Party hard! Bar tab sponsored by LogRhythm- The Dice Tower

Track 1

  • A modern twist on the classic old maid attack. Backdooring the Linux boot process, unlocking the secrets of LUKS and a practical guide to forensics and Linux malware development

  • In the ever-evolving cat and mouse field of vulnerability research, the need for advanced semiconductor reverse engineering has become prevalent. As targets become more secure, visible attack surfaces are reduced, and fault-tolerant silicon processes are introduced, traditional hardware attacks such as Fault Injection and Side-Channel Analysis have been rendered largely ineffective.

    This talk delves into the intricate world of semiconductor RE, the exploring tools and techniques used by the semiconductor industry for Failure Analysis and how we can pitch their own tools against them to extract valuable secrets like cryptographic keys and boot ROMs in search of hidden vulnerabilities.

    Come for the memes, get lost in the science, and keep your eyes peeled for secrets…

  • Operational technology (OT) keeps critical infrastructure and industrial environments functioning, and due to this importance, it is a high-value target for cybercriminals. It’s not just data they’re compromising – essential resources are at risk. The impact of a successful attack has the potential to cause major disruption.

    Ben will take everyone through a real-world example that demonstrated the key principles behind OT security monitoring and how to detect and respond to the unseen dangers facing our critical infrastructure.

  • An engaging war story of an AWS application pen test filled with twists and turns. Through the narrative we'll touch on both familiar & unexpected topics, from standard application security advice, to custom data encoding and exfiltration, and cloud app isolation. We hope the audience will enjoy an exciting story and get a feel for looking deeper into what's unexpected, as it is often how new discoveries are made in our industry.

  • This talk explores the idea of criminalising the payment of ransoms by victim organisations. Yes, are we going to attempt to solve the problem of Ransomware by passing a law especially targeting the criminal actors responsible? No! We are going to make it a crime to "do business with the cyber criminals." What. Could. Possibly. Go. Wrong. With. This. Idea?

Track 2

  • Psychological safety is a key requirement for a functional workplace. It allows people to challenge ideas and behaviours without fear of negative repercussions and allows a safe place for people to share fears and problems with those who can make change. Security, unfortunately, often disregards the need and importance of psychological safety and instead doubles down on the fear and intimidation in an attempt to achieve its goals. This undermines not only people's trust in security, but also the likelihood of them sharing problems and reporting incidents. I’ll discuss how Security can improve and start becoming a psychological safe space.

  • This talk is about an adventure in auditing a few appliances from a specific vendor used in telephony networks and discovering a whole host of delicious low hanging fruit that resulted in multiple, undisclosed, full-chain remote root exploits being developed, impacting extremely sensitive parts of telecom networks.

    It will go through some of the methodology used to find some wonderful bugs, and how to exploit them.

  • Traditional cyber defences rely heavily on blacklists and blocking suspicious emails/numbers. However, with phishing attacks becoming increasingly sophisticated, there's a need for a proactive approach to gather real-time threat intelligence. This talk explores the concept of social media honeypots – decoy accounts designed to attract malicious actors. By analyzing their interactions with these honeypots, we can gain valuable insights into current social engineering tactics, techniques, and procedures (TTPs) used by attackers.

  • Russian Active Measures, Dezinformatsia, and Maskirovka refer to tactics employed by the Russian government, intelligence agencies, and military to influence public opinion, sow discord, deceive, and manipulate information both domestically and internationally.

    These tactics have been particularly visible in recent years with the rise of social media and digital communication, allowing for the rapid dissemination of misinformation and propaganda. Russia has been accused of interfering in elections, spreading disinformation about geopolitical events, and supporting extremist groups to further its own agenda.

  • We willingly share immense personal information about ourselves online disregarding the consequences of such actions. Privacy is now a word we bound around whilst simultaneously sharing with the world every aspect of our lives with no second thought. Social media, public databases and breach dumps are a treasure trove of information. From account takeovers, targeted phishing campaigns, fraud, stalking and blackmail we’ll see how threat actors can put the jigsaw pieces about us together to create a detailed attack profile.

  • This is the story of an extensive insider investigation. Our international investigation uncovers considerable criminal activities carried out by “the perfect employee”. We will cover overlooked signs of compromise, often ignored investigation techniques, and dissect the tactics employed to track down offenders.

  • At Pwn2Own 2023, the Zero Day Initiative introduced a new category, surveillance. This talk details how Interrupt Labs identified and exploited a vulnerability allowing us to achieve remote code execution on the Synology BC500 from a network adjacent perspective.

    Please be aware this talk is not recorded and as such photographs/videos of the talk by attendees will also not be permitted

Our Wonderful Sponsors

DSTL

Dstl is part of the Ministry of Defence providing expertise and delivering cutting-edge science and technology for the benefit of the nation and allies. We sustain and grow science and technology capabilities that must remain in government, and help develop capabilities that are managed elsewhere, for example, in industry and academia. Based at Porton Down and Fareham, we identify and monitor national security risks and opportunities to protect the UK and our interests at home, at our border, and internationally, in order to address physical and electronic threats from state and non-state sources. We work collaboratively with external partners in industry and academia worldwide, providing expert research, specialist advice and invaluable operational support.

https://www.gov.uk/government/organisations/defence-science-and-technology-laboratory

Interrupt Labs

Interrupt Labs is a leading vulnerability research company working on some of the toughest challenges in the industry; from popping browsers to exploiting phones and cars, we cover it all with our exceptional team of vulnerability researchers. We are always on the lookout for talented people; whether you are early on in your career, or you already know your way around IDA, we are keen to talk research. To follow our latest research and job openings on X @InterruptLabs.

Tenable

Tenable® is the Exposure Management company. Approximately 43,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include approximately 60 percent of the Fortune 500, approximately 40 percent of the Global 2000, and large government agencies. Learn more at tenable.com.

Softcat

Softcat support commercial and public sector organisations to design, procure, implement and manage their digital infrastructure. Over the course of the last 25 years, we’ve built a vibrantly successful, industry-leading business with an unwavering dedication to customer services and solutions. We help customers to use technology to succeed, by putting our employees first and now count over 2500 individuals as part of our team. 

IT Infrastructure & Services Provider | Softcat

LogRhythm

KSEC

Lab539