When I moved in to my brand new apartment in a newly constructed high-rise, I was intrigued – it was designed with smart home functionality in mind and every light, power socket, window blind was remote controlled in addition to push-buttons placed around the rooms. Also all HVAC and bathroom floor heating functions were interfaced as well.
Besides the DIN-rail mounted relays and PLCs the heart of the user interface was a wall-mounted tablet: every one of the 128 apartments had a Galaxy Tab 3 10.1 P5210 configured with Android apps for smart home control, apartment doorbell and IP intercom. We were given a basic user interface manual but no technical docs, so I set out on figuring how it all works.
Additionally, I explain how I enabled free remote access for my neighbors, starting with learning more about how the smart apartments’ systems worked and then doing two iterations: first requiring each neighbor to buy a Raspberry Pi and the second making it completely software-based (thanks to python-for-android), free, and self-serve.
Bio:
Marko Štamcar – Head of laboratory @ Slovenian Computer History Museum, previously: Senior Android Developer and Release Manager @ Outfit7 (Ekipa2 d.o.o. subsidiary)
Video/recordings:
Posted in talks | Comments Off on Hacking smart apartments for better living (Marko Štamcar)
A short dive into what is imposter syndrome and how it affects those in the cyber security community. Learn how to recognise the symptoms early on before the anxiety affects your mental health and work/life balance. Explore tips on coping mechanisms to overcome the feelings of the inner fraud before they take control.
Bio:
Sam Macdonald – A cybersecurity professional from the UK whereby imposter syndrome is a weekly bi-product of having changed careers midlife. Every day is a school day, now looking to tackle the inner fraud that takes so many in the community and share what I have learnt.
Posted in talks | Comments Off on Dealing With Imposter Syndrome (Sam Macdonald)
After a brief intro to Internet-scale scanning and how it differs from smaller-scale scanning that you might do on a pentest or red team engagement, I’ll touch upon network aspects impacting scan performance and then dive into the nitty-gritty of systems aspects, like how to get packets from userspace onto the wire and back at very high packet rates, and other key aspects of Internet-scale scanning, such as how statelessness and reproducibility are achieved with cyclic groups and cryptographic validation, or how IP address blocklists are implemented efficiently. With ZMap on cheap hardware as an example, we’ll breeze through how to root cause performance bottlenecks by stack sampling and explain the handful of improvements that were needed to bring performance to the expected theoretical maximum scan rate, achieving the popular claim of scanning the Internet in under 5 minutes.
Bio:
Daniel is a cyber defence practitioner leading Swisscom’s detection engineering, threat intel and red teaming efforts. Previously, he was a software engineer with Apple’s SEAR working on XNU and security APIs, and has defended Swiss national critical infrastructure with different CSIRTs. He is a part-time university lecturer, a board member of DEFCON Switzerland, and has published with The Citizen Lab as well as on Slovene anthropology. Over time, Daniel has contributed to numerous open source projects, including to both Nmap and ZMap.
The presentation showcases two parts of a complex research. Firstly we will take a look over how can Internet Explorer can be weaponized through an OLE object in a Word document to drop & execute a C2 implant. Secondly, we will go for an in-depth technical method of how to build an undetectable (even by EDRs) implant in PowerShell, alongside with the Command and Control server.(Live PoC included)
Bio:
Cristian Cornea is an experienced ethical hacker with a passion for giving back to the community, advocating for real technical skills, and not just “paper security”. His conference talks and community projects are widely known around the globe, BSides Transylvania being one of them. Apart from that, Cristian is a member of the Certified Ethical Hacker (CEH) Scheme Committee, a holder of more than 20 certifications (including OSCE, OSEP, OSWE, CRT), and a global infosec trainer.”
Posted in talks | Comments Off on Stealthy OLE Object Weaponization in Word Documents leading to Undetectable C2 Implant (Cristian Cornea)
I host multiple services for personal use, and of course want to use them also outside my own LAN. However, I don’t like traditional approaches like always-on VPN or external SSO providers, therefore I came up with my own solution. Repository – https://github.com/Tomasinjo/gatekeeper
Bio:
Tom Kern is a founding member of Slovenia’s biggest MDR provider and specializes in detection engineering, security automation, threat hunting, and incident response.
Posted in talks | Comments Off on Extra layer of security for your self-hosted services (Tom Kern)