BSides Basingstoke 2023

21//07/2023


Schedule

Time Activity Title Recorded
09:30-10:00 Arrivals No
10:00-10:15 Welcome No
10:15-10:45 Keynote: Rebecca Markwick Telling people not to click links is a terrible idea Yes
10:50-11:20 Talk: Will Thomas (@bushidotoken) CL0P likes to MOVEit MOVEit Yes
11:25-11:55 Talk: Darren (@fullspectrumdev) Living forever in the internet of e-waste Yes
12:00-12:30 Talk: Ignacio Arnaldo Detecting Network Beaconing with Convolutional Networks and Zeek Logs Yes
12:30-13:30 Lunch Catering by The Dice Tower No
13:30-14:00 Talk: Ben M From the Enigma code to cyber warfare No
14:05-14:35 Talk: Toby D Hack the printer! Hack the printer! Yes
14:35-14:55 Break No
14:55-15:25 Talk: Ryan Saridar Finding a vulnerability in Half Life Yes
15:30-15:50 Charity auction Raising money for World Central Kitchen (WCK) and Front Line Kitchen Yes
15:55-16:25 Talk: Dan Cannon Red Red Whine Yes
16:30-17:00 Talk: Pete Neve (@Th3S3c3r3tAg3nt) Talk: 5 Years of Incidents. What did we learn? No
17:00-17:15 Wrap up No
17:15-??? Party hard Head back to The Dice Tower for drinks! Absolutely not!

Talks

  • Too many phishing training programmes focus on the wrong thing. Marketing metrics, celebrating tricking users, and telling them not to do their job. Traditional phishing simulations can make your staff less secure. Why are we penalising staff for doing their jobs? Why are we undermining trust in security teams? I'll dive into the behaviours we want our staff to have and why there is a mismatch between these and how most people run phishing simulations. This talk seeks to help you reconsider how you view phishing awareness so you can truly help protect your staff.

    —————————

    Rebecca has spent over a decade designing and delivering training. Her experience in complex behavioural training allows for an innovative approach to designing security awareness programmes and accompanying metrics. Using her varied experience she is able to identify and track areas of high human risk and design suitable mitigations and metrics to measure efficacy in order to reduce these risks. One of her key areas of interest is phishing and how best to protect the everyday user from attack.

  • The pesky CL0P ransomware group have done it again. They've attacked hundreds of organizations using another File Transfer System exploit. It's time to analyze what this group has been up to recently and why they've decided to ditch encryption in favour of data-theft-extortion.

    —————————

    Will Thomas is a prominent cybersecurity researcher who has had his work featured by several well known publications such as The Telegraph, VICE, CyberScoop, BleepingComputer, TheRegister, Mircrosoft, VirusTotal, and more. Currently a CTI researcher and threat hunter at the Equinix Threat Analysis Center (ETAC), he has previously appeared on Darknet Diaries, spoken at multiple conferences, contributor to the MITRE ATT&CK framework, and is the co-author of the SANS FOR589: Cybercrime Intelligence course.

  • This talk is about reverse engineering the end of life Cisco SPA112 device (and its friends) in order to figure out how to exploit CVE-2023-20126 and develop a reliable remote exploit, payload, and toolkit for remotely flashing its firmware to achieve a permanent foothold on target networks.

    —————————

    Darren is a hacker based on a damp rock in the atlantic who spends their time looking after an extremely good looking cat and finding bugs.

  • We will introduce a robust approach to detect network beaconing across DNS, SSL, and HTTP using Zeek logs. We will start by analyzing patterns exhibited by C2 frameworks such as Meterpreter, Empire, Sliver, or Caldera. The wide range of observed behaviors will motivate a machine learning approach that consists in a) generating synthetic data that accounts for different beaconing frequencies, jittering, and latencies, and b) training a Convolutional Neural Network that analyzes the intervals between activities. Finally, we will showcase real-world detections and equip the audience with all the tools needed to apply the approach to their data.

    —————————

    I am lucky to work as a data scientist at Corelight with the creators and maintainers of Zeek, the open source network security monitoring tool. My focus is to use machine learning to solve network security challenges (and there are quite a few!). I am interested in building systems that can put machine learning to use, threat detection and pentesting. Before Corelight, I worked at PatternEx, an early stage AI startup focused on threat detection. In another life, I was a researcher at CSAIL, MIT and received my PhD in computer science from Universidad Complutense in 2013.

  • The Defence Science and Technology Laboratory are finally out in force to support our local BSides. We’re bringing a little piece of WWII history to show off as a celebration of all things crypto and cyber – the story of breaking the Enigma code is the starting point for so much of the infosec and reverse engineering industries today. But who are Dstl? What do we do? Why do we have an Enigma machine? How does it work? Listen in and all will be revealed.

    —————————

    Ben is a Principal Engineer at Dstl with 15 years’ experience delivering the best of science and technology research into bespoke engineering solutions for the Defence and Security of the UK. As the Group Principal for the Cyber Solutions Group with a remit of building and stewarding the cyber engineering capability, Ben has previously worked in digital forensics, penetration testing, vulnerability research, software development, systems engineering, and still hasn’t entirely decided what to be when he grows up.

  • For the 2022 Pwn2Own contest Interrupt Labs exploited an office printer and even made it play our favourite film Hackers. We'll share the complete process so you get an inside view on how P2O contest entries work, from extracting and reverse engineering of the firmware through to exploitation and having some fun streaming videos with shellcode.

    —————————

    Toby (he/him) is a senior vulnerability researcher at Interrupt Labs where he leads a small team finding bugs in difficult but interesting targets. In the past he both has and hasn't found bugs in a range of targets like webservers, phones, antivirus, hypervisors, banking software, network hardware and things that go bang really loud.

  • A breakdown of the process of identifying, understanding, and exploiting a vulnerability in Half Life.

    —————————

    Ryan is a cyber security consultant working for JUMPSEC, with a keen interest in vulnerability research and exploit development.

  • Red Teaming is a popular cybersecurity concept that involves simulating a real-world attack against an organization in order to demonstrate the potential attack chains malicious actors may use as part of an attack. While many security testers are eager to engage in this kind of work, the reality is that not all companies need, or are ready, for a Red Team assessment. Instead, companies should focus on security basics and hygiene to improve their overall security posture.

    —————————

    An enthusiastic and determined individual, Dan has spent over a decade working in the cyber security industry. When not delivering security consultancy services or training, Dan enjoys focussing on community outreach programs that teach students the skills needed to join the industry as well as working with military veterans transitioning into a civilian career in cyber security.

  • At DefCon in 2018 I was convinced to quit my job and head up security at a new company. We are the worlds leading anti-piracy company for broadcasters. My job is to protect companies against highly motivated threat actors. This talk is about a range of security incidents and what we can learn from them.

    —————————

    Pete Neve is a hacker with a strong background in information security. Currently serving as the Head of Information Security at Synamedia in the United Kingdom, Pete holds multiple certifications including CISSP, CEH, and SABSA Chartered Business Security Architect. With over a decade of experience, he has held key leadership positions, including Information Security Manager at Synamedia and Information Security Consultant at Arqiva. Pete's experience includes collaborating with the NCSC as part of the NSIE group protecting Critical National Infrastructure, and working with prominent organizations such as Cisco, Vodafone, and BT. His technical proficiency spans various domains, including system architecture, network security, ethical hacking, and data protection.

Other Events

  • Ever wanted to learn how to hack a car? Come speak to Mintynet at the Car Hacking Village! More info here: https://www.carhackingvillage.com/

  • Join us to build and test your very own battle bot!
    More info: https://www.infosecbattlebots.com/

  • Looking for your next career move? Looking to hire? Write your details on the career board!

  • Come along and learn to pick locks!
    More info: https://toool.uk/

  • Available all day in The Dice Tower!

  • Breakfast will be on sale at The Dice Tower.
    Bag lunches will be provided during the lunch break.
    Snacks will be provided at the After Party, with other food available to purchase.
    Refreshments will be available for purchase at The Dice Tower all day.

  • This year we’re fundraising to feed people in Ukraine (and beyond)! We’ve got goodies from Ukraine again this year to support the Front Line Kitchen (https://twitter.com/frontlinekit) and the World Central Kitchen (https://wck.org).

  • Basingstoke MakerSpace is a shared workshop which provides a wide range of tools for our members including laser cutters and 3d printers. We encourage anyone to come along to our open evenings and events which are held every Tuesday at 65 New Road in the centre of town.
    More info: basingstokemakerspace.org.uk

  • CuTEL will be bringing a fully operational telephone network, including fax machines, dial up internet, Prestel access and possibly the world's shortest ISDN connection. Come and find out what Prince Philip's got to do with the Computer Misuse Act, and learn how vulnerabilities in old telephone networks could be exploited to make cheap calls
    More info: cutel.net

  • Want to evade facial recognition software and look cool doing it? Come get your face painted with your own unique CV Dazzle inspired look! This is happening 1:30pm-3:00pm.
    For more details on how it all works see: https://adam.harvey.studio/cvdazzle or come up and talk to Mairi in person!

  • Get those cybersec stickers, and help a good cause! We’ll be fund raising for the World Central Kitchen (https://wck.org)

  • After party will be held in The Dice Tower


Our Wonderful Sponsors

Gold: Interrupt Labs

Interrupt Labs is a leading vulnerability research company working on some of the toughest challenges in the industry; from popping browsers to exploiting phones and cars we cover it all with our exceptional team of vulnerability researchers. We are always on the look out for talented people; whether you are early on in your career or you already know your way around IDA we are keen to talk research.

You can find out more on our website https://interruptlabs.co.uk to follow our latest research and job openings or on Twitter @InterruptLabs

Gold: Dstl

Dstl is the UK MOD’s Defence Science and Technology laboratory. Based at Salisbury and Fareham, Dstl has a breadth of work across the cyber domain through research and engineering. Dstl is recruiting across the Cyber and Information Systems Division at all levels of skills and experience, so if you are looking for a unique career experience working with people, technologies, and opportunities that just don’t exist in the outside world then please talk to us and check out our vacancies on Civil Service Jobs.

Web: www.gov.uk/dstl
Twitter: @dstlmod

Silver: Pen Test Partners

Pen Test Partners / PTP has been providing cyber security expertise to a huge variety of industries and businesses since 2010. We’re paid to hack and test the security of all sorts of things, as well as providing essential consultancy, digital forensics and incident response / DFIR, and cyber security accreditations.

We’ve tested ships and rigs (at sea!), connected and electric vehicles, the power grids and the stations that keeps countries functioning, as well as the payment, transport, and fulfilment systems on which everybody is reliant. We also do security research. Through that we help get flawed products off shop shelves and assist manufacturers to improve their security game.

It’s all freely available without subscription in the public domain:
https://ptp.sh/in-the-news
https://ptp.sh/blog

Silver: Outpost24

The Outpost24 group helps organizations limit their digital exposure with a complete range of cyber risk management solutions. Outpost24’s cloud platform unifies asset inventory, automates security assessments, and quantifies risk in business context. Executives and security teams around the world trust Outpost24 to prioritize the most important security issues across their entire IT infrastructure for accelerated risk reduction. Founded in 2001, Outpost24 is headquartered in Sweden, with additional offices in the US, the UK, the Netherlands, Belgium, Denmark, France, and Spain.

Web: https://outpost24.com/

Bronze: Tenable

Tenable® is the Exposure Management company. Approximately 43,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include approximately 60 percent of the Fortune 500, approximately 40 percent of the Global 2000, and large government agencies. Learn more at tenable.com, or click here for a 7 day free trial of Nessus Professional or Expert: https://www.tenable.com/products/nessus