BSides Basingstoke 2025

25/07/2025

Time Track 1 Track 2
10:00-10:10 Welcome - Committee
10:10-10:35 Walls, Tags, and TTPs: OpSec Lessons from Graffiti Writers - Pete Neve
10:35-11:00
11:00-11:25 Sigint & cracking RF - James Stone
11:25-11:50 Meshtastic - Wireless wonders for the wandering techies - Martin Robertson
11:50-13:00 Lunch - The Dice Tower
13:00-13:25 All at sea. Thought your OT / IT infrastructure was complex? Try doing it on a cruise ship. - Ken Munro Too Many Cooks in the Code: The Security Cost of Collaboration - Adaora Uche
13:25-13:50 Breaking In, Giving Back: My Cyber Security Journey - Tom Coogans
13:50-14:15 Bridging the Gap: Design and Ops Assemble - Paul Spruce Vesta Admin Takeover - Exploiting reduced seed entropy in bash $RANDOM - Adrian Tiron
14:15-14:40
14:40-15:00 Break
15:00-15:25 Red Team: Are We the Baddies - Rebecca 'Bex' Markwick Hacking ICS & OT Networks - Joseph Foote
15:25-15:50 Forensics: We're Not Just Byte-Sized - Ben Hodson
15:50-16:15 Debugging Burnout: Thriving in a Neurodiverse Tech Teams - Olga Zilberberg QR Codes: Threats, Detection and Mitigation - James Brimer
16:15-16:40 IAM very confused - A Friendly Guide to Cloud and Modern AuthZ - Tom Cope
16:40-17:05 Charity Auction and Closing Remarks - Committee
17:05-??:?? Drinks!!!- The Dice Tower

Track 1

  • Graffiti artists and hackers may seem worlds apart, but both thrive in legal grey zones, chase notoriety with anonymity, and obsess over operational security. This talk explores the real-world OpSec tactics used by graffiti writers - disguises, tools, reconnaissance, and anti-surveillance techniques - and draws direct connections to red teaming, pen testing, and physical security for blue teams.

    Whatever shade of grey your hat is there’s a surprising amount to learn from those who bomb walls, not boxes.

  • Equipment list and guide for getting started with snooping on the radio spectrum

  • OT/IT security is notoriously difficult but never more so than on a ship!

  • A fun and engaging talk around how to foster the much needed collaboration between your Security Design and Operational teams.

  • This talk will look at how Red Team engagements can cause long-term harm in how they plan out and run tests, the pretexts they use, and a fundamental misunderstanding of why they are testing at all. With a focus on human based testing as unlike computers, once you break a person you can’t just reboot or patch it. Certain ethical considerations are ignored or missed because of the attitude of ‘the bad guys could do it so we do it’ when that isn’t a legitimate ethical reasoning. Using real world examples to identify problematic testing and suggesting different ways of doing things, this talk will help change how Red Teams think about engagements and change how engagements are done to improve rather than undermine security in the organisations they work with.

  • The cybersecurity sector thrives on precision, deep focus, and complex problem-solving — strengths often found in neurodivergent professionals.

    Yet behind the high performance, many individuals are silently facing burnout. This interactive workshop explores how to support mental health and reduce burnout risk in neurodiverse cybersecurity teams.

    Through practical tools participants will uncover ways to create inclusive workflows, reduce overwhelm, and foster psychological safety.

    Ideal for team leads, neurodivergent professionals, and anyone passionate about sustainable, human-centred cybersecurity workplaces.

Track 2

  • I can give a rambling talk on Meshtastic, a hobby that can feel like a job at times lol

  • Picture this: Your startup's breakthrough app crashes overnight. The culprit? A single malicious line hidden in a dependency update from a library you've never audited, maintained by someone you've never met. This scenario isn't fiction—it's happening daily across organizations worldwide. While we celebrate collaborative coding as innovation's engine, we've inadvertently created a massive attack surface that traditional security misses entirely. Through real breach stories and practical defense strategies, this talk reveals how attackers exploit our trust in third-party code and, more importantly, how to secure your software supply chain without killing collaboration or velocity.

  • After 20 years in IT and cyber security, from Royal Navy networks to mentoring the next generation, I’ve learned that breaking into cyber can be daunting—but it doesn’t have to be. This talk shares my journey, including how I built the free Cyber Core Skills course to help beginners learn the ropes. It’s a call to action for mentoring, knowledge-sharing, and making cyber security more accessible to everyone.

    The course covers:

    Networking, Windows Domain, Linux, Programming, Cloud and Soft Skills which is equally as hard to develop and are a required skill.

    No product pitches.

  • Vesta is a lightweight, web-based control panel that simplifies Linux server management, appealing to users seeking an intuitive alternative to traditional platforms like cPanel and Plesk. This presentation will examine a critical flaw in Vesta: an admin takeover exploit resulting from reduced seed entropy in the Bash $RANDOM variable. By transforming what was once a theoretical attack into a practical one, we successfully reduced the brute force domain of the seed by over 98%. This allows attackers to generate predictable random values, compromising the security of passwords and tokens. We will discuss the implications of this vulnerability and highlight best practices for enhancing server security in real-world applications.

  • Demystifying Industrial Control Systems and Operational Technology utilised by our country’s most critical infrastructure. We’ll be looking at how to get started hacking into energy, water and gas utilities, and the technology behind them.

  • Incident responders are constantly seeing larger and larger breaches, commonly involving multiple domains, more complex environments and critically, hundreds if not thousands of systems. Investigating each system individually is not feasible, so a new approach is needed, that can leverage cloud compute, machine learning and data science to uncover key findings at scale from diverse data sources in a single pane of glass. This talk will showcase the system architecture, discuss specific technologies for implementation, and show some real-world case studies of just how far this system can be pushed and how it can be used to reduce the mean time to respond (MTTR).

  • QR Codes are a popular attack vector used by threat actors. Statistical evaluation of common QR Code detectors shows that detection of a QR code which is blurred or occluded but none the less recoverable is a computationally hard task. This makes the implementation of practical detection and mitigation systems difficult in real-world scenarios. This is particularly relevant in an adversarial scenario, where an attacker can apply arbitrary transformations to an image which contains a QR code to attempt to bypass CDR systems by making the recognition task sufficiently difficult.

  • Zanzibar? Rego? OPA? Cedar? Who spilled my alphabet soup? In this talk we will take a walk down the last few years of IAM enhancements, discuss new idea, languages, implementations and access control types. We'll cover what you need to know, the move to Cloud Authorisation services and how you can advantage of these breakthroughs to secure your business and applications.