Loading…
This event has ended. Visit the official site or create your own event on Sched.
WELCOME TO THE TEXAS CYBER SUMMIT
Thursday, October 10
 

4:30pm CDT

AI-2003 The benefits of separating ML process workflows

Model View Controller (MVC)is a software design pattern that decouples related program logic into three interconnected elements allowing for code reuse and parallel development
Support Vector Machine(SVM)are supervised learning models with associated learning algorithms that analyze data used for classification and regression analysis

MVC Components•Model•The central component of the pattern. It is the application's dynamic data structure, independent of the user interface. It directly manages the data, logic and rules of the application.•View•Any representation of information such as a chart, diagram or table. Multiple views of the same information are possible, such as a bar chart for management and a tabular view for accountants.•Controller•Accepts input and converts it to commands for the model or view

Speakers
avatar for Karl Rasmussen

Karl Rasmussen

Tech Advisor, MITRE
MITRE Technical advisor for ACC/A26 at Lackland AFB, Texas.Background in Machine Learning, Malware Triage and Cloud.


Thursday October 10, 2019 4:30pm - 5:30pm CDT
TEXAS BALLROOM - E Track 3 600 E Market St, San Antonio, TX Floor 4
 
Friday, October 11
 

1:00pm CDT

NA-2066 Exploiting Information Leaks for Amazing Network Discovery

Identifying assets on modern networks is more complicated than ever due to the adoption of software defined networks, virtual machine environments, container environments, hybrid clouds, and internet-connected smart devices. This presentation dives into original research and lesser-known techniques that can be used to quickly discovery devices across complex environments, without the use of passive traffic analysis or credentials.

Speakers
avatar for HD Moore

HD Moore

Developer, Critical Research Corporation
H D Moore is network security expert, open source programmer, and hacker. He is a developer of the Metasploit Framework, a penetration testing software suite, and the founder of the Metasploit Project.He served as Chief Research Officer at Boston, MA based security firm Rapid7, a... Read More →


Friday October 11, 2019 1:00pm - 2:00pm CDT
TEXAS BALLROOM - E Track 3 600 E Market St, San Antonio, TX Floor 4

2:30pm CDT

HX-3015 Deploying Cloud Native Red Team Infrastructure with Kubernetes, Istio and Envoy

Larry will walk you thorugh the technical details of building nimble Red Team infrastructure that
leverages cloud native orchestration frameworks such as Kubernetes and service meshes
such as Istio. Special attention will be paid to containerizing and developing deployment
artifacts in Helm for popular C2 frameworks. Automated Kubernetes cluster deployment will be covered for AWS, Google Cloud, and Azure. Details will be given on configuring the Envoy proxy as a redirector and filter in order to obfuscate the infrastructure from unwanted probing by defenders. Techniques for real time monitoring of implant communication will be addressed. The talk will also review the recipes currently available in the Kubered framework (https://github.com/cloudc2/kubred) and other resources helpful for cloud native Red Team operations.

Speakers
avatar for Larry Suto

Larry Suto

Consultant, SDCI
Larry Suto is an independent security consultant based out of Oakland, CA. and spends a lot of time researching using cloud infrastructure for all types of security testing. He does Windows penetration testing as much as possible and seeks to enlighten people on advanced ways to deploy... Read More →
avatar for Jeff Holden

Jeff Holden

CISO, CCC Technology Center
Jeff Holden works for a large college system as an Information Security Manager/jack of all trades.His favorite part of the job though is in the penetration testing of the colleges in the system. He also contributes to open source projects and releases his own code


Friday October 11, 2019 2:30pm - 3:30pm CDT
TEXAS BALLROOM - E Track 3 600 E Market St, San Antonio, TX Floor 4

4:00pm CDT

DO-3030 Anatomy of cloud hacking

Hack the Clouds, see it Rain !


Speakers
avatar for Dhruv Shah

Dhruv Shah

NotSoSecure
Dhruv Shah  Senior Security Consultant and Trainer Dhruv has been with NotSoSecure since 2017 and has worked on security issues with a broad range of clients, including major banking, finance and media companies. This work involves web and application penetration testing and network... Read More →


Friday October 11, 2019 4:00pm - 5:00pm CDT
TEXAS BALLROOM - E Track 3 600 E Market St, San Antonio, TX Floor 4
 
Saturday, October 12
 

11:15am CDT

BT-3082 Learning to Rank Strings Output for Speedier Malware Analysis

StringSifter: Learning to Rank Strings Output for Speedier Malware Analysis
In static analysis, one of the most useful initial steps is to inspect a binary's printable characters via the Strings program. However, running Strings on a piece of malware inevitably produces noisy strings mixed in with important ones, which can only be uncovered after sifting through the entirety of its messy output. To address this, we are releasing StringSifter: a machine learning-based tool that automatically ranks strings based on their relevance for malware analysis. In our presentation, we'll show how StringSifter allows analysts to conveniently focus on strings located towards the top of its predicted output, and that it performs well based on criteria used to evaluate web search and recommendation engines. We’ll also demonstrate StringSifter live in action on sample binaries.


Speakers
avatar for Philip Tully

Philip Tully

Staff Data Scientist, FireEye
As a Staff Data Scientist at FireEye, Philip Tully builds predictive models for detecting and categorizing malware. He earned his joint doctorate degree in computer science from the Royal Institute of Technology (KTH) and the University of Edinburgh. His research concerning the intersection... Read More →


Saturday October 12, 2019 11:15am - 12:00pm CDT
BONHAM 3-E | Expert 3 600 E Market St, San Antonio, TX Floor 3

1:00pm CDT

HX-3012 PErfidious: Make PE Backdooring Great Again!

PErfidious is a Python3 tool that aims to directly take a benign PE executable and malicious shellcode as input. Next, it transforms the shellcode into individual pieces of independent code that can be connected via jumps and calls and then converts the transformed code back into individual collection of bytes. These collections are then injected into appropriate locations in the .text section of the PE file. After injection, PErfidious performs all the recalculations required to incorporate the changes in the .text section. This makes sure that all the regular traces of code injection are gotten rid of. The only way for the endpoint detection system to verify that the program was injected is to calculate or read the hash/checksum of the PE file and compare it with the has/checksum provided by the original author of the benign application that was injected by us.
Apart from being a tool, PErfidious is also a Python3 library that can be used for inspecting, dissecting and injecting PE files. It extracts every data structure inside a PE file and convert it into an editable class file with appropriately nested subclasses(it even outputs the entire structure in XML so that a user can develop web applications around it). It aims at being a modern and extensible replacement for pefile package and the go-to library for working with anything related to PE32/PE32+/DLL type files.


Speakers
avatar for Shreyans Doshi

Shreyans Doshi

Malware Research Intern, Cybrary, Inc
Shreyans Devendra Doshi is a Cybersecurity Graduate Student at the University of Maryland, College Park. He has previously worked as a Malware Research Intern at Cybrary Inc., where he started developing PErfidious and researched other techniques that can be used to bypass modern... Read More →


Saturday October 12, 2019 1:00pm - 2:00pm CDT
TEXAS BALLROOM - E Track 3 600 E Market St, San Antonio, TX Floor 4

3:30pm CDT

RT-2018 REST in Peace: Abusing GraphQL to Attack Underlying Infrastructure

GraphQL is a query language for APIs set to replace RESTful architecture. The use of this technology has achieved rapid adoption and is now leveraged by companies such as GitHub, Credit Karma, and PayPal. Despite its popularity, this new approach to building APIs can leave organizations at risk. While it solves real-world problems, proper implementation is left up to developers who often don't fully understand how to secure their API. Security best practices are easily overlooked, and rushed development can leave cracks in the armor. These issues create a new attack surface for us to explore as well as new ways to exploit underlying infrastructure and code. From Queries and Mutations to Types and Fields, properly attacking a target requires that you understand it. We will learn enough about GraphQL to be dangerous. Demonstrate how to use the technology’s intricacies against itself while taking advantage of implementation errors and misconfigurations. Examine GraphQL specific attacks as well as tried and true techniques adapted to fit into the GraphQL context. Then walk through how to carry out these attacks efficiently and effectively.

Speakers
avatar for Matt Szymanski

Matt Szymanski

OffSec Engineering Manager, n/a
Matt Szymanski is a Senior Security Engineer specializing in Offensive Application Security. Passionate about AppSec, he leverages over a decade of experience as a programmer to discover and help remediate vulnerabilities. He has developed and taught secure coding workshops, mentored... Read More →


Saturday October 12, 2019 3:30pm - 4:30pm CDT
TEXAS BALLROOM - E Track 3 600 E Market St, San Antonio, TX Floor 4
 


Filter sessions
Apply filters to sessions.