Loading…
This event has ended. Visit the official site or create your own event on Sched.
WELCOME TO THE TEXAS CYBER SUMMIT
Thursday, October 10
 

11:00am CDT

10 - Capture The Flag

START: 11:00AM OCTOBER 10th, 2019
END: 1PM OCTOBER 12th, 2019
Rules:
It's forbidden to:
  • attack the organnizers infrastructure;
  • generate large amounts of traffic (DDoS);
  • attack computers of the jury or other participants;
  • share flags with other participants.
The amount of points that every team gets for each task depends on how many times this task was solved by all teams.
Submit this flag to solve the welcome task: flag{4760227a29364a3b7eca0491457e77e2}
Each task is marked as easy, medium or hard. This difficulty level doesn’t affect scoring formula of the task, which only depends on the amount of teams that has submitted the flag.
Default flag format: flag{[a-f0-9]{32}}
The organizers reserve the right to disqualify participants for violating the rules.
Located on the 4th Floor: Seguin A

Thursday October 10, 2019 11:00am - Saturday October 12, 2019 1:00pm CDT
SEGUIN A - 4th Floor
  Competition, Hacking

1:00pm CDT

RE-1012 Ghidra for the begineer reverse enginering

The open-source release of the NSA's Ghidra disassembler gives software reverse engineers a free option for high-capability interactive analysis of binary code. Many software reverse engineering (SRE) practitioners have been spending time since the release learning about Ghidra and bringing it into their workflow. It also gives those new to SRE a toolset to learn with that is not restricted by commercial license costs or "demo" limitations.


The goal of this session is to expose attendees with no prior reverse engineering experience to the Ghidra disassembler. Ghidra will be used as an environment in which the basics of reading, navigating, and analyzing executable code will be demonstrated. Dr. McGrew will demonstrate how to install and configure Ghidra, and then load a series of sample programs that he will use to illustrate:
Strategies for analyzing unknown programsLinking and loading in WindowsData typesC code constructs in assembly
All of these concepts will be discussed in the context of the iterative process of reverse engineering unknown code--using what we know about the program based on its API calls and overtly documented information to deduce the types and purposes of undocumented variables and functions.


Attendees who wish to follow along should bring a laptop with Ghidra installed (http://ghidra-sre.org). A link will be provided in-class to samples that will be used. Following along is not required! Attendees who simply observe and ask questions will still gain a useful exposure to reverse engineering and Ghidra. Resources for continuing to learn reverse engineering will be recommended.

Speakers
avatar for Wesley McGrew

Wesley McGrew

Director of Cyber Operations, HORNE Cyber
Dr. McGrew serves as director of cyber operations for HORNE Cyber. Known for his work in offense-oriented network security, Wesley specializes in penetration testing, vulnerability analysis, reverse engineering of malicious software and network traffic analysis. Wesley is the author... Read More →


Thursday October 10, 2019 1:00pm - 3:00pm CDT
BONHAM 3-C | Expert 1 600 E Market St, San Antonio, TX Floor 3

1:00pm CDT

TH-3011 Passive DNS & pBGP in Depth Lab

Passive DNS in Depth
Passive DNS (pDNS) data is a treasure trove of information for security teams, intelligence teams, network operations teams, and security research teams alike. By keeping an historical record of DNS results of time this data empowers many different teams to enrich and produce intelligence information for a variety of purpose. Merger and acquisition teams can look for internet facing, and sometimes internal, IT resources that may not have been declared. Blue teams can monitor for mis-configuration of DNS, research malware, develop threat signatures, and in many cases monitor for shadow IT. Red teams can use this information to exploit DNS misconfigurations, find additional assets, and pattern match target IT infrastructure. Security researchers are limited only by their imagination and time.
Passive BGP (pBGP) data can enable network operations teams to quickly spot problems. pBGP data is also useful to help determine if problems were a result of a simple misconfiguration or a part of a more nefarious operation.
Understanding the architecture and methodology of pDNS and pBGP is critical to end users of this data. By having a deeper understanding of the architecture (collection, storage, and query methodologies), individuals and teams will be more able to fully capitalize on the enrichment and context building capabilities of the data. As well as architecture, this course will cover a variety of scenarios for organizations of all sizes and maturity to help enable the use and integration of pDNS and pBGP data as a part of security and network operations.

Speakers
avatar for Donald Mac McCarthy

Donald Mac McCarthy

Director of Field Operations, Open Source Context
Mac is a 17 year veteran of the IT industry. He has experience worked for organization ranging in size from 10 to 200,000+ employees. Mac has been involved in information security for the past 9 years with organizations in the academic, healthcare and financial, and public sectors... Read More →


Thursday October 10, 2019 1:00pm - 5:00pm CDT
CROCKETT 4-D ICS SCADA HAVEN 600 E Market St, San Antonio, TX Floor 4

3:00pm CDT

WS-3033 Hacking with IPv6 Network Tools

IPv6 Hacking Tools, IPv6 basics then some of the hacking/testing tools specifically designed for IPv6.

Speakers
avatar for Jeff Carrell

Jeff Carrell

Network Consultant, Network Conversions
Husband, author, speaker, trainer, network guy, IPv6, learning Python Co-author Guide to TCP/IP 5th Ed, LEGO builder, diver, RPi. Work at HPE


Thursday October 10, 2019 3:00pm - 6:00pm CDT
BONHAM 3-E | Expert 3 600 E Market St, San Antonio, TX Floor 3
 
Friday, October 11
 

3:00pm CDT

WS2014 - Malware Traffic Analysis Workshop 1

This session is part one of a hands-on workshop presented across two separate sessions. The training provides a foundation for investigating packet captures (pcaps) of malicious network traffic from hosts running Microsoft Windows. Participants will review basic investigation concepts, set up Wireshark, and identify hosts and users in network traffic. The training provides several examples of infection traffic that focuses on mass-distribution commodity malware commonly seen from malicious spam. Pcaps for this workshop will be available online. For the best hands-on experience, participants should have a relatively current version of Wireshark (version 2.6 or better), preferably in a non-Windows environment.
  • You will be required to bring your own laptop, please install a virtual machine (VM) running Linux is recommended for participants using a Windows-based laptop.

Speakers
avatar for Brad Duncan

Brad Duncan

Threat Intelligence Analyst, Palo Alto Networks - Unit 42
isc.sans.edu. Brad routinely blogs technical details and analysis of infection traffic at www.malware-traffic-analysis.net, where he provides traffic analysis exercises and over 1,600 malware and traffic samples to a growing community of information security professionals.">After 21 years in the US Air Force, Brad transitioned to cyber security in 2010, and he is a currently a Threat Intelligence Analyst... Read More →


Friday October 11, 2019 3:00pm - 5:00pm CDT
BONHAM 3-C | Expert 1 600 E Market St, San Antonio, TX Floor 3
 
Saturday, October 12
 

2:00pm CDT

WG-1001 Cyber Wargames CTF

Workshop description:
New to CTFS? Always wanted to try but felt you were to "new"? Join us for Prevade's Cyber Wargame where you can experience the CTF with support and guidance of a community of mentors.Prevade's patent-pending cyber wargaming platform is comprised of ten subject domains, ten levels of difficulty, and more than fifty modules hosted in an on-demand, web-accessible, and dedicated tenancy cloud environment. Accessible from any device with a web browser and Internet connection, Metaform™ provides a unique, immersive, and hands-on experience using innovative gamification concepts and interfaces.

Speakers
BM

Bryan McAninch

Founder & Executive Director, Prevade Cybersecurity


Saturday October 12, 2019 2:00pm - 4:00pm CDT
BONHAM 3-B | Bee'ing New 600 E Market St, San Antonio, TX Floor 3
 


Filter sessions
Apply filters to sessions.