Loading…
This event has ended. Visit the official site or create your own event on Sched.
WELCOME TO THE TEXAS CYBER SUMMIT
red team [clear filter]
Thursday, October 10
 

11:00am CDT

PT-1012 The Pentester Blueprint: A Guide to Becoming a Pentester

Same as BN-1012
Pentesting or ethical hacking as it is more commonly known has become a much sought-after job by people in IT, InfoSec, or those just trying to get into the industry. In this presentation, Phillip Wylie shares the blueprint for becoming a pentester. The presentation combines Phillip’s experience as a pentester and ethical hacking instructor to give attendees a guide on how to pursue a career as a pentester. Phillip shares what has worked for his students and people that he has mentored over his years as a pentester. This presentation covers the knowledge and skills needed to become a pentester as well as the steps to achieve them.

Speakers
avatar for Phillip Wylie

Phillip Wylie

Security Solutions Specialist, CYE
Phillip is a passionate offensive security professional with over two decades of information technology and cybersecurity experience. His experience includes penetration, red teaming, and application security.When Phillip is not hacking, he educates others about pentesting and web... Read More →


Thursday October 10, 2019 11:00am - 12:00pm CDT
BONHAM 3-E | Expert 3 600 E Market St, San Antonio, TX Floor 3

3:00pm CDT

BN-1012 The Pentester Blueprint: A Guide to Becoming a Pentester

Pentesting or ethical hacking as it is more commonly known has become a much sought-after job by people in IT, InfoSec, or those just trying to get into the industry. In this presentation, Phillip Wylie shares the blueprint for becoming a pentester. The presentation combines Phillip’s experience as a pentester and ethical hacking instructor to give attendees a guide on how to pursue a career as a pentester. Phillip shares what has worked for his students and people that he has mentored over his years as a pentester. This presentation covers the knowledge and skills needed to become a pentester as well as the steps to achieve them.
There is another class at 11:00am PT-1012 if this one fills up.

Speakers
avatar for Phillip Wylie

Phillip Wylie

Security Solutions Specialist, CYE
Phillip is a passionate offensive security professional with over two decades of information technology and cybersecurity experience. His experience includes penetration, red teaming, and application security.When Phillip is not hacking, he educates others about pentesting and web... Read More →


Thursday October 10, 2019 3:00pm - 4:30pm CDT
BONHAM 3-B | Bee'ing New 600 E Market St, San Antonio, TX Floor 3

3:00pm CDT

WS-3033 Hacking with IPv6 Network Tools

IPv6 Hacking Tools, IPv6 basics then some of the hacking/testing tools specifically designed for IPv6.

Speakers
avatar for Jeff Carrell

Jeff Carrell

Network Consultant, Network Conversions
Husband, author, speaker, trainer, network guy, IPv6, learning Python Co-author Guide to TCP/IP 5th Ed, LEGO builder, diver, RPi. Work at HPE


Thursday October 10, 2019 3:00pm - 6:00pm CDT
BONHAM 3-E | Expert 3 600 E Market St, San Antonio, TX Floor 3

3:30pm CDT

FR-2016 Red Team BackdorOS, in-Memory

In this talk, come witness BackdorOS a new stealth malicious in-memory OS through a demo that will then be released directly in your hands. This malicious OS, just like a regular OS, provides a software platform on top of which application programs can run. Then I will explore already-existing applications that can run on top of it and how to develop new applications for BackdorOS. Wait for it! I then touch upon how to detect and remediate such threat
Notes: My company specializes in developing breach and attack simulation software. We’re focused on researching novel attack methods. This is one of the many projects that we publish. (Examples for past projects: “The Adventures of AV and the Leaky Sandbox” and “Crippling HTTPS with Unholy PAC”


Speakers
avatar for Itzik Kotler

Itzik Kotler

SafeBreach


Thursday October 10, 2019 3:30pm - 4:30pm CDT
TEXAS BALLROOM - E Track 3 600 E Market St, San Antonio, TX Floor 4
 
Friday, October 11
 

2:30pm CDT

HX-3015 Deploying Cloud Native Red Team Infrastructure with Kubernetes, Istio and Envoy

Larry will walk you thorugh the technical details of building nimble Red Team infrastructure that
leverages cloud native orchestration frameworks such as Kubernetes and service meshes
such as Istio. Special attention will be paid to containerizing and developing deployment
artifacts in Helm for popular C2 frameworks. Automated Kubernetes cluster deployment will be covered for AWS, Google Cloud, and Azure. Details will be given on configuring the Envoy proxy as a redirector and filter in order to obfuscate the infrastructure from unwanted probing by defenders. Techniques for real time monitoring of implant communication will be addressed. The talk will also review the recipes currently available in the Kubered framework (https://github.com/cloudc2/kubred) and other resources helpful for cloud native Red Team operations.

Speakers
avatar for Larry Suto

Larry Suto

Consultant, SDCI
Larry Suto is an independent security consultant based out of Oakland, CA. and spends a lot of time researching using cloud infrastructure for all types of security testing. He does Windows penetration testing as much as possible and seeks to enlighten people on advanced ways to deploy... Read More →
avatar for Jeff Holden

Jeff Holden

CISO, CCC Technology Center
Jeff Holden works for a large college system as an Information Security Manager/jack of all trades.His favorite part of the job though is in the penetration testing of the colleges in the system. He also contributes to open source projects and releases his own code


Friday October 11, 2019 2:30pm - 3:30pm CDT
TEXAS BALLROOM - E Track 3 600 E Market St, San Antonio, TX Floor 4

5:15pm CDT

RT-3006 Red Teaming MacOS Environments

This talk is focused on red teaming techniques and tools against MacOS hosts in enterprise environments. Below is the outline of topics that will be discussed:

-Intro
-Agenda
-A Look at MacOS Enterprise Deployments (Common technologies, Remote management, Local admin rights, Misconfigurations)
-Phishing techniques (Payload types, Credential harvesting techniques)
-Gatekeeper (What is it?, How does it work?, Ways around it/limitations)
-Post Exploitation Methods and Examples
-Common patterns/detection techniques (Parent-child processes, Command line arguments, Network connections)
-Migrating to API Calls (How?, Why This is Harder to Detect, Examples)
-Defensive Recommendations (Host-based, Network-based)
-Q&A

Speakers
avatar for Brandon Dennis

Brandon Dennis

CEO, RedTeam Nation
Brandon is an offensive security engineer who came from a jack of all trades background. Brandon has does everything from Development, Systems Administration, networking and Red Teaming. Brandon is the founder of RedTeam Nation. A company designed to bring individuals into Red Teaming... Read More →


Friday October 11, 2019 5:15pm - 6:15pm CDT
TEXAS BALLROOM - E Track 3 600 E Market St, San Antonio, TX Floor 4
 


Filter sessions
Apply filters to sessions.