DCG 201 Online Meet Up — April 2021 — Application Is Meditating

Date: April 16th, Friday

Time: 7:00 PM EST — ???

Location: ONLINE (SEE BELOW)

Meet-Up: https://www.meetup.com/DEFCON201/events/277538431/

Facebook: https://www.facebook.com/events/554252495545299/

Write.As [TOR]: http://writeas7pm7rcdqg.onion/defcon201/defcon-201-online-meet-up-april-2021-application-is-meditating

Hackaday: TBA

::DEFCON 201 — CODE OF CONDUCT::

Welcome to the April 2021 DCG 201 Meet Up!

Spring is in the air…as well as the infamous April Showers. And when it rains, it POURS! Millions of vaccination rolling out globally, more civil unrest unfolding, FOSS orgs imploding, canals getting blocked and TONS of exploits and data leaks flooding the intertubes.

Join us for this month’s meet up as we deep dive into more traditional hacker AF topics from video game hardware manipulation, exploits, digital archiving, CTFs and more as you get to interact with us via our Big Blue Button posted on our social media the day of the event! All online as we wait for more people to get their Bio-Blue Team Hardened for more traditional in-person meet ups later this summer!

All activities, chats, talks, workshops and DCG 201 insanity will be broadcasted online via our LIVE STREAMS per the new normal!

Live Streams:

Twitch: https://www.twitch.tv/defcon201live

dLive: https://dlive.tv/defcon201

YouTube: https://www.youtube.com/c/defcon201

Facebook: https://www.facebook.com/groups/defcon201/

PeerTube: https://diode.zone/accounts/dc201/video-channels

EMAIL US TO INQUIRE FOR VIDEO CONFERENCING LINK!

If you like to do a talk at our meet ups our collaborate with our staff and members in a project partnership shoot us a email at:

INFO {at} DEFCON201 [DOT] ORG

.::AGENDA & SCHEDULE::.

ALL TIMES ARE EASTERN STANDARD (EST)
7:00pm — 7:55pm
PRE SHOW :: Black Hat Webcast Series — It’s not FINished: The Evolving Maturity in Ransomware Operations
7:55pm — 8:00pm
DCG 201 Announcements
8:00pm — 8:30pm
Detecting At-Risk Software — Kaylea Champion
8:30pm — 9:00pm
The Joy-Con Symphonic Orchestra — sirocyl
9:00pm — 10:00pm
npm’s Gone Wild: The Undefined Edition (CVE-2021–28918) — SickCodes, John Hacking, Kaoudis, Koroeskohr, Tensor_Bodega
10:00pm — ???
Open Workshops: DEFCON 201 Show & Tell + Games + Hangout

.::OPEN PROJECTS::.

DC201 Hacker Show & Tell — Everyone
PlaidCTF 2021 — Everyone
Folding@Home VS Coronavirus (Team: 241960) — GI Jack, Everyone
Among Us — Everyone

.::LIGHTNING TALKS::.

PRE SHOW :: Black Hat Webcast Series — It’s not FINished: The Evolving Maturity in Ransomware Operations

:..>Our PRE-SHOW will a relevant talk from the Black Hat Webinar series!

Ransom demands are becoming larger, attackers smarter, and intrusions longer. Ransomware threat actors are hitting European companies hard with more effective ransomware deployment resulting in devastating impacts to victim organizations. When they strike, their ransomware deployments are more complete, more effective, and they are crippling many organizations to the point where there is often no clear path back to business.

We will be sharing tradecraft we’ve seen ransomware threat actors employ across Europe in 2020. We cover how we’re seeing ransomware crews leverage high-profile critical vulnerabilities to gain footholds in as many victims networks as possible, only to come back weeks or even months later to leverage those footholds into full-scale ransomware deployments.

Not only are intrusion tactics improving, but attackers are also transitioning and developing sleek ransomware-as-a-service platforms. Threat actors are professionalising and streamlining their platforms. These platforms are being used by threat actors to generate malware, to communicate and negotiate with victims, and in some cases, for payment processing and decryption utility delivery.

:..>Bio: Mitchell Clarke is a Principal Incident Response Consultant for Mandiant United Kingdom and Ireland. He specializes in providing enterprise-scale response operations for clients facing sophisticated network intrusions by determined attackers. Mitchell is well practiced in leading both large and complex response operations for multinational organizations as well as tightly focused response operations for highly specialized organizations protecting critical intellectual property or sensitive information. Mitchell has led organizations across multiple industries in responding to breaches by adversaries ranging from well-resourced and stealthy nation-state sponsored espionage threat groups to highly motivated cybercriminals seeking to extort or ransom victim organizations.

:..>Bio: Tom Hall is a Principal Incident Response Consultant in Mandiant’s UK team, and European Incident Response Function lead. As part of the Incident Response team, Tom provides services to clients when a breach occurs and has worked on Incident Response engagements globally with Mandiant since 2015. Tom has been responsible for leading and assisting organizations that involved advanced targeted threats and works closely with colleagues on new methods to proactively identify threats using new methodologies.

:..>Bio: Joe Slowik has over a decade of experience across multiple cyber disciplines. From work in the US Navy, to the US Department of Energy and Los Alamos National Laboratory, to industrial control security company Dragos, Joe has covered multiple facets of cyber intrusions and critical infrastructure defense. As a Senior Security Researcher at DomainTools, Joe continues his work tracking state-sponsored and criminal threats to enterprises with an emphasis on critical infrastructure and related targets.

Detecting At-Risk Software Infrastructure

:..>Software serves as infrastructure and it can suffer from a lack of maintenance. Problems can be invisible and repairs may be difficult to prioritize. These factors lead to a type of risk we call “underproduction” — projects that are highly important but low quality. We want to understand how to detect this kind of risk in Free/Libre Open Source Software infrastructure before major failures occur. We’ll be presenting results from our research into this question.

:..>Bio: Kaylea Champion is a PhD student in Communication at the University of Washington with a background in tech support and system administration. As a member of the Community Data Science Collective, she studies how people work together to build incredible public goods like GNU/Linux and Wikipedia, including not only how these projects succeed and thrive but also where they sometimes fall short. When not slinging python or chewing through data, she enjoys running in the woods, playing board games, and cooking for a crowd.

The Joy-Con Symphonic Orchestra

:..>Did you know that the Nintendo Switch Joy-Con Controller “HD Rumble” system is so precise that you can vibrate the motors to play music? Many first party Nintendo games have used this function and now thanks to sarossilli (no relation to sirocyl) you can do so at home! In this talk DCG 201 Member sirocyl will look at a program that allows Nintendo Switch Joy-Cons to play .midi files through vibrations using C++ and the HID API hidraw library to interface with the controllers. This will be followed by a mini-jam session that might extend to the hang out portion of the meet up!

:.>Bio: sirocyl is a DCG 201 alumnus and founder of the famitracker.org FamiTracker and Famicom/NES music community. He is also part of MAGFEST video game convention volunteer staff.

npm’s Gone Wild: The undefined Edition (CVE-2021–28918)

:..>How we copped a decade old 0-day, while fixing another one. Randomly assembled global team of then strangers. The power of dropping research on a Sunday.

:..>Bio: Research by…

Victor Viale: https://github.com/koroeskohr || https://twitter.com/koroeskohr

Sick Codes: https://github.com/sickcodes || https://twitter.com/sickcodes

Kelly Kaoudis: https://github.com/kaoudis || https://twitter.com/kaoudis

John Jackson https://twitter.com/johnjhacking

Nick Sahler: https://github.com/nicksahler || https://twitter.com/tensor_bodega

Olivier Poitrey: https://github.com/rs || https://twitter.com/olivier_poitrey

.::OPEN PROJECTS::.

DCG 201 Hacker Show & Tell

:..>After our lightning talks DCG 201 members will be given an opportunity to show off the various projects that they have been working on. You can join in any time as we chat and some things we might be showing off for the first time so you don’t want to miss this on the LIVE Stream!

To get the URL and Password for the group hang out, pay attention to our Twitter or sign up on Meet Up!

:..>What You’ll Need: If you want to get in on the action, just bring any hardware or software program you are working on. For hardware, make sure you have a camera with decent resolution. For software, make sure your screen sharing function is working. For interaction, make sure you have your microphone on your computer or headset in working order.

PlaidCTF 2021

:..>This Friday, starting on April 16th at 5:00 PM EST, we invite all DEFCON 201 Members, Attendees and Fans to help us hack the PlaidCTF 2021! If you are new to Online CTF, we will help you get set up and walk you through some of the challenges. Then you can log in anytime after until April 17th 5:00 PM EST to continue our CTF conquest! To learn more about the CTF, please follow this link: https://defcon201.medium.com/dcg-201-online-ctf-plaidctf-2021-april-15th-18th-1ea8c7c4954c

:..>What To Bring: Any laptop will do. Ideally you want to load it full of Information Security Red Team and Blue Team tools, look at Kali Linux, Parrot OS, Pentoo or Black Arch for ideas. To participate online, you will need a Discord Account and to join our Discord at this link: https://discord.gg/PGgPNEF

Folding@Home VS Coronavirus

:..>Folding@home (FAH or F@h) is a distributed computing project for simulating protein dynamics, including the process of protein folding and the movements of proteins implicated in a variety of diseases. Currently F@h is simulating the dynamics of COVID-19 proteins to hunt for new therapeutic opportunities. We want to contribute and you can help! Join the DEFCON 201 Folding@Home Team: 241960

:..>What You’ll Need: Download and run Folding@home for Windows/Mac/Linux/FreeBSD, ideally on your highest performance system with a GPU and join our F@h Team 241960: https://foldingathome.org/start-folding/

AMONG US

During our stream, we will be playing the hit game Among Us with the DEF CON audience! Watch the stream to find out how to join.

Steam: https://store.steampowered.com/app/945360/Among_Us/
iOS: https://apps.apple.com/us/app/among-us/id1351168404
Android: https://play.google.com/store/apps/details?id=com.innersloth.spacemafia&hl=en_US&gl=US

The game takes place in a space-themed setting, in which players each take on one of two roles, most being Crewmates, and a predetermined number being Impostors. The goal of the Crewmates is to identify the Impostors, eliminate them, and complete tasks around the map; the Impostors’ goal is to covertly sabotage and kill the Crewmates before they complete all of their tasks. Players suspected to be Impostors may be eliminated via a plurality vote, which any player may initiate by calling an emergency meeting (except during a crisis) or reporting a dead body. Crewmates win if all Impostors are eliminated or all tasks are completed whereas Impostors win if there is an equal number of Impostors and Crewmates, or if a critical sabotage goes unresolved.

::END OF LINE::

North East New Jersey DEFCON Group Chapter. Dirty Jersey Represent! We meet at Sub Culture once a month to hack on technology projects! www.defcon201.org

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store