HYBRID HACKER SUMMER CAMP 2021 GUIDE — Part Two: BSides Las Vegas

DCG 201
17 min readJul 31, 2021

--

Welcome to the DCG 201 guide to Hybrid Hacker Summer Camp! This is part of a series where we are going to cover all the various hacker conventions and shenanigans at the end of July to the end of August both In Person & Digital! As more blog posts are uploaded, you will be able to jump through the guide via these links:

HYBRID HACKER SUMMER CAMP — Part One: Surviving Physical + Virtual Vegas

HYBRID HACKER SUMMER CAMP — Part Two: BSides Las Vegas

HYBRID HACKER SUMMER CAMP — Part Three: Ring Zer0

HYBRID HACKER SUMMER CAMP — Part Four: Black Hat USA

HYBRID HACKER SUMMER CAMP — Part Five: FuzzCON

HYBRID HACKER SUMMER CAMP — Part Six: DEFCON 29

HYBRID HACKER SUMMER CAMP — Part Seven: USENIX

HYBRID HACKER SUMMER CAMP — Part Eight: SIGS, EVENTS AND PARTIES

BSides Las Vegas — Camp Stay @ Home

Date: Friday, July 30th (10:00 AM EST) —Sunday, August 1st (10:00 PM EST)

Website: https://www.bsideslv.org/

Platform(s): Twitch, Discord

Scheduel: https://www.bsideslv.org/schedule

Live Streams:

Twitch Track 1: https://www.bsideslv.org/stream1

Twitch Track 2: https://www.bsideslv.org/stream/stream2

Chat: https://discord.gg/YcCWqMW5

Accesability: BSides Las Vegas is FREE this year. You can go to the different rooms, participate in contests, events, listen to DJs and watch talks. Primarily uses text to send messages, uses the system emoji, use reactions, and you can listen to audio and video in channels that support them.

Code Of Conduct: https://www.bsideslv.org/coc

BSides Las Vegas is part of the Security BSides series of security conventions, a series of local conventions often in locations where Hacker and Information Security conventions are not normally held to provide low-to-no-cost education, initiate conversations, and foster community and collaboration. There are 300 BSides events, in 100 cities in 26 countries on 6 continents with BSides Las Vegas being one of the biggest and crown jewel of them all.

Due to their ethos of being entirely volunteer run (Banasidhe, Jack_Daniel and many others) and FREE of charge to attend, BSides Las Vegas has a more community and local vibe to it’s presentation and community. It is also known for it’s unique activities, themed speaker tracks and encouraging community participation.

For 2021, BSides Las Vegas brings Security Summer Camp to a screen near you! All of the quality content and networking you love us for, all of the mischief and weird Canadian hijinks, and even something not entirely unlike our famous pool party!

PROS VS JOES CTF

Date & Time: July 31st from 10:00 AM to 10:00 PM EST Each Day

Pros vs Joes is a Capture the Flag event where inexperienced users learn from seasoned professionals in a fierce competition of attack and defend.

Blue Teams of Joes work with Pro Captains to compete against other defending Teams, protecting horrifically vulnerable networks from assault by a dangerous and relentless Professional Red Team.

For two days the battle will rage on an ethereal field rife with desktops and servers, Linux and Windows, systems and software both old and new.

On day one, Blues lock down their systems against the onslaught.

On day two, Blue Teams turn Purple and can go offensive, attacking the other competing teams.

After the dust settles each day, Blue and Red discuss events to help further mentoring and learning of defensive and offensive tradecraft. Come witness the teams do battle after weeks of preparation.

Only the strongest will survive, but all will learn and have fun!

Lockpick Video Village

For the first time ever, the BSidesLV Lockpick Village team will be running instructional videos on lockpicking- check them out in between talks, read our handy instruction manual and come chat with us in the lockpick-village discord channel.

Hire Ground Camp Counselors

Congratulations on realizing that we all need some help with our career search! We have two groups of camp counselors ready to assist you.

Each camp counselor has set up a scheduling link () for one-on-one sessions. Select a link and see what time is best for you!

https://bsideslv.org/hire_ground

Career Coaching

Career coaches are established community professionals who will give you honest commentary on what to look for next in your career or help you strategize how to overcome certain challenges.

  • Vince Romney 12–2pm
    Avid proponent of security-as-a-lifestyle and practitioner of IT security for over 20 years across both military and civilian organizations.
  • Kat Sweet 12–6pm
    Security professional, educator, and leader building a strong security culture rooted in trust, empathy, and empowerment.
  • Pablo Breuer 12–2pm
    Long time community volunteer who is great at Battleship.
  • Bob Grouley 2–4pm
    Experienced CTO, author and entrepreneur with extensive past performance in enterprise IT, corporate cybersecurity and data analytics.
  • Kevin Mau 2–4pm
    A well versed packet hunter
  • Kevin Babcock 2–4pm
    Business-oriented cybersecurity leader with more than twenty years’ experience leading software-as-a-service (SaaS) projects
  • Jennifer Havermann 2–6pm
    Tribe of hackers honoree

Resume Review

Resume reviewers are technical recruiters in our community who are setting aside 30 minutes to review your resume and give you the straight scoop on how to improve your resume.

  • Christine Winchester 12–2pm
    Long time community technical recruiter who likes marshmellows.
  • Jamal Drake 12–2pm
    Tech recruiter who can tell really good campfire stories.
  • Jesse Gonzales 2–4pm
    Tech recruiter who understands the value of a slip knot.
  • Josh Madrid 2–4pm
    Tech recruiter who enjoys the great outdoors from the comfort of his tent.
  • Suzie Grieco 4–6pm
    Tech recruiter with a great laugh and awesome smile.
  • Jason Hursey 4–6pm
    West coast tech recruiter with an amazing boss.

The Camp Stay At Home Challenge

Instead of the usual shennanigans, we’ve carefully assembled a few things for you to figure out. The first one is how you’re going to play- you’ll need some other campers (3–7, ideally), and you’ll need to find the camp. Some of the staff can help you with that, but you’ll need to figure out who. Once you’re there, our puzzle master has left you a map that should lead you to where you need to go. Good luck, campers, and remember: it’s not cheating to read the source code!

BSidesLV not a pool party party

Live from somewhere in the desert, join Keith Meyers and his special guests for the exact opposite of a pool party, in your living room. We guarantee that if you’re not moved to dance, you will at least be moved to party! (22:00PM PST, Stream One)

HackerWood Squares (brought to you by our friends from the 10,000 cent Hacker Pyramid)

We’re back, despite closed borders, metric, hangovers, and an ongoing penchant for pretending that french fries, cheese curds and gravy are a meal. This year is a little different- Join the Hacker Pyramid crew and our 9 invited guests for a game where our somewhat-randomly selected contestants have to figure out if they’re really that smart, or bluffing their way through things. (20:00 PST, Stream One)

DCG 201 TALK HIGHLIGHTS FOR BSIDES LAS VEGAS 2021 (PST)

This is the section where we have comb through the entire list of talks on both days and list our highlights for the talks that stand out to us. Note that this does not invalidate any talks we didn’t list, in fact, we highly recommend you take a look at the full convention schedule beforehand and make up your own talk highlight lists. These are just the talks that for us had something stand out, either by being informative, unique or bizarre. (Sometimes, all three!) (PST)

JULY 31st HIGHLIGHTS

How I hacked a bank using pen & paper

Ground1234!

Per Thorsheim

I Wish Google Could Just Not Be Evil: A Security-based Comparison of Major (& Not-so-major) Email Providers

Proving Ground

It’s no secret to say email is the core of everyone’s digital life — which means there’s only one place someone would have to go to assume or ruin someone’s life online.
Putting aside how every email provider says they “care about our user’s security”, there are a number of which that specifically use security as a selling point — but how secure are they?
This talk will compare a number of notable email providers across a variety of security-focused criteria.

Jeremy Brown, Ms. Cheryl Biswas

Revenge on the Worms! Towards Deception Against Automated Adversaries

Ground Truth

Automation and artificial intelligence (AI) are both hugely beneficial for cyber defenders. This holds true for red teams too — AI-enabled vulnerability discovery, penetration testing, and red teaming are all active applied research topics. But if we can use AI for our red teams, can our adversaries as well? In the same way we use AI for automated red teaming, we can easily imagine even low-sophistication threat actors creating stealthy, efficient, and extremely fast attacks with a simple push of a button. How should we defend against this?

We think deception is the answer: by crafting deceptions that specifically target automated decision-making algorithms, we can slow down the misuse of AI and automation by adversaries. In this talk, we’ll expand on this thesis, discussing both how the AI automated planning subfield can help malicious actors as well as how planners can be deceived. Our talk will outline a series of simulated experiments we ran showing which types of deception actions/topology modifications made our networks more challenging for an automated planner to compromise. Through this talk, we hope to increase awareness and inspire future research into the area of using deception against automated adversaries.

Andy Applebaum, Dr. Ron Alford

Gamification of Tabletop Exercises

Proving Ground

Standard tabletop exercises (TTXs) are a staple of security risk assessment and are, generally, useless. The same people read verbatim from the same IR/DR/BCP plans, half asleep, wondering how fast they can check this stupid box for their SOC 2 audit. Most of the time, neither the participants nor the facilitator want to be there, and no one comes away having learned anything except to call in sick the next time one is scheduled.

Tabletop Role Playing Games (TTRPGs), on the other hand, bring all the hackers to the yard. While the Venn diagram between gamers and hackers isn’t a perfect circle, it’s probably close. TTRPGs combine elements of simulation, teamwork, and lateral thinking, with just enough random chance to keep it interesting.

Participants will learn about the differences and similarities between TTXs and TTRPGs, why someone would want to gamify a professional exercise, and what makes a game sing.

Kelly Ohlert, Dr. Allan Friedman

You Don’t Have to Be Crazy to Work Here: An Honest Talk About Mental Health

Common Ground

Cybersecurity professionals spend most of their day focused on the health and wellbeing of the environments in their care. However, the cost of reducing risk and keeping our networks safe often comes at the price of our professionals’ mental health. Many InfoSec professionals burn out, suffer from anxiety and depression, and turn to unhealthy coping mechanisms, which further exacerbate underlying psychological and physical health issues.

This talk will alleviate the stigma around mental health and stress the importance of open and frank dialogs about this critical issue impacting our community. I will share my journey, reverse engineer the stigma of mental health in business, and look at ways to hack mental health in productive and meaningful ways.

Mr. Douglas A Brush

Revisiting the Analog Hole: Using OCR and other techniques to exfiltrate data

Proving Ground

“The Analog Hole” refers to the fact that in order for a user to work with information, it has to be converted into a human-usable form.

This talk looks at Optical Character Recognition (OCR) and other techniques which can be used to covertly extract data by taking advantage of this fact.

Samuel J Greenfeld, Lucas J Morris

Search engine deoptimization with Gootloader

Breaking Ground

The Gootkit malware family has been around more than half a decade — a mature Trojan with functionality centered around banking credential theft. In recent years, almost as much effort has gone into improvement of its delivery method as has gone into the NodeJS-based malware itself.

In the past, Sophos and other security experts have bundled the discussion of the malware itself with analysis of the delivery mechanism, but as this method has been adopted to deliver a wider range of malicious code, we assert that this mechanism deserves scrutiny (and its own name), distinct from its payload, which is why we’ve decided to call it Gootloader.

In addition to the REvil and Gootkit payloads, Gootloader has been used most recently to deliver the Kronos trojan and Cobalt Strike.

In its latest attempts to evade detection by endpoint security tools, Gootloader has moved as much of its infection infrastructure to a “fileless” methodology as possible. While it isn’t completely fileless, these techniques are effective at evading detection over a network — right up to the point where the malicious activity trips over behavioral detection rules.

Andrew Brandt, Gabor Szappanos

Static Detection of Novel Malware Using Transfer Learning with Deep Neural Networks

Breaking Ground

Nation-state adversaries are known to write custom malware to conduct cyberwarfare operations, which may go undetected simply due to the novel nature of the malware. According to the United States Congress, foreign militaries are using malware against military information networks to cause the loss of “combat effectiveness.” Industrial control system malware like Triton also has the potential to impact civilian lives. To counter this threat, we propose a method of malware detection using transfer learning with image classification neural networks to statically classify executable binaries as malicious or benign.

Our model can effectively detect malware not in the training data set, including nation-state malware. Most of our tests against nation-state malware gave us over 90% accuracy, with ordinary malware at over 93% accuracy. Our tests included malware written by APT 1, 10, 19, 21, 28, 29, 30 as well as Dark Hotel, Gorgon Group, and Winnti.

While previous research exists on this topic, most of it lacks enough detail to properly replicate the results and use it operationally. Our work aims to be the opposite, providing enough transparency and code to create operational knowledge and provide the audience with the capability to immediately employ this work in threat hunting operations.

Emily Rexer, Henry Reed

AUGUST 1st HIGHLIGHTS

Repo Jacking: How GitHub exposes over 70,000 projects to remote code injection

Breaking Ground

Does your project depend on a GitHub repository? It might be vulnerable to remote code injection. This talk will discuss ‘repo jacking’, an obscure supply chain vulnerability that allows attackers to hijack GitHub repositories and achieve remote code execution. This vulnerability has become exceedingly widespread in open-source projects and over 70,000 projects are affected, including popular projects from organizations such as Google, Facebook, Microsoft, and many more. Repo jacking can affect any language and has been found to impact small personal games, huge web frameworks, cryptocurrency wallets, and everything in between.

Come learn about this vulnerability, what causes it, and why it has gone unnoticed for so long. See how a mass analysis of all open source projects was performed to scan for repo jacking and the outcome of this analysis, how prevalent it is, and who is impacted. This talk will also discuss how, through targeted disclosure, over 40% of impacted projects were secured and how a version pinning bypass vulnerability (in both NPM and pip) further increased the impact of repo jacking. Finally, this talk will review important mitigation strategies that you can use to protect your own projects from this vulnerability and other supply chain attacks.

Mr. Indiana Moreau

Lessons Drawn From Cybersecurity In The Rise of Privacy Tech

Common Ground

There is increasing interest in privacy innovation, but the critical players (innovators, investors, and privacy domain experts) aren’t connected enough to move things forward at the pace the market needs. We need to bridge these tech-capital-expertise gaps to fuel privacy innovation. Privacy is a critical component in designing and building technology to serve people. Privacy design and engineering are prerequisites for product excellence. Privacy innovation offers market opportunities to those who are able to recognize the value of privacy, beyond compliance. For example, Inc. named a privacy tech startup as the fastest growing company in America. The privacy tech landscape is still at its nascency, but its future is brimming with possibilities. We see a world where technology is designed and engineered with privacy in mind, to serve humans and respect their privacy. We see clear value in that.

Lourdes Turrecha, Michelle Dennedy, Melanie Ensign

Securing and Trusting Third-Party Javascripts in Your Web App

Proving Ground

Third-party javascripts are ubiquitous. Product teams want third-party javascripts in their web pages for a wide range of use cases like Analytics, data validation etc.

Compromise of these third-parties means compromise of our webapps. Hence, security engineers need to ensure that these javascripts are thoroughly vetted and that proper defense in depth measures are in place. At the same time, the focus must also be on the risk of trusting these javascripts.

This talk focuses on how we handle third-party javascripts at Adobe, which is a three-fold approach:
Risks of including random third-party javascripts
Vetting these third-party javascripts
Defense in depth measures for third-party javascripts

Talk Outline:
Intro
Use cases for third-party javascripts and risk of third-party javascripts
Vetting third-party javascripts
Defense in Depth Measures for third-party javascripts
How Risk and Trust Matters

Audience Takeaways:
Key things to look at when securing third-party javascripts while focusing on risk and trust.

Krishna Chirumamilla, Gabriel Ryan

Secure your AWS accounts without breaking the bank

Proving Ground

AWS is everywhere, behind most internet infrastructure, and a fixture of any well-rounded tech resume. However, AWS offers a dizzying number of services, making it hard to know how to navigate their services to secure your accounts and users. Within these dozens of offerings, there is a selection of security services that can up your security while increasing your monthly bill only a little — or not at all.

Whether you work at a startup or a well-funded company, matching budget to security needs is always a struggle. In this session, I describe some of the free services AWS provides and some easy automation techniques that can keep your accounts safer without hitting your budget hard. I’ll address solutions to common problems like DoS, securing data at rest and transit, and implementing effective authentication and authorization. This talk will be accessible to software engineers without extensive security or AWS experience.

Nishith Shah, Dr. John Seymour

Securing and Trusting Third-Party Javascripts in Your Web App

Proving Ground

Third-party javascripts are ubiquitous. Product teams want third-party javascripts in their web pages for a wide range of use cases like Analytics, data validation etc.

Compromise of these third-parties means compromise of our webapps. Hence, security engineers need to ensure that these javascripts are thoroughly vetted and that proper defense in depth measures are in place. At the same time, the focus must also be on the risk of trusting these javascripts.

This talk focuses on how we handle third-party javascripts at Adobe, which is a three-fold approach:
Risks of including random third-party javascripts
Vetting these third-party javascripts
Defense in depth measures for third-party javascripts

Talk Outline:
Intro
Use cases for third-party javascripts and risk of third-party javascripts
Vetting third-party javascripts
Defense in Depth Measures for third-party javascripts
How Risk and Trust Matters

Audience Takeaways:
Key things to look at when securing third-party javascripts while focusing on risk and trust.

Krishna Chirumamilla, Gabriel Ryan

Stupid Job Posts Don’t Matter!

Hire Ground

I’m mostly kidding, but not really.
I have taught managers for years how to write better descriptions and candidates how to write better resumes, and I will continue to do that. I even spoke at multiple conferences over the last few years for that purpose. But the key is to have a way of getting around and through bad descriptions, because I don’t think we can ever really fix that problem completely. In other words, even though those obstacles exist and likely always will, there are ways to get through it, and that is what I will be presenting.
This presentation isn’t going to offer a solution to making employers do a better job advertising for and determining the best fits for their openings. It will however tell you how to make it through bad descriptions, less than effective interviewers and maybe it will even help them see the light!
Looking for a job is an engineering problem. Gather the requirements, do some QA, launch and keep updating!

Kirsten Renner

All your Ether are belong to us (a.k.a Hacking Ethereum-based DApps)

Breaking Ground

Blockchain technology is extremely fascinating… has captured our imaginations because of its huge potential to revolutionize industries such as logistics, food safety, music, insurance, banking, and even voting systems; however, its adoption is still very scarce. The reason is simple: blockchains are complex to use by end users.

During recent years, decentralized applications (DApps) have been emerging as candidates to change the rules of the game, mainly because of their ease of use and capability to leverage the full power of blockchains. The big question is… are DApps really secure?

This presentation will show how Ethereum-based DApps work, the technology behind them and some of their most common vulnerabilities. The ultimate goal will be to understand how to attack these applications and, especially, what to do to be protected.

Luis Quispe Gonzales

Securing the 2020 Presidential Campaign: Threats, Challenges, and a Global Pandemic!

Common Ground

Elections security is important, but it’s not about the machines — it’s about the humans who work a campaign and their adversaries.

In 2016, we saw foreign intelligence operations target US Presidential campaigns and the US election process. Leading up to 2020, organizations involved in the campaign ecosystem had to change how they did business, addressing risks posed to systems and personnel, and changing how they use and protect information systems. Why? Cyber adversaries changed everything (and so did the pandemic).

Thousands of staffers had to adapt to a fully remote campaign from our bedrooms and couches — while also fundamentally reinventing how campaigns operate and keep themselves safe.

You’ve seen countless talks about hacking voting machines — this isn’t one of them. This panel is made up of people who worked on the 2020 Democratic campaigns, and we will tell you about the campaign, what we learned, and how we’re going to apply it in the future.

Mr. Timothy Ball, Alison Goh, Krishnan Aiyer, Matt Hodges, Will Rogers

QuadBlockQuiz — Supply Chain Sandbox Edition

I Am The Cavalry

To teach supply chain risk in a fun way, a game was developed for the Supply Chain Sandbox at RSAC. QuadBlocksQuizis a reimagined take on Tetris where playful spatial negotiations are infused with real-life Trivia challenges from the world of supply chain security.

The talk will begin with why the game was developed and a recap of the 5/18/21 Sandbox event. It will cover the development of the game from the players’ perspective, the developers’ perspective, and the educators’ perspective. The talk will include live demo’s, pre-recorded demo’s (some situations just take to long to get to in real-time), and 10-minutes of live contest play with as many attendees as are willing to play.

Duncan Sparrell

Healthcare Industry Career Search Panel

Hire Ground

There are many career trajectories in infosec but rarely do we get a chance to take a deep dive into careers that combine information security and healthcare. We have invited two amazing healthcare information security professionals who will share their career paths, suggestions on getting into the industry and what to watch out for.

Kathleen Smith, Mike Murray, Suchi Pahi

--

--

DCG 201
DCG 201

Written by DCG 201

North East New Jersey DEFCON Group Chapter. Dirty Jersey Represent! We meet at Sub Culture once a month to hack on technology projects! www.defcon201.org

No responses yet