Loading…
Attending this event?
Streaming: https://mssvideo.vcu.edu/RVAsec
Technical [clear filter]
Tuesday, June 4
 

11:00am EDT

That Shouldn't Have Worked - Payload Development
The game of bypassing defenses and detection continues to be a cat and mouse game. Attackers often find clever ways to use common tools and techniques to execute their code and the defenders continue to create detections and mitigations for these methods. As a red teamer, it is becoming increasingly difficult to get around these defenses and emulate those attackers. In this talk, I will cover some of the methods we use during engagements to thread the needle and bypass those defenses.

Speakers
avatar for Corey Overstreet

Corey Overstreet

Senior Security Consultant, Red Siege
Corey has been engaged with Fortune 500 organizations across a variety of industries, including financial services, government services, and healthcare and is widely recognized for his in-depth OSINT talks and workshops. Additionally, he is a Black Hat trainer and has spoken at conferences... Read More →


Tuesday June 4, 2024 11:00am - 11:50am EDT
Ballroom C/D

1:00pm EDT

Some Assembly Required: Weaponizing Chrome CVE-2023-2033 for RCE in Electron
In this presentation, the development process of a remote code execution (RCE) exploit for CVE-2023-2033 is discussed. CVE-2023-2033 is an N-day type confusion vulnerability that affects Google Chrome for Windows, Mac, and Linux with which an attacker can exploit Chrome V8 engine to cause heap corruption via a crafted HTML page and gain RCE. Prior to this presentation, a public RCE exploit for this vulnerability did not exist. This exploit is based on publicly available proof of concept code that uses this vulnerability to implement v8 heap read/write/addrof primitives. This presentation focuses on weaponizing these primitives to achieve remote code execution consistently on an unsandboxed renderer process of an Electron version running a vulnerable version of Chrome. Methods to hijack the render process instruction pointer and to write and execute specially encoded chunks of shellcode using these primitives are discussed.

Speakers
avatar for Nick Copi

Nick Copi

AppSec Engineer, CarMax
Nick Copi, an application security engineer at CarMax, seamlessly balances his professional role with a fervent pursuit of security research. From architecting full-stack web applications to spearheading innovative security initiatives at CarMax, Nick's diverse background enriches... Read More →


Tuesday June 4, 2024 1:00pm - 1:50pm EDT
Ballroom A/B

2:00pm EDT

Consumer Routers Still Suck
You know that little box in the corner of your house doing all the heavy lifting required to connect you (and, now that everyone is working from home, your company) with the rest of the world? Yeah, that one. It’s no secret that these things are oftentimes security nightmares for consumers, but have ISPs or the various networking vendors improved things over the years, or are they still just as terrible as we all think they are?

Over the last few years, we’ve done a deep dive into many of these devices to see what makes them tick and evaluate the risks posed to consumers. In this talk, we’ll provide a rapid fire assessment of a handful of these devices, showcase the commonalities between flaws discovered, shed some light on behind-the-scenes supply chain issues plaguing this industry, and discuss where we see things going from here.

Speakers
JS

Jimi Sebree

Security Researcher, Tenable
Jimi and Evan are security researchers at Tenable. Jimi got his start as a software engineer before moving into the security space. Evan's introduction in infosec from the Canadian Forces Reserves and he's been hooked ever since.


Tuesday June 4, 2024 2:00pm - 2:50pm EDT
1st Floor, Magnolia Room

3:00pm EDT

Hacking Exchange From The Outside In
Microsoft Exchange 2019 uses the Oracle Outside-In libraries to parse specific file types when attached to emails. This talk covers the process of discovering memory corruption vulnerabilities within the technology using AFL and Jackalope and the results of the fuzzing process.

Speakers
avatar for Ali Ahmad

Ali Ahmad

Senior Research Consultant, Atredis Partners
With over 5 years of experience in the information security industry, Ali has performed a wide variety of security assessments including network penetration testing, application security assessments, full-scope red team engagements, adversarial simulation, and physical penetration... Read More →


Tuesday June 4, 2024 3:00pm - 3:50pm EDT
Ballroom A/B

4:00pm EDT

Orion's Quest: Navigating the Cyber Wilderness - Tales of Modern Penetration Testing
Focusing on real stories from the trenches, Orion's Quest walks through a series of modern application and API attacks Kevin and his team have pulled off.  The talk describes how we found and exploited the flaws and provides information so you can test yourself.

Speakers
avatar for Kevin Johnson

Kevin Johnson

CEO, Secure Ideas
Kevin Johnson is the Chief Executive Officer of Secure Ideas. Kevin has a long history in the IT field including system administration, network architecture and application development. He has been involved in building incident response and forensic teams, architecting security solutions... Read More →


Tuesday June 4, 2024 4:00pm - 4:50pm EDT
Ballroom A/B
 
Wednesday, June 5
 

10:30am EDT

Patch Perfect: Harmonizing with LLMs to Find Security Vulns
Are LLMs a revolutionary leap forward for security research—or just spicy auto-complete?

The truth lies somewhere in between. This talk cuts through the hype and offers a practical perspective that’s grounded in real-world analysis of critical bugs in widely used products. We’ll walk through our process of harnessing large language models (LLMs) for patch-diffing in the context of N-day vulnerability research. Given a vague security advisory and some complicated code diffs, can an LLM get you closer to finding the right spot in the code to dig deeper? Which models work best for this task, and why? Let’s ditch the theory and get our hands dirty with iterative experimentation. Whether you’re a seasoned pentester, applied researcher, or budding practitioner, you'll take away tactical lessons for incorporating AI into your security toolkit.

Speakers
avatar for Caleb Gross

Caleb Gross

Director of Capability Development, Bishop Fox
Caleb Gross is the Director of Capability Development at Bishop Fox, where he leads a team of offensive security professionals specializing in attack surface research and vulnerability intelligence. Prior to coming to Bishop Fox, he served as an exploitation operator in the US Department... Read More →


Wednesday June 5, 2024 10:30am - 11:20am EDT
Ballroom D

11:30am EDT

Unlocking Generative AI: Balancing Innovation with Security
Join us for 'Unlocking Generative AI: Balancing Innovation with Security' as we navigate the complex landscape of generative AI in corporate environments. From understanding the fundamentals to exploring security threats like data poisoning and model theft, discover how large enterprises can safeguard sensitive data and AI models. Learn robust mitigation strategies to tackle these challenges head-on, ensuring a secure future for AI innovation. Don't miss this opportunity to delve into the promising yet challenging world of generative AI security.

Speakers
avatar for Jason Ross

Jason Ross

Security Engineer, Salesforce
Jason Ross is a passionate cybersecurity expert with a diverse skill set, currently focused on building tools and processes to test the security of generative AI models & applications that use them. Jason's past work experiences include penetration testing, cloud security, and OSINT.Jason... Read More →


Wednesday June 5, 2024 11:30am - 12:20pm EDT
Ballroom A/B

1:00pm EDT

Reverse Engineering for Dummies: The “what if?” user
When developing a product, software engineers often discuss the “what if?” user. What if a user builds their own frontend client? What if a user finds that embedded API key? What if a user notices that endpoint doesn’t have authorization? This talk has three real-life examples from the speaker’s perspective as the “what if?” user. Each example will delve into the motivation, the security flaws reverse engineered, and how to improve the security of each product. This talk will cover reverse engineering assets from an Android game, a waitlist to buy exercise equipment, and a Publish Subscribe system for an auction house. This talk aims to generate interest in identifying software design flaws and reverse engineering them, as well as helping teach about common security issues and practical methods of fixing them.

Speakers
avatar for Micah Parks

Micah Parks

Senior Software Engineer
Micah Parks started his professional career about six years ago in the National Security Agency. After moving to the private sector, Micah has continued to work as a security minded software engineer. He has created and maintains multiple open source projects, with the most popular... Read More →


Wednesday June 5, 2024 1:00pm - 1:50pm EDT
Ballroom A/B

2:00pm EDT

Building Illusions in the Cloud: Deception Engineering
Deception engineering is a defence-in-depth strategy which many organisations overlook. Post achieving certain level of maturity over their infrastructure security processes, deception engineering is a great security project to enhance monitoring via high fidelity alerts and targeted knowledge of an attack in terms of where the attack's epicentre exists, what actions are the attackers taking, etc.

This session aims to share the overview of what entails when building a deception engineering charter, how to plan for deploying honeypots and honeytokens, and finally how to handle a potential incident that was detected via a honeypot.

Speakers
avatar for Ayush Priya

Ayush Priya

Lead Data & Cloud Security Engineer, CRED
Ayush is a Cyber Security Engineer specialising in Cloud and Data Security, and DevSecOps practices. He loves to develop automation for security controls and processes. He has delivered talks at various conferences and security communities like GrayHat'20, and Cyber Security Global... Read More →
avatar for Saksham Tushar

Saksham Tushar

Head of Security Operations, CRED
Saksham Tushar specializes in various aspects of Threats, including intelligence, detection, analytics, and hunting. He has experience leading teams and collaborating with organizations such as Informatica, Microsoft, and IBM to establish multiple global Security Operations Centers... Read More →


Wednesday June 5, 2024 2:00pm - 2:50pm EDT
Ballroom A/B

3:10pm EDT

My Way is Not Very Sportsman-Like: Shaping Adversary Behavior to Strengthen Defenses
We’re taking a fresh look at how to beat cyber attackers at their own games! It’s all about using our defender advantages wisely, controlling, constraining, and shaping the adversary’s moves before the attack even begins. We're ditching the old "Defender’s Dilemma" mindset and showing how smart defense strategies can make a huge difference. Let’s shift our thinking, use our advantages better, and boost our defense without breaking the bank.

Speakers
avatar for David J. Bianco

David J. Bianco

Student, N/A
David is a Staff Security Strategist on Splunk’s SURGe research team. He is also a SANS Certified Instructor, where he teaches network forensics. David has more than 20 years of experience in the information security field, primarily in incident detection and response, threat hunting... Read More →


Wednesday June 5, 2024 3:10pm - 4:00pm EDT
Ballroom
 
Filter sessions
Apply filters to sessions.