- ITSEC Newsletter
- Posts
- Security Fest 2023 - Summary
Security Fest 2023 - Summary
ITSEC Newsletter 2023-06-05
Dates: 2023-05-25 - 2023-05-26
Location: Eriksbergshallen / Gothenburg
Keynote: Red Notice - Pros And Cons
"Alethe Denis is a world-renowned security expert. A Senior Security Consultant, Alethe is on the Red Team at Bishop Fox, an offensive cybersecurity company. She co-founded both an IT MSP and VoIP phone service company while working in global market and competitive intelligence. She made the leap into cybersecurity after revisiting her childhood love of hacking through the DEF CON Social Engineering Capture the Flag competition, which she won in 2019, receiving the top honor of a DEF CON Black Badge, free entry to the conference for life. Alethe is now an industry leading social engineering expert and cybersecurity ally for companies around the globe. Follow her online at: alethedenis.com."
Architecting for security: the old ways
"It's incredibly easy to put systems online. Between EC2, Digital Ocean, Rackspace, Oracle, IBM, GCP, Hetzner and various others, anybody can spin up a free virtual machine. There's stuff like lambda and heroku which is are disembodied python interpreters you can buy access to. IOT devices phone home and become accessible. The internet is getting packed with stuff and the old ways of "put a firewall in front of it" seem to have disappeared - lots of stuff is just .. public! Applying a bit of architecture know-how can massively reduce attack surfaces, and if you take it a bit further it can seriously aggravate attackers. Let me show you how!"
OopsSec - The bad, the worst and the ugly of APT’s operations security
"Advanced Persistent Threat groups invest in developing their arsenal of exploits and malware to stay below the radar of their victims' security controls and persist on the target machines for as long as possible. We were curious if the same efforts are invested in the operation security of these campaigns. We started a journey researching active campaigns from the Middle East to the Far East including the Palestinian Authority, Turkey, and Iran, Russia, China, and North Korea. These campaigns were both state-sponsored, surveillance-targeted attacks and large-scale financially-motivated attacks. We looked at almost every technology used and every step taken throughout the attack chain: Windows (Go-lang/.Net/Delphi) and Android malware; both on Windows and Linux-based C2 servers. We found a multitude of unbelievable critical mistakes which open a unique window to understand new advanced TTPs used by attackers."
Bypassing Anti-Cheats & Hacking Competitive Games
"With the increasing popularity of games having a competitive element, cheats have become a common method for hackers to gain an advantage. These cheats could range from a sniper bullet that felt just a little too accurate to a player teleporting across the map, and chances are that you must have been outsmarted by some sort of cheat code. Some of the most common methods include Aimbot, Wallhack, SpeedHack, DropHack, etc. Game developers like Fortnite, Valorant, and Apex Legends constantly face the pressure to prevent hackers from cheating. The result? Probably spending millions of dollars on Security and Anti-cheats, but still outsmarted by hackers."
The Gothenburg Skyline Badge | Security Fest
"The amazing crew at the Security Fest conference wanted to make another fabulous badge for the 2023 year. Our previous year's badge was a fun blinky badge inspired by Gothenburg trams and a quest to Rickroll everyone. Our design ideas started from aggressive Vikings to ancient ships but eventually settled around the Gothenburg Skyline."