Tag Archives: Information Security

RSAC 2018 – Rachel Tobac & Joe Gray

Compromising a Fortune 500 Business without Hacking a Thing!

Rachel Tobac and Joe Gray present at RSAC2018!!

A simulated compromise of a Fortune 500 company as part of a social engineering competition will lead to discussion about how data was collected using open source intelligence (OSINT) beyond that of social media and tools. It will identify places to find data, providing insight for more valuable data sources. This will include a demo of OSINT techniques, phishing and a pretexting discussion.

Learning Objectives:
1: Learn how to defend against social engineering.
2: Understand the relative ease in collecting open source intelligence (OSINT).
3: Learn more about the tools and techniques used in social engineering.

CLICK HERE FOR THE SLIDES FROM PRESENTATION

CLICK HERE TO DOWNLOAD MP3 FILE

Tagged , , , , , , , , , , ,

PODCAST: Amazon Key & HID Attacks with MG

WiRPfsLy_400x400

Guest: MG

This episode’s guest is Bay Area based security researcher MG. He joins the podcast to share his work experimenting with various HID (Human Interface Devices) attacks using USB drives and cables. MG has also made news recently for disclosing a vulnerability in the Amazon Key smart lock technology and shares his experience developing the proof of concept and eventually sharing it with Amazon’s security team.

Check out MG’s work here!

Amazon Key Attack

HID attack hardware

All-USB-devices-on-table

USB Rubber Ducky by Hak5

USB-rubber-ducky

MG’s HID attack platform for USB Type-A connectors

USBA-connector

PCB-boardwithUSBAconnector

Smoke-emitting USB drive

Smoke-USB

Exploding USB drive

Apple USB Lightning connector (MG’s HID attack cable on left)

Apple-lightningbolt2

Apple-lightningbolt-1

MG’s HID attack platform for USB Type-C connectors

USBC-connectors

DIRECT DOWNLOAD OF PODCAST MP3

Subscribe on iTunes, GooglePlay and Stitcher!

Tagged , , , , , , , ,

BrightTALK webinar on Cloudbleed

CloudBleed-Slide01

Last week I moderated a BrightTALK webinar on the infamous “Cloudbleed” bug.

Join BrightTALK and check out this informative panel discussion I moderated titled “CloudBleed: The Good, The Bad, and The Ugly for Users, Companies and Society.” Featuring myself along with panelists Kaushik Narayan (Skyhigh Networks), Lori MacVittie (F5 Networks), Bojan Simic (HYPR Corp), and Tom Gorup (Rook Security).

Next Wed at 10 am PDT/ 1pm EDT (March 22, 2017) I will be moderating a BrightTALK webinar on the recent “Vault 7” CIA document leaks titled WikiLeaks Vault 7: Facts, Fiction & Implications with distinguished panelists Jake Kouns, (Risk Based Security), Kenesa Ahmad (WISP) and more to be announced.

Follow me on Twitter!

Tagged , , , , , , ,

RSAC 2017: Rob Graham on Mirai and IoT Botnets

UPDATED WITH SLIDES (03/15/17)

rob-graham

“Mirai and IoT Botnet Analysis” MP3 AUDIO FILE

RSAC2017-Mirai-OPENINGSLIDE

“Mirai and IoT Botnet Analysis” SLIDES – PDF FILE

At this year’s RSA security conference in San Francisco, researcher Rob Graham gave a presentation entitled “Mirai and IoT Botnet Analysis.” His talk examined the infamous “Mirai” Internet of Things botnet and shared details on how it operates. Graham also covered technical aspects of the cameras it infects and detailed his own experimentation with Mirai in the wild. He went on to discuss last year’s massive DDoS attacks on DNS provider Dyn, which involved variations of the Mirai IoT botnet.

No official AV video recording of this talk, but the audio and RSAC slides are all you need.

Enjoy!

Also, check out Rob’s blog!

-Vince

Follow me on Twitter!

Tagged , , , , , , , , , , ,