Perimeter
7/24/2012
11:53 AM
John H. Sawyer
John H. Sawyer
Commentary
50%
50%

Black Hat, BSides, Def Con: Defenders, Take Note

Summer security conferences include defense-related topics on top of the usual offensive fare

This is one of the most important weeks for the information security industry. Two, arguably three, of the most-attended, information-rich, and well-known security conferences in the world take place in Las Vegas: Black Hat, Def Con, and BSidesLV. I'm a fan of all three because they provide an incredible resource for both networking with others within the security industry and an opportunity to see some of the newest cutting-edge research being presented. Even better, if you see something that you really like in a presentation and want to learn more, it's not hard to meet up with one of the speakers, buy him or her a drink, and pick his or her brain.

Click here for more of Dark Reading's Black Hat articles.

Of note, I appreciate the diversity of topics at these conferences. Presentations and training being offered cover everything including penetration testing, hardware exploitation, social engineering, code review, incident response, and forensics. One thing I noticed about this year's Black Hat lineup is a higher percentage of talks that are either specifically focused on defense or have an offensive focus that includes defensive mitigations for the attacks they are demonstrating. It's an interesting shift considering the offensive nature of the conference.

Now, I understand that traditionally these conferences are specifically focused on attacks and exploitation. As a penetration tester, I think that's great. I can take back lots of awesome information and use it in my work to break into clients' networks, websites, etc. What's commonly missing from these presentations, however, is how to defend against the attacks. Or, if defense is mentioned, it's incredibly brief because it's just not as exciting to most people. The problem is that breaking things is easy. It's the defensive role of trying to keep a network secure and prevent users from doing bad (or stupid) things that is much, much harder.

Looking at the three conferences, BSidesLV has just a few defense-focused presentations, DefCon has about 10, and Black Hat has more than a dozen. I'm basing those numbers on looking at the titles and descriptions of the talks, so the numbers may actually be higher if some of the presenters are including defensive mitigation but did not mention it in the event description.

Black Hat Briefings:

  • Looking into the Eye of the Meter
  • ModSecurity as Universal Cross- platform Web Protection Tool
  • libinjection: A C library for SQLi detection and generation through lexical analysis of real world attacks
  • STIX: The Structured Threat Information eXpression
  • Owning Bad Guys {and Mafia} with Javascript Botnets
  • SexyDefense: Maximizing the Home-Field Advantage
  • File Disinfection Framework: Striking Back at Polymorphic Viruses
  • The Defense RESTs: Automation and APIs for Improving Security
  • Intrusion Detection Along the Kill Chain: Why your Detection System Sucks and What to Do About it
  • Exploit Mitigation Improvements in Windows 8
  • Catching Insider Data Theft With Stochastic Forensics
  • Find Me in Your Database: An Examination of Index Security
  • Dex Education: Practicing Safe Dex
  • Clonewise: Automated Package Clone Detection
  • Targeted Intrusion Remediation: Lessons From The Front Lines
  • Mobile Network Forensics

BSidesLV:

  • Ambush - Catching Intruders At Any Point
  • Max Level Web App Security
  • Sexy Defense

Def Con:

  • Demorpheus: Getting Rid Of Polymorphic Shellcodes In Your Network
  • DDoS Black and White "Kungfu" Revealed
  • OPFOR 4Ever
  • Network Anti-Reconnaissance: Messing with Nmap Through Smoke and Mirrors
  • Embedded Device Firmware Vulnerability Hunting Using FRAK, the Firmware Reverse Analysis Konsole
  • Tenacious Diggity: Skinny Dippin' in a Sea of Bing
  • Detecting Reflective Injection
  • No More Hooks: Detection of Code Integrity Attacks

Dark Reading is providing constant coverage of these conferences before, during, and after. Keep up with news and blogs here.

John Sawyer is a Senior Security Analyst with InGuardians, Inc. The views and opinions expressed in this blog are his own and do not represent those of his employer. He can be reached at johnhsawyer@gmail.com and found on Twitter @johnhsawyer.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, January 2015
To find and fix exploits aimed directly at your business, stop waiting for alerts and become a proactive hunter.
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7402
Published: 2014-12-17
Multiple unspecified vulnerabilities in request.c in c-icap 0.2.x allow remote attackers to cause a denial of service (crash) via a crafted ICAP request.

CVE-2014-5437
Published: 2014-12-17
Multiple cross-site request forgery (CSRF) vulnerabilities in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) enable remote management via a request to remote_management.php,...

CVE-2014-5438
Published: 2014-12-17
Cross-site scripting (XSS) vulnerability in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allows remote authenticated users to inject arbitrary web script or HTML via the computer_name parameter to connected_devices_computers_edit.php.

CVE-2014-7170
Published: 2014-12-17
Race condition in Puppet Server 0.2.0 allows local users to obtain sensitive information by accessing it in between package installation or upgrade and the start of the service.

CVE-2014-7285
Published: 2014-12-17
The management console on the Symantec Web Gateway (SWG) appliance before 5.2.2 allows remote authenticated users to execute arbitrary OS commands by injecting command strings into unspecified PHP scripts.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.