Perimeter
7/24/2012
11:53 AM
John H. Sawyer
John H. Sawyer
Commentary
50%
50%

Black Hat, BSides, Def Con: Defenders, Take Note

Summer security conferences include defense-related topics on top of the usual offensive fare

This is one of the most important weeks for the information security industry. Two, arguably three, of the most-attended, information-rich, and well-known security conferences in the world take place in Las Vegas: Black Hat, Def Con, and BSidesLV. I'm a fan of all three because they provide an incredible resource for both networking with others within the security industry and an opportunity to see some of the newest cutting-edge research being presented. Even better, if you see something that you really like in a presentation and want to learn more, it's not hard to meet up with one of the speakers, buy him or her a drink, and pick his or her brain.

Click here for more of Dark Reading's Black Hat articles.

Of note, I appreciate the diversity of topics at these conferences. Presentations and training being offered cover everything including penetration testing, hardware exploitation, social engineering, code review, incident response, and forensics. One thing I noticed about this year's Black Hat lineup is a higher percentage of talks that are either specifically focused on defense or have an offensive focus that includes defensive mitigations for the attacks they are demonstrating. It's an interesting shift considering the offensive nature of the conference.

Now, I understand that traditionally these conferences are specifically focused on attacks and exploitation. As a penetration tester, I think that's great. I can take back lots of awesome information and use it in my work to break into clients' networks, websites, etc. What's commonly missing from these presentations, however, is how to defend against the attacks. Or, if defense is mentioned, it's incredibly brief because it's just not as exciting to most people. The problem is that breaking things is easy. It's the defensive role of trying to keep a network secure and prevent users from doing bad (or stupid) things that is much, much harder.

Looking at the three conferences, BSidesLV has just a few defense-focused presentations, DefCon has about 10, and Black Hat has more than a dozen. I'm basing those numbers on looking at the titles and descriptions of the talks, so the numbers may actually be higher if some of the presenters are including defensive mitigation but did not mention it in the event description.

Black Hat Briefings:

  • Looking into the Eye of the Meter
  • ModSecurity as Universal Cross- platform Web Protection Tool
  • libinjection: A C library for SQLi detection and generation through lexical analysis of real world attacks
  • STIX: The Structured Threat Information eXpression
  • Owning Bad Guys {and Mafia} with Javascript Botnets
  • SexyDefense: Maximizing the Home-Field Advantage
  • File Disinfection Framework: Striking Back at Polymorphic Viruses
  • The Defense RESTs: Automation and APIs for Improving Security
  • Intrusion Detection Along the Kill Chain: Why your Detection System Sucks and What to Do About it
  • Exploit Mitigation Improvements in Windows 8
  • Catching Insider Data Theft With Stochastic Forensics
  • Find Me in Your Database: An Examination of Index Security
  • Dex Education: Practicing Safe Dex
  • Clonewise: Automated Package Clone Detection
  • Targeted Intrusion Remediation: Lessons From The Front Lines
  • Mobile Network Forensics

BSidesLV:

  • Ambush - Catching Intruders At Any Point
  • Max Level Web App Security
  • Sexy Defense

Def Con:

  • Demorpheus: Getting Rid Of Polymorphic Shellcodes In Your Network
  • DDoS Black and White "Kungfu" Revealed
  • OPFOR 4Ever
  • Network Anti-Reconnaissance: Messing with Nmap Through Smoke and Mirrors
  • Embedded Device Firmware Vulnerability Hunting Using FRAK, the Firmware Reverse Analysis Konsole
  • Tenacious Diggity: Skinny Dippin' in a Sea of Bing
  • Detecting Reflective Injection
  • No More Hooks: Detection of Code Integrity Attacks

Dark Reading is providing constant coverage of these conferences before, during, and after. Keep up with news and blogs here.

John Sawyer is a Senior Security Analyst with InGuardians, Inc. The views and opinions expressed in this blog are his own and do not represent those of his employer. He can be reached at johnhsawyer@gmail.com and found on Twitter @johnhsawyer.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7421
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a module name in the salg_name field, a different vulnerability than CVE-2014-9644.

CVE-2014-8160
Published: 2015-03-02
net/netfilter/nf_conntrack_proto_generic.c in the Linux kernel before 3.18 generates incorrect conntrack entries during handling of certain iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols, which allows remote attackers to bypass intended access restrictions via packets with disall...

CVE-2014-9644
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a parenthesized module template expression in the salg_name field, as demonstrated by the vfat(aes) expression, a different vulnerability than CVE-201...

CVE-2015-0239
Published: 2015-03-02
The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel before 3.18.5, when the guest OS lacks SYSENTER MSR initialization, allows guest OS users to gain guest OS privileges or cause a denial of service (guest OS crash) by triggering use of a 16-bit code segment for emulation of a SYS...

CVE-2014-8921
Published: 2015-03-01
The IBM Notes Traveler Companion application 1.0 and 1.1 before 201411010515 for Window Phone, as distributed in IBM Notes Traveler 9.0.1, does not properly restrict the number of executions of the automatic configuration option, which makes it easier for remote attackers to capture credentials by c...

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.