Perimeter
7/24/2012
11:53 AM
John H. Sawyer
John H. Sawyer
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Black Hat, BSides, Def Con: Defenders, Take Note

Summer security conferences include defense-related topics on top of the usual offensive fare

This is one of the most important weeks for the information security industry. Two, arguably three, of the most-attended, information-rich, and well-known security conferences in the world take place in Las Vegas: Black Hat, Def Con, and BSidesLV. I'm a fan of all three because they provide an incredible resource for both networking with others within the security industry and an opportunity to see some of the newest cutting-edge research being presented. Even better, if you see something that you really like in a presentation and want to learn more, it's not hard to meet up with one of the speakers, buy him or her a drink, and pick his or her brain.

Click here for more of Dark Reading's Black Hat articles.

Of note, I appreciate the diversity of topics at these conferences. Presentations and training being offered cover everything including penetration testing, hardware exploitation, social engineering, code review, incident response, and forensics. One thing I noticed about this year's Black Hat lineup is a higher percentage of talks that are either specifically focused on defense or have an offensive focus that includes defensive mitigations for the attacks they are demonstrating. It's an interesting shift considering the offensive nature of the conference.

Now, I understand that traditionally these conferences are specifically focused on attacks and exploitation. As a penetration tester, I think that's great. I can take back lots of awesome information and use it in my work to break into clients' networks, websites, etc. What's commonly missing from these presentations, however, is how to defend against the attacks. Or, if defense is mentioned, it's incredibly brief because it's just not as exciting to most people. The problem is that breaking things is easy. It's the defensive role of trying to keep a network secure and prevent users from doing bad (or stupid) things that is much, much harder.

Looking at the three conferences, BSidesLV has just a few defense-focused presentations, DefCon has about 10, and Black Hat has more than a dozen. I'm basing those numbers on looking at the titles and descriptions of the talks, so the numbers may actually be higher if some of the presenters are including defensive mitigation but did not mention it in the event description.

Black Hat Briefings:

  • Looking into the Eye of the Meter
  • ModSecurity as Universal Cross- platform Web Protection Tool
  • libinjection: A C library for SQLi detection and generation through lexical analysis of real world attacks
  • STIX: The Structured Threat Information eXpression
  • Owning Bad Guys {and Mafia} with Javascript Botnets
  • SexyDefense: Maximizing the Home-Field Advantage
  • File Disinfection Framework: Striking Back at Polymorphic Viruses
  • The Defense RESTs: Automation and APIs for Improving Security
  • Intrusion Detection Along the Kill Chain: Why your Detection System Sucks and What to Do About it
  • Exploit Mitigation Improvements in Windows 8
  • Catching Insider Data Theft With Stochastic Forensics
  • Find Me in Your Database: An Examination of Index Security
  • Dex Education: Practicing Safe Dex
  • Clonewise: Automated Package Clone Detection
  • Targeted Intrusion Remediation: Lessons From The Front Lines
  • Mobile Network Forensics

BSidesLV:

  • Ambush - Catching Intruders At Any Point
  • Max Level Web App Security
  • Sexy Defense

Def Con:

  • Demorpheus: Getting Rid Of Polymorphic Shellcodes In Your Network
  • DDoS Black and White "Kungfu" Revealed
  • OPFOR 4Ever
  • Network Anti-Reconnaissance: Messing with Nmap Through Smoke and Mirrors
  • Embedded Device Firmware Vulnerability Hunting Using FRAK, the Firmware Reverse Analysis Konsole
  • Tenacious Diggity: Skinny Dippin' in a Sea of Bing
  • Detecting Reflective Injection
  • No More Hooks: Detection of Code Integrity Attacks

Dark Reading is providing constant coverage of these conferences before, during, and after. Keep up with news and blogs here.

John Sawyer is a Senior Security Analyst with InGuardians, Inc. The views and opinions expressed in this blog are his own and do not represent those of his employer. He can be reached at johnhsawyer@gmail.com and found on Twitter @johnhsawyer.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7407
Published: 2014-10-22
Cross-site request forgery (CSRF) vulnerability in the MRBS module for Drupal allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.

CVE-2014-3675
Published: 2014-10-22
Shim allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted DHCPv6 packet.

CVE-2014-3676
Published: 2014-10-22
Heap-based buffer overflow in Shim allows remote attackers to execute arbitrary code via a crafted IPv6 address, related to the "tftp:// DHCPv6 boot option."

CVE-2014-3677
Published: 2014-10-22
Unspecified vulnerability in Shim might allow attackers to execute arbitrary code via a crafted MOK list, which triggers memory corruption.

CVE-2014-4448
Published: 2014-10-22
House Arrest in Apple iOS before 8.1 relies on the hardware UID for its encryption key, which makes it easier for physically proximate attackers to obtain sensitive information from a Documents directory by obtaining this UID.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.