Bot Shops and Info Stealers – Exploring the Dark Web’s Newest Frontier

Carding is one of the earliest forms of cybercrime. Since the 1980s, cybercriminals have developed various fraud tactics to steal and monetize credit card information. To prevent these types of attacks, financial institutions have developed anti-fraud measures to detect and prevent fraudulent transactions. These security precautions include checking various parameters like IP address, operating system, […]

Read more

Software Composition Analysis 101: Knowing What’s Inside Your Apps

The term Software Composition Analysis (SCA) is relatively new to the security world. However, similar approaches have been used since the early 2000s to indicate security verifications on open-source components. SCA has become an evolution of that. It is the process of identifying and listing all the components and versions present in the code and […]

Read more

An Anatomy of a DevOps Tool Chain Attack

Businesses are building their digital transformation strategies around in-house development and embracing the DevOps philosophy and associated tooling. However, DevOps tooling is commonly insecure by default, misconfigured and rely on the open-source community to keep things up to date and secure. While cyber security folks are catching up with how to secure the Cloud and […]

Read more

Mobile AntiVirus Inside

This talk will look at antivirus apps for mobile devices. It builds on previous research called “Mobile Antivirus Apps Exposed” and goes more in depth, diving deeper into how virus and malware can still exist on a mobile device even when an antivirus application has been installed. The earlier research looked at some of the […]

Read more

Broken Brokers in Boxes: Fuzzing Breaks Everything, Even Erlang

Behind the scenes of a trio of recently disclosed vulnerabilities are two innovations. First, putting fuzzing targets in containers makes memory exhaustion much easier to observe. Second, widening our definition of failure makes it possible to locate vulnerabilities even in “safe” environments like Erlang. This presentation begins with a brief review of fuzzing, focusing on […]

Read more

Adventures in Underland: What Your System Stores on the Disk Without Telling You

Even though you are the only person using a computer, you are not the only one writing to your disk drive! Surprisingly, your disk drive contains a lot of juicy information that can reveal a lot of secrets and history about what you did in the past. There are also places where data can be […]

Read more

Attacker Techniques: Data Exfiltration

Data exfiltration, or data theft, is a common event that occurs during a breach. This talk will go into detail on specific tools and techniques that attackers have used to exfiltrate data from victim organizations and the ways that we can identify evidence of data access, data staging or data theft. By understanding how attackers […]

Read more

Drinking Coffee, Unicorns & Demystifying Zero Trust

So exactly what is zero trust? Buzzword, unicorn technology or a framework with meat on the bone? Well, yes on two counts. Zero trust is the realization that everything is on fire. In this talk I will endeavor to strip the idea of a zero trust program back to the bare metal. We will have […]

Read more

Compliant Yet Vulnerable: Critical Risks of Measuring Instruments in Production Line

In this talk, we are going to review the LAN eXtensions for Instrumentation (LXI), a common protocol among testing and measuring devices. Most legacy wired protocols function on the assumption that they are interconnected in a closed, trusted, secure network. However, once connected to the internet this assumption is no longer true. LXI is one […]

Read more

PKI Well Revised: Common Mistakes Which Lead to Huge Compromise of Identity

All technologies and systems currently use cryptography and most use certificates at some point. Since their boom, internal PKI systems have not changed a lot nor have the problems that we observe during almost all pentests. It’s time to revise your knowledge about one of the cornerstones of enterprise security and learn a few tricks […]

Read more

An Introduction to Automotive Security in 2020

As cars continue to become more connected and autonomous, the security of these systems grows in importance. We’re now a decade away from the first public research on automotive security, and since then the challenges of securing these vehicles has increased due to new features. connectivity, and automation. In this talk, we’ll provide an introduction […]

Read more

The Great Hotel Hack: Adventures in Attacking the Hospitality Industry

Ever wondered if your presence has been exposed to an unknown entity even when you are promised full security and discretion at a hotel? The hospitality industry is a target nowadays for cyber threats. Hotels present many opportunities for hackers and other cybercriminals to target them resulting in data breaches accessing not only credit card […]

Read more

Active Directory Database Security

How are passwords stored in Microsoft’s Active Directory and how can they be audited? What could an adversary do if they gained access to either a physical or a virtual hard drive of a domain controller? In what ways could one directly modify an Active Directory database file and how can such unauthorized changes be […]

Read more

Ransomware Attacks: Do’s & Don’ts

Ransomware attacks are prevalent. The actions taken by a company immediately after a ransomware attack can have major implications on their ability to restore operations. This talk will clearly explain which actions should be taken, and which actions might unintentionally cause an organization much more trouble. This talk will go through a series of Do’s […]

Read more

How to Build an Insecure System out of Perfectly Good Cryptography

Cryptographers focus on provably secure cryptographic primitives. Standards bodies focus on syntax of messages. But there are many system issues that get ignored, leading to interesting security problems. Examples include trust models for PKI, misuse of web cookies, naming issues, and placing unreasonable demands on users. This session provides lessons on and mechanisms for avoiding […]

Read more

The CIS Critical Controls for Free – Defend all the Things!

The CIS Critical Controls are recognized as a good start in setting up a defensible infrastructure. They are platform / OS agnostic, aren’t driven by vendor agendas, and are very much community and volunteer driven. In this talk, we’ll discuss a typical organization, one that we’d see in many security engagements. We’ll discuss the various […]

Read more

A Few Things Right: Insights from Live and Simulated Incident Response Failures

While we continue to support the concepts of compliance, defense, governance, and prevention, it’s time to shift our focus beyond those measures with more emphasis on strategic response to incidents. This talk offers real stories of failure and practical, quick-win lessons on how to be prepared to respond quickly, accurately, and confidently when incidents occur. […]

Read more

OAuth – Everything You Wanted to Know but Not Really!

OAuth is a popular authorization schema used by many iOS and Android apps to delegate user authentication and authorization to a known third-party entity such as Google, Facebook or LinkedIn. This includes apps that enterprises develop or use to connect to G Suite or cloud providers such as BOX and Google Firebase. When users grant […]

Read more

Serverless Security Top 10 Risks

When adopting serverless technology, we eliminate the need to develop a server to manage our application and by doing so, we also pass some of the security threats to the infrastructure provider. However, serverless functions, even without provisioning or managing servers, still execute code. If this code is written in an insecure manner, it can […]

Read more

Surviving a Ransomware Attack – Lessons from the Field

Many have succumbed to the various forms on ransom-based malware. Whether it is Cryptolocker, Wannacry, Crysis or the many other forms on ransomware, numerous organizations assume they are not at risk and end up having to respond to a ransomware attack without proper preparation. This presentation will include firsthand case studies and lessons learned during […]

Read more

It’s Never DNS…. It Was DNS: How Adversaries Are Abusing Network Blind Spots

While DNS is one of the most commonly used network protocols in most corporate networks, many organizations don’t give it the same level of scrutiny as other network protocols present in their environments. Attackers have recognized this and have begun increasingly abusing DNS to establish command and control channels, exfiltrate sensitive information and bypass many […]

Read more

A Peep into the Iron Triangle: IoT Purchasing in a ‘Me First’ Society

With a plethora of IoT devices on the market, and consumer devices being used in the enterprise, it becomes ever trickier to decide on the right strategy for choosing. Product development lives and dies by the phrase ‘Fast, Good, Cheap – Pick Two’. Today, as we push the bleeding edge and strive for instant improvements […]

Read more

Threat Hunting: From Platitudes to Practical Application

Since its inception, the security industry has been inundated with trendy defense techniques, topics, terms, and products that once implemented will solve all of our security woes. For the last several years one of those terms, threat hunting, has become the darling of defenders and vendors worldwide. But just what is threat hunting? Is it […]

Read more

PCI for Pen Testers, Now with 100% More Cloud!

The Payment Card Industry Data Security Standard has a bad rap with the security community and for good reason. We’re doing it wrong. Penetration Testers in particular can play a key role in the effectiveness of PCI, but most have never read the Standard and even fewer really understand it. In this talk we’ll cover […]

Read more

Make Your Own Cloud Security Monitoring Solution

Established methodologies for monitoring cloud-based environments are less than ideal. They come with significant downsides, including the ability for attackers and mischievous users to avoid detection and bypass security controls. I would like to explore how we can use existing technologies like log management systems, SIEMs and the auditing features that cloud platforms already provide […]

Read more

25 Techniques to Gather Threat Intel and Track Actors

In recent years, we have delivered many talks detailing threat actors, their operations, and their tools. How did we conduct such research and gather such intel? In this talk, we share 25 techniques for gathering threat intel and tracking actors (for example: crimeware (undisclosed) vulnerabilities, C&C misconfig, and underground marketplaces). We explain our use of […]

Read more

Pragmatic Cloud Security: The Future is Now

Cloud is a new frontier that requires new architectures, higher velocity processes and crisper business-level metrics—none which are really strengths of security programs and practitioners. Given that everything cloud is automated and API-enabled, security teams now have a big opportunity to build and embed security into the cloud technology stack. From continuous guardrails to automated workflows and […]

Read more

Building Bespoke Threat Intelligence Enrichment Platforms

The aggregation, normalization, enrichment, and contextualization of threat data and intelligence en masse necessitates a robust mix of innovation, automation, and flexibility. The Threat Analyst Workbench should provide mechanisms for extracting data from internal and external sources and building catalogues of intelligence. It should facilitate the analyst to characterize threats, identify outcomes, develop courses of […]

Read more

Barbarians At The Gate(way): An Examination Of The Attacker’s Tool Box

Attackers are always trying their best to breach your network to steal the secret sauce hidden inside. This session will delve into the attacker’s tool set and focus on the types of attacks that are being leveraged against companies today. I will examine tools, case studies and my own war stories.

Read more

Breach Happens: Effectively Responding to a Data Breach

Data breaches are the new reality, with the severity and cost of reported breaches escalating constantly. How an organization responds, and how prepared they are in the event of a breach can mean the difference between swift recovery and extended business interruption. This talk will cover: Pre-Breach planning and readiness Incident Response during a breach […]

Read more

After the Incident: DIY Forensic Collection

Description: When it comes to a post incident self-collection of digital data such as: employee dismissal, data exfiltration, inappropriate behavior/computer usage, or security breach, there is potential for litigation. Whatever the situation, IT personnel should utilize forensic best practices to assure that the information is accurate, admissible, and that the data and original sources are […]

Read more

Frugal Web Application Testing – Can in-house penetration testing achieve industry standard results while saving you money?

We live in a time where web applications play crucial roles in our society. To deploy a web application into production without properly securing the code and conducting a penetration test to identify the vulnerabilities for remediation, is to welcome an adversary to negatively impact business function, bypass access controls and steal data. While third party companies offer […]

Read more

Common Attacks Against Active Directory and How to Protect your Organization Against Them

This is not new research, and is really just a demonstration and summary of research done by Sean Metcalf, Rob Fuller, Tim Medin, Tal Be’ery, Benjamin Delpy and others (and they will be credited). It’s all too common that I see people who do not have a good understanding of common attacks against Active Directory […]

Read more

Top SIEM Use Cases You Should Implement Today

Developing and maintaining an effective SIEM often takes a small army, and can be quite vexatious. In this talk, the audience will be presented with a compilation of the best and most effective SIEM use cases. Gone are the days of noisy, false positive prone alerts – this talk is focused on high accuracy use cases […]

Read more

Building Your Own Open-source Android Penetration Testing Platform

Android has had a major growth spurt over the last few years and as a result the attack surface is expanding. Many tools for remotely controlling smartphones and obtaining the sensitive information that reside on them have been developed. At the same time, the penetration testing community hasn’t developed an established open source platform for […]

Read more

Can massive data harvesting drive down the time to breach detection?

With the time to breach detection remaining at 100-200 days and the 100’s of millions of dollars that will be lost to ransomware this year, it is safe to say that modern, relentless attackers have revealed a fundamental flaw in the traditional layered defense model. Any individual layer, when it receives updated security intelligence, does […]

Read more

Lighting up the Canadian Darknet Financially

Most are familiar with the term Darknet. Many have ventured a few times out of curiosity. For us, Darknet is an untapped source of Threat Intelligence and in some cases amusement. The news you see online about things being sold on the Darknet generally focuses on the United States, Russians, credit cards and drugs. While those are […]

Read more

The Power of DNS: Gaining Security Insight Through DNS Analytics

DNS is a critical component to all technology running on an enterprise network. Whether it is IT infrastructure, a corporate server, a desktop, a laptop, a POS system, external devices connected to a guest network or even unmanaged devices, such as smart phones or any other connected “thing,” they all use DNS to communicate internally and […]

Read more

The Security Problems of an Eleven Year Old and How To Solve Them

This presentation explains the problems a child can encounter in the digital world. It covers subjects including siblings gaining control of your devices and online accounts, outside attackers doing those same two things, and your parents restricting what you can access on the internet. Kids face a unique set of problems that have not yet […]

Read more

IPv6 for the InfoSec Pro on the Go

The first IPv6 RFC was written in December 1995. Slowly and steadily it has been creeping into our lives in the form of “out of the box” configurations, partial protocol implementations, and semi-supported devices. This “on by default” technology is expected to run in parallel with IPv4 in the short term and completely replace it […]

Read more

Expanding Your Toolkit the DIY Way

A year of phishing and pen testing has resulted in two new tools. One for the creation of phishing emails and another for automating common OSINT and pen testing tasks. Each tool will be available on GitHub, free and open source. This presentation will walk through these tools and how they can help you. However, […]

Read more

All roads lead to domain admin, a part of a presentation series: From breach to C.D.E. Part I

The focus of this talk is to give an idea of how skilled attacker’s methods are different from the traditional exploits used in order to take control of networks. The idea is to show both old school and new school methods used by attackers and red teams that go from initial breach to domain admin, […]

Read more

Building an Effective Vulnerability & Remediation Management Program

Vulnerability scanning is like flossing, some do it regularly, some only when they have an issue or having their annual checkup, and some not at all. The challenge is that like bacteria the bad guys don’t sit back and wait for you to get around to it, and like teeth your IT systems are never […]

Read more

Security for non-Unicorns

Security is becoming quite the thing nowadays, everyone wants to have some. The mantra that things should be built with security in mind and can’t be plastered on later is a very important one, whether you are established or if you’re based in Silicon Valley and are about to write “the new hotness”. However, what […]

Read more

Ground Zero Financial Services: Targeted Attacks from the Darknet

This will be an advanced level discussion covering attacks sourced from the Darknet that target the global financial services industry. We will detail what the Darknet is, how it operates, why it’s so elusive and why it’s a breeding ground for malicious activity. More specifically, we will focus on new and emerging threats stemming from […]

Read more

Peeling The Layers Of Vawtrak

Vawtrak, also called NeverQuest, is a banking malware that targets banks and other financial institutions all over the world. It is a sophisticated malware that challenges the likes of Zeus and other malevolent trojans. Vawtrak has been seen to bypass 2FA, captured video and screenshots, and also form part of a big botnet infrastructure. Vawtrak is a […]

Read more

Preventing Home Automation Security Disasters

Increasingly, our lives are becoming entangled with gadgets that require more than simple installation, they require WiFi and an IP address. As we move from upholstered caves to house-shaped machines that automagically know when to turn lights on or off, raise or lower the temperature, unlock the front door upon our approach – we might […]

Read more

Run Faster, Continuously Harden – Embracing DevOps to Secure All The Things

Infrastructure and application deployments are easy, but as security professionals we have to be conscious of the security concerns. Enter DevOps: pro-actively secure, reduce the attack surface, and automate changes at scale. Through a security focussed lens, we look at how embracing DevOps can reduce information security leakages for application and infrastructure deployments. In this […]

Read more

The Internet of Bad Things and Securing the Software Defined Data Center

This last minute session has no available abstract.

Read more

Agile Incident Management – Bringing the “Win” Back to Data and Privacy Breach Responses

Presently, managers and technical staff rely on a traditional reactive incident response process that starts when a security breach is identified – it allows the attacker to “seize the initiative”. DigitalDefence will present the Agile Incident Management (AIM) methodology, which stresses proactive planning in combination with a rapid and effective response to an attack. Using Canadian-specific […]

Read more
Subscribe to the Sector Blog
Enter your contact information below to have future blog posts delivered directly to your inbox!