Loading…
or to bookmark your favorites and sync them to your phone or calendar.
arrow_back View All Dates
Friday, February 7
 

6:30am MST

Run with Black Hills Information Security (BHIS)
Friday February 7, 2025 6:30am - 7:30am MST
Speakers
Friday February 7, 2025 6:30am - 7:30am MST
Meet at Entrance of Hotel

7:30am MST

Conference Registration
Friday February 7, 2025 7:30am - 5:00pm MST
Friday February 7, 2025 7:30am - 5:00pm MST
Lower Level II

8:00am MST

Martial Arts Training Meetup
Friday February 7, 2025 8:00am - 8:45am MST
Looking to beat the Jetlag, get an easy workout in or just meet some cool people?

Join us Thursday and Friday morning for a mix of mobility training, self defense skills and other technique practice.

Everyone is welcome! It does not matter if you have never thrown a punch or just got your black belt in JiuJitsu. Instruction will be led by Cameron Cartier, but others are welcome to share their favorite tools, techniques, and tradecraft as well.
Friday February 7, 2025 8:00am - 8:45am MST
Track 1 - Colorado Ballroom Lower Level II

9:00am MST

Breaking Free From the Chains of Fate - Bypassing AWSCompromisedKeyQuarantineV2 Policy
Friday February 7, 2025 9:00am - 9:50am MST
Amazon's AWSCompromisedKeyQuarantineV2 policy is not the panacea it might seem. Join us on an adventure of all the myriad ways to work around this policy, when you discover leaked keys in the wild. This presentation is a fun, multimedia exploration of all the shortcomings of the AWSCompromisedKeyQuarantineV2 policy that is attached whenever Amazon detects that a key and secret pair have been leaked in the wild. We'll include demos of actual exploitation and color commentary on how this policy and defender strategy can be improved.
Speakers
avatar for Bleon Proko

Bleon Proko

Bleon is an Info-sec passionate about Infrastructure Penetration Testing and Security, including Active Directory, Cloud (AWS, Azure, GCP, Digital Ocean), Hybrid Infrastructures, as well as Defense, Detection and Thread Hunting. He has presented in conferences like BlackHat and BSides... Read More →
Friday February 7, 2025 9:00am - 9:50am MST
Track 1 - Colorado Ballroom Lower Level II

9:00am MST

The Extendables - Exploiting Browser Extensions for Privesc and Persistence
Friday February 7, 2025 9:00am - 9:50am MST
This talk explores new ways to exploit browser extensions for both privilege escalation and persistence. It will explore the “NativeMessaging” functionality within all popular browsers (Edge, Chrome and Firefox) across all major Operating Systems (Windows, Linux, MacOS) and how it can be exploited to run arbitrary processes. This would be useful not only to execute code when the browser is launched, or when certain sites are visited, but it also leaves another area ripe for misconfigurations that we can exploit. This means that under certain circumstances, we may be able to escalate privileges. In addition to all of that, it provides an opportunity to run code in the context of other users, if a misconfiguration is present or the user has high enough privileges on the machine. We will go over the benefits to the offensive-side of using this method, as well as adjacent techniques that have been observed In-The-Wild. Alongside this talk explaining how it was discovered, how to exploit it and why it is useful, I will also be releasing a brand new tool which can be used to detect if any vulnerable extensions are installed and then exploit them to run a process of our choice.
Speakers
avatar for Fin Hume

Fin Hume

Fin has been a Security Consultant at WithSecure for over 3 years. In this time he has worked on a wide range of different projects for customers such as finding vulnerabilities in web applications, client and server applications, mobile, cloud and network security assessments to... Read More →
Friday February 7, 2025 9:00am - 9:50am MST
Track 2 - Penrose Lower Level I

9:00am MST

Hands on Kerberos
Friday February 7, 2025 9:00am - 11:00am MST
 In this workshop, you’ll get an overview of Kerberos based on a section straight from Red Siege’s Offense for Defense (O4D) course. We’ll cover what Kerberos is, and how to attack it. You’d work through a hands on lab exercise involving Kerberoasting (Tim’s baby) and a silver ticket attack.

Requirements: Just a laptop with a browser

Speakers
avatar for Tim Medin

Tim Medin

Red Siege
Tim is the CEO and founder of Red Siege Information Security. He is the creator of the Kerberoasting. Tim was a Senior Instructor and course author (SEC560) at The SANS Institute. Tim has performed penetration tests on a wide range of organizations and technologiesTim is an experienced... Read More →
Friday February 7, 2025 9:00am - 11:00am MST
Track 3 - Denver 5/6 Lower Level II

9:00am MST

MetaCTF - Capture the Flag
Friday February 7, 2025 9:00am - 3:00pm MST
MetaCTF is excited to host a 5-hour Attack/Defense Capture the Flag (CTF) Competition on Friday, with participants having all day Thursday to prepare and practice. Teams of up to 8 members can compete, with the winners earning a year’s access to the META CTF range and training catalog and one black badge. An Attack & Defense CTF is a dynamic competition where each team is given a set of identical systems and services. Teams must analyze their systems to identify vulnerabilities, patch these vulnerabilities, and exploit them in the systems of other teams.

Additionally, a Jeopardy-style CTF will run throughout the conference, offering hands-on practice in cybersecurity topics. Participants are encouraged to collaborate and ask for hints. Points earned during the competition can be converted into raffle tickets for a chance to win a $1,000 voucher, hotel and a ticket to Deadwood 2025. The top 3% of participants will also receive a challenge coin. Points can also be earned by completing labs and sponsor challenges.
Speakers
Friday February 7, 2025 9:00am - 3:00pm MST
Lower Level II

9:00am MST

Vendor Hall
Friday February 7, 2025 9:00am - 4:00pm MST
Visit our Sponsors!
Friday February 7, 2025 9:00am - 4:00pm MST
Denver 1-4 Lower Level II

9:00am MST

Fox Pick Lock Picking Village
Friday February 7, 2025 9:00am - 4:00pm MST
Join the in on the fun in the Fox Pick Village, skill or no skill we are here to teach, play and raise money for Hak4Kidz. So come by the village and compete and learn the skill of lockpicking! We will have 2 custom games, Felix's Breakout™ and Pic Tac Toe™! So come by and compete and network with new people. We can't wait to meet you!
Speakers
avatar for Jenee Rogers

Jenee Rogers

Jenee Rogers is the CEO of Fox Pick. A LockSport Training group that trains at 10+ conferences per year to raise money for Hak4Kidz. She and Morgan (her husband) recently developed the brand new Locksport game, PicTacToeTM. As well as Felix’s Breakout, and have more Locksport games... Read More →
avatar for Morgan Rogers

Morgan Rogers

Morgan Rogers is the CTO of Fox Pick and is a highly skilled Computer/Electrical Engineer with a strong foundation in circuit design, software development, and embedded systems. Morgan is Senior Product Test Engineer at Triad Semiconductor, creating circuit boards and so much more... Read More →
avatar for Jeremy Thomas

Jeremy Thomas

Jeremy Thomas is an Infosec Roadie, Former President BSides RDU, Gamer, Foodie, Lover of fine spirits, and a huge Caniac. Jeremy manages data protection for the State of North Carolina by day, but has a passion for Physical Security. He serves on the Board and helps run Oak City Locksport... Read More →

Friday February 7, 2025 9:00am - 4:00pm MST
Lower Level II

9:00am MST

ProCircular Escape Room
Friday February 7, 2025 9:00am - 4:00pm MST
Pre-registration is required. Please register for a session in the Cvent app or website! 

Step into the shoes of a cybersecurity professional in the form of a cyber escape room experience. In this interactive session, you and your team will face a simulated crisis: A cyber attacker, has breached your company's defenses and is stealing sensitive data. Your mission? Work together to uncover the hacker's username and password, track down the stolen files, and identify the type of information that has been compromised.

This scenario challenges participants to think critically and collaborate effectively. A mysterious briefcase, filled with cryptic clues and hidden messages, has been left behind by the attacker. To thwart the hacker's plans, you'll need to decipher the clues, recognize phishing attempts, and classify the compromised data. As you progress, you’ll learn cybersecurity skills, such as creating strong passwords, cryptography basics, phishing email identification, and data classification skills, while racing against the clock to secure your company’s most valuable assets.

Can your team outsmart the hacker and prevent a data breach? Join us in the ProCircular Cyber Escape Room to find out!









Speakers
avatar for Keegan Paisley

Keegan Paisley

Keegan is a GRC Associate with ProCircular, Inc., where he assists organizations of every size in overcoming the ever-evolving challenges that running a cybersecurity program poses. In particular, he loves to run incident response tabletop exercises with a wide variety of scenarios... Read More →
avatar for Brandon Potter

Brandon Potter

CTO, ProCircular
Brandon Potter brings over 20 years of expertise in Information Technology, with 14 years dedicated to cybersecurity. Drawing on more than 12 years of experience as a hacker, he has identified critical vulnerabilities and developed innovative strategies to deliver realistic and effective... Read More →
Exhibitors

Friday February 7, 2025 9:00am - 4:00pm MST
Homestead/Silverton Lower Level I

9:00am MST

SpearPhish General Store
Friday February 7, 2025 9:00am - 4:00pm MST
Friday February 7, 2025 9:00am - 4:00pm MST
Lower Level II

10:00am MST

Detection Engineering is Hard; My Educational Failures That Proved to be Useful After All
Friday February 7, 2025 10:00am - 10:50am MST
Detection Engineering is a time consuming and deeply technical field. In this talk, I’ll share my process on researching and creating detections. This is not always success, in fact, when researching some harder to detect techniques we sometimes end up going into rabbit holes that turn out to be a dead end.  But it’s not all doom and gloom—failure can be a phenomenal teacher. I’ll share how these experiences brought me valuable skills and provided valuable insights which make the invested time more than worth the investment.
Speakers
avatar for Olaf Hartong

Olaf Hartong

Olaf Hartong is a Defensive Specialist and security researcher at FalconForce. He specialises in understanding the attacker tradecraft and thereby improving detection. He has a varied background in blue and purple team operations, network engineering, and security transformation... Read More →
Friday February 7, 2025 10:00am - 10:50am MST
Track 2 - Penrose Lower Level I

10:00am MST

Social Engineering My Way Into Conferences
Friday February 7, 2025 10:00am - 10:50am MST
Over the years, I've managed to get into numerous security and other conferences, and this talk will share some of the most intriguing stories of how I did it. By using a mix of social engineering, reconnaissance, insider knowledge, and quick thinking, I was able to navigate these events successfully. Social engineering played a key role, where I manipulated human psychology to gain access, often by exploiting the natural tendency to trust authority or the desire to be helpful. Reconnaissance was crucial, as gathering information about the event and its organizers helped me identify potential entry points. Quick thinking allowed me to adapt to unexpected situations, such as changes in security protocols. Throughout these experiences, I carefully considered the ethical implications, ensuring my actions didn't harm others or violate laws. I'll share specific stories where I gained entry by posing as an authority figure or creating a believable scenario to gain trust. Each experience taught me valuable lessons about human behavior and security vulnerabilities, highlighting the need for increased awareness and training in cybersecurity to defend against such tactics. This talk emphasizes the importance of ethical considerations in using social engineering techniques
Speakers
avatar for Frank Trezza

Frank Trezza

Frank Trezza is a penetration tester, senior security engineer, chief hacking officer, and hacker
Friday February 7, 2025 10:00am - 10:50am MST
Track 1 - Colorado Ballroom Lower Level II

10:00am MST

Badge Cloning - A Penetration Tester's Guide to Capturing and Writing Badges
Friday February 7, 2025 10:00am - 12:00pm MST
In this workshop, we distill key tactics from the comprehensive Practical Physical Exploitation course, tailored specifically for penetration testers looking to attack Physical Access Controls (PACS). Participants will embark on a journey through the ins and outs of cloning badges during physical penetration tests. Explore the intricacies of long-range, short-range, and Stealth cloning tactics, gaining hands-on experience in the art of badge duplication. Delve into the realm of implantable devices, understanding their role in modern access control exploitation. Join us as we uncover the nuances of downgrade/upgrade attacks and the protocols that make them possible. Learn to navigate the landscape of access control systems with expert guidance, equipping yourself with the knowledge to identify and exploit vulnerabilities. By the end of this session, you'll wield an arsenal of cutting-edge techniques, ready to transform your facility into a bastion of high-security readiness. Don't miss this opportunity to elevate your skills and refine your physical security penetration testing skills.
*Please note, virtual attendees are welcome to join, but will not get the hands-on portion of the workshop!






Speakers
avatar for Ralph May

Ralph May

Ralph May is a security analyst and penetration tester at Black Hills Information Security. Before joining BHIS, Ralph spent the last five years delivering penetration tests on a wide range of security assessments. These assessments include physical, wireless, network, social engineering... Read More →
avatar for Travis Weathers

Travis Weathers

Travis is the Senior Director of Offensive Security at Echelon Risk + Cyber and a co-owner of Mayweather Group, LLC, the creator of the Practical Physical Exploitation Course and the Physical Exploitation Store. Since stepping out of Army Special Operations, Travis has worked within... Read More →
Friday February 7, 2025 10:00am - 12:00pm MST
Gold Coin

10:00am MST

Dial For Deception
Friday February 7, 2025 10:00am - 12:00pm MST
Vishing—using phone calls as an attack vector—remains an effective and often underestimated form of social engineering. In this hands-on workshop, Jason Downey, a Penetration Tester for Red Siege, will walk you through how attackers conduct reconnaissance, build convincing pre-texts, and execute successful vishing scenarios. With its low risk and high reward, vishing is a technique both penetration testers and defenders need to understand. This workshop isn’t just for red teamers—defenders will gain valuable insights into processes and strategies that can help prevent and detect vishing attacks. The session concludes with an interactive AI-powered Vishing CTF, where you’ll have the chance to practice and refine your skills in a fun, realistic environment.
Speakers
avatar for Jason Downey

Jason Downey

Security Consultant, Red Siege
Jason Downey has over ten years of professional experience in IT and information security ranging in a variety of roles in network security roles with additional experience in systems administration. Jason has spoken in front of various audiences ranging from youth initiatives to... Read More →
Friday February 7, 2025 10:00am - 12:00pm MST
Mattie Silks

10:00am MST

Felon in Five Minutes
Friday February 7, 2025 10:00am - 12:00pm MST
Peel back the mystique behind the most basic and effective ways that threat actors, criminals, and pentesters breach physical locations. All of these techniques can be done in less than five minutes.  Learn how to properly manage expectations and scoping for your next Physical Security adventures.
Speakers
avatar for Joseph Kingstone

Joseph Kingstone

Joseph Kingstone joined Black Hills Information Security (BHIS) in Fall 2021 as a Security Analyst. In this role, Joseph performs external and internal penetration tests, C2 pivots, and red teams. He’s had a desire to work at BHIS since transitioning into IT—and eventually penetration... Read More →
Friday February 7, 2025 10:00am - 12:00pm MST
Matchless

11:00am MST

A Journey from Alert(1) to P1 (Cat Pic Graffiti and Phishing Payloads)
Friday February 7, 2025 11:00am - 11:50am MST
Tired of taking screenshots of alert boxes? Join me for a working session to discuss how to use JavaScript and DOM manipulation to craft a believable XSS phishing payload resulting in code execution in a target domain. This session was inspired while working on a web application pentest with some colleagues. They asked me to generate an XSS payload to help demonstrate impact within existing CSP restrictions. Today, I am hosting a learning session to show an approach for turning a reflected XSS bug from alert(1) to P1. This includes a live demo / working session to turn a target domain into a phishing page (and maybe some cat pics) and a discussion about how to turn that into a shell. Attendees are encouraged to follow along in their browsers. Following this session, you will emerge with additional knowledge of (1) manipulating the browser's DOM with JS, (2) CSP Limitations (and bypasses), and (3) a methodology for how to turn XSS into a phishing payload from scratch.
Speakers
avatar for Cary Hooper

Cary Hooper

Cary Hooper is an offensive security engineer working for a Fortune 500 institution. Cary is a combat veteran and graduate of the United States Military Academy at West Point. He led technical and non-technical teams within the Army Engineer Corps and Cyber Command. Cary’s certifications... Read More →
Friday February 7, 2025 11:00am - 11:50am MST
Track 1 - Colorado Ballroom Lower Level II

11:00am MST

MailFail: Spoof Emails in Seconds
Friday February 7, 2025 11:00am - 11:50am MST
Email (SMTP) is a topic where people either know it very well or not at all. I began my journey in the latter group, but after spending several months delving into the relevant RFCs, I gained a comprehensive understanding of how to abuse the email ecosystem. This knowledge culminated in the creation of a browser extension called MailFail. In this presentation, I will get you up to speed so that you can quickly identify and exploit email misconfigurations. Join me as we delve into the intricacies and quirks of email, uncovering both its complexities and its absurdities.
Speakers
avatar for Jack Hyland

Jack Hyland

Jack Hyland joined Black Hills Information Security (BHIS) during Summer 2021 and serves as a Security Analyst. He began as an intern but started working full-time as a Web Application Pentester after finishing his schooling. He enjoyed his internship and decided to stay on because... Read More →
Friday February 7, 2025 11:00am - 11:50am MST
Track 2 - Penrose Lower Level I

12:00pm MST

Lunch
Friday February 7, 2025 12:00pm - 1:00pm MST
Friday February 7, 2025 12:00pm - 1:00pm MST
Lower Level II

12:30pm MST

Book Signing with Mishaal Khan
Friday February 7, 2025 12:30pm - 1:00pm MST
Join us for an exclusive book signing with Mishaal Khan, the co-author of “The Phantom CISO”. Meet the author, buy your copy online (https://amzn.to/3ABlQkY) or grab one on-site, and enjoy the chance to chat with him all week long!
Speakers
avatar for Mishaal Khan

Mishaal Khan

Mishaal is a highly respected figure in cybersecurity, with expertise in ethical hacking, Open Source Intelligence (OSINT), social engineering, and privacy. Mishaal’s engaging approach involves live demos, making cybersecurity accessible and enjoyable, while his strength lies in... Read More →
Friday February 7, 2025 12:30pm - 1:00pm MST
Lower Level II

1:00pm MST

2024: A Cyborg Odyssey
Friday February 7, 2025 1:00pm - 1:50pm MST
Transhumans, individuals enhanced with technological augmentations, have moved beyond science fiction into reality. Historically viewed through medical or cyborg lenses, recent advancements like Brain-Computer Interfaces (BCIs) and SMART technologies are blurring the lines between physical and biological entities. This shift is significantly impacting cybersecurity, as these augmented humans can execute sophisticated cyberattacks, such as URL redirections, phishing, smishing, and man-in-the-middle (MiTM) attacks, using embedded technologies. Traditional security measures are becoming inadequate in this new landscape, requiring a fundamental reassessment of cybersecurity strategies. The presentation will explore these emerging threats through demonstrations of implant-initiated attacks and emphasize the urgent need for advanced, layered security solutions to protect against the unique risks posed by transhumans.
Speakers
avatar for Len Noe

Len Noe

Len Noe, a Technical Evangelist and White Hat Hacker at CyberArk Software, is a renowned figure in international security. With a track record of impactful presentations in over 50 countries and at prestigious conferences like the World Conference in The Hague and C.E.R.T. EU, Noe... Read More →
Friday February 7, 2025 1:00pm - 1:50pm MST
Track 2 - Penrose Lower Level I

1:00pm MST

From User to Entra ID Admin
Friday February 7, 2025 1:00pm - 1:50pm MST
It only takes minutes for an attacker to compromise an account with access.  And the account doesn't even need to have obvious privileged rights for the attacker to own the cloud environment. This talk covers methods in Entra ID to go from standard user access to Entra ID Global Admin.
Speakers
avatar for Sean Metcalf

Sean Metcalf

Sean Metcalf is founder and CTO at Trimarc (TrimarcSecurity.com), a professional services company which focuses on improving enterprise security. He is one of about 100 people in the world who holds the Microsoft Certified Master Directory Services (MCM) Active Directory certification... Read More →
Friday February 7, 2025 1:00pm - 1:50pm MST
Track 1 - Colorado Ballroom Lower Level II

1:00pm MST

A Crash Course in Malware Investigations
Friday February 7, 2025 1:00pm - 3:00pm MST
In this session, we’ll review common characteristics of current malware, discuss tactical endpoint investigation strategies for Windows and Linux endpoints, review some free and open-source tools and scripts to facilitate rapid endpoint investigations, and talk about deriving “actionable intelligence,” leading to effective incident-response containment and eradication procedures.
Speakers
avatar for Patterson Cake

Patterson Cake

Patterson Cake joined the Black Hills Information Security (BHIS) pirate ship in June of 2023 as a Security Analyst focusing primarily on detection engineering and digital forensics and incident response. He chose BHIS because, to paraphrase, “doing cool stuff with cool people... Read More →
Friday February 7, 2025 1:00pm - 3:00pm MST
Matchless

1:00pm MST

A Deep Dive into CIS Safeguards from the Attackers Lens
Friday February 7, 2025 1:00pm - 3:00pm MST
Learning Objectives - 
  • Quick Deep Dive into CIS critical Security Controls
  • Walkthrough of modern breaches and the Critical Controls that failed along the kill chain.
  • Learn to use CIS Critical controls to enhance the security posture of your organization 



Speakers
avatar for Matt Lee

Matt Lee

Matt Lee has dedicated the last 13 years to raising the cyber security tide in the SMB, and MSP markets. His efforts have served in every capacity in a growing MSP that grew to support 20,000 endpoints. His leadership around technology direction, and security/compliance, protected... Read More →
Friday February 7, 2025 1:00pm - 3:00pm MST
Gold Coin

1:00pm MST

The Azure Misconfigurations That Could Cost You: Detect, Exploit, Remediate
Friday February 7, 2025 1:00pm - 3:00pm MST
Your organization’s recent red teaming exercise revealed critical gaps in detecting advanced attacks, which bypassed the out-of-the-box detections. Your Azure environment proved to be containing several misconfigurations, which led to a comprehensive breach.

In this workshop we will explain several common misconfigurations that can lead to a severe compromise. We'll provide access to an environment which has some of these misconfigurations applied. You will simulate a successful device code phishing attempt after which you will collect data with AzureHound which data we will use to find possible attack paths. We will teach you how to find some of these misconfigurations and how to detect or remediate them.

The lab will have 1 challenge in there that will award a prize to the first to successfully exploit it.

Requirements:
Non corporate laptop with internet access
Docker installed, ideally with a working BloodHound installation.
Speakers
avatar for Henri Hambartsumyan

Henri Hambartsumyan

Henri Hambartsumyan is an experienced technical security professional, with 10 years of technical security experience. Henri started his career as pentester and moved to the more advanced pentesting projects. Later he started executing "covert operations", which the industry later... Read More →
avatar for Olaf Hartong

Olaf Hartong

Olaf Hartong is a Defensive Specialist and security researcher at FalconForce. He specialises in understanding the attacker tradecraft and thereby improving detection. He has a varied background in blue and purple team operations, network engineering, and security transformation... Read More →
Friday February 7, 2025 1:00pm - 3:00pm MST
Mattie Silks

1:00pm MST

Atomic Red Team Open House
Friday February 7, 2025 1:00pm - 4:00pm MST
Join us for a community event centered around Atomic Red Team, an open source library of tests designed to test your organization's security controls. Check out our demos, get some Atomic Red Team gear, learn from your peers, have some snacks, and meet other nerds IRL.


Speakers
Friday February 7, 2025 1:00pm - 4:00pm MST
Track 3 - Denver 5/6 Lower Level II

1:30pm MST

Validation station: Using Atomic Red Team to Test your Defenses
Friday February 7, 2025 1:30pm - 1:45pm MST
Learn how to use Atomic Red Team to test your defensive controls and exercise your incident response program. One of the open source project’s creators will walk through use cases and test plans based on the most commonly encountered threats and adversary techniques. You’ll walk away knowing how to do the following:
  • Leverage open source intelligence to identify top threats and adversary techniques
  • Use Atomic Red Team to test your defenses against adversary techniques
  • Operationalize and scale your testing using free and open source tools
  • Share what you’ve learned with the community
Friday February 7, 2025 1:30pm - 1:45pm MST
Track 3 - Denver 5/6 Lower Level II

2:00pm MST

AI-Driven OSINT in the Hands of Cybercriminals
Friday February 7, 2025 2:00pm - 2:50pm MST
Cybercriminals increasingly leverage Artificial Intelligence (AI) and Generative AI in Open Source Intelligence (OSINT) activities to enhance reconnaissance efforts targeting individuals and organizations. By utilizing AI-driven techniques, attackers can efficiently gather, analyze, and exploit publicly available data, facilitating the creation of highly targeted and convincing social engineering schemes, phishing campaigns, and other forms of cyber attacks. The role of AI in OSINT not only broadens the scope of potential attack vectors but also raises significant considerations for cybersecurity strategies focused on detecting and mitigating AI-enhanced threats.
Speakers
avatar for James McQuiggan

James McQuiggan

Security Awareness Advocate, KnowBe4
James McQuiggan has over 20 years of experience in cybersecurity and is currently Security Awareness Advocate for KnowBe4, where he is responsible for amplifying the organization’s messaging related to the importance of, effectiveness of and the need for new-school security awareness... Read More →
Friday February 7, 2025 2:00pm - 2:50pm MST
Track 1 - Colorado Ballroom Lower Level II

2:00pm MST

Fusing Reverse Shells And Kernel Exploits For Fun & Profit
Friday February 7, 2025 2:00pm - 2:50pm MST
The Impersonator Shell started as a combination of two popular hacker tools: Netcat and Printspoofer. The exploit is named after the Windows privilege that Printspoofer uses to get administrative access to Windows machines, the SeImpersonate privilege. This shell abuses the SeImpersonate privilege to create an administrative reverse or bind shell.  Users running server software on Windows hosts will commonly have the SEImpersonate enabled. Security engineers who can obtain RCE on said servers can also obtain an administrative shell by abusing the SEImpersonate privilege. Instead of uploading Netcat and the corresponding kernel exploit, security engineers can use the Impersonator shell. If the inbuilt exploit does not work, security engineers will be provided a non-administrative shell. The Impersonator shell can connect to a Metasploit listener and be upgraded to a meterpreter shell. The Impersonator Shell can also leverage native Windows API functions to grab a process and capture information about the token associated with the process.  People who attend this talk can expect to learn the inner mechanics of reverse shells and bind shells, Offensive Windows API use, and the basics of exploit coding in the C programming language all under the umbrella of the newly created Impersonator shell.
Speakers
avatar for Aleksa Zatezalo

Aleksa Zatezalo

Aleksa is a passionate security engineer, software developer, and aspiring open sorcerer. He enjoys writing and publishing software that provides elegant solutions to offensive security problems. He has contributed to multiple projects, including Metasploit. In April of 2022, Aleksa... Read More →
Friday February 7, 2025 2:00pm - 2:50pm MST
Track 2 - Penrose Lower Level I

2:30pm MST

Validation station: Using Atomic Red Team to Test your Defenses
Friday February 7, 2025 2:30pm - 2:45pm MST
Learn how to use Atomic Red Team to test your defensive controls and exercise your incident response program. One of the open source project’s creators will walk through use cases and test plans based on the most commonly encountered threats and adversary techniques. You’ll walk away knowing how to do the following:
  • Leverage open source intelligence to identify top threats and adversary techniques
  • Use Atomic Red Team to test your defenses against adversary techniques
  • Operationalize and scale your testing using free and open source tools
  • Share what you’ve learned with the community
Friday February 7, 2025 2:30pm - 2:45pm MST
Track 3 - Denver 5/6 Lower Level II

3:00pm MST

Baselining For Bad Things With Surveyor!
Friday February 7, 2025 3:00pm - 3:50pm MST
Surveyor is a free and open source tool for quickly baselining your environments to help identify abnormal activity. You can use it to query supported endpoint detection and response (EDR) products in search of potentially dangerous software that shouldn’t be in your environment. In this session, we’ll look at remote monitoring and management (RMM) tools as an illustrative example—they have a variety of legitimate use cases, but bad guys use them as well. You’ll learn how to use Surveyor to list all of the RMM tools present in your environment, including ones you might not expect to be there.
Speakers
avatar for Tre Wilkins

Tre Wilkins

Threat Researcher, Red Canary
As a threat researcher at Red Canary, Tre leads research initiatives to analyze adversary techniques, develop automation code, and manage test environments for simulating and studying threats. These efforts enhance and refine threat detection and hunting strategies. He started his... Read More →
Friday February 7, 2025 3:00pm - 3:50pm MST
Track 1 - Colorado Ballroom Lower Level II

3:00pm MST

Did You Knock Out Our [noun]?
Friday February 7, 2025 3:00pm - 3:50pm MST
How many times have you heard, "Are you doing anything right now that could [verb] our [noun]?" The answer is sometimes "Yes", always "Maybe", and hopefully "No". After a recent client call, I set up a range and hammered common web servers to figure out the impact that pentesting tools have on typical client systems. I tried to answer questions like, "Does Nuclei cause performance issues for the target?", "Is testssl.sh slowing down that Linux server?" "How many Gobuster threads does it take to max out a standard WordPress server?" In this talk, I'll discuss results from tool testing that may or may not surprise you but will definitely leave you with more evidence for your next client call.
Speakers
JV

Jack Verrier

Jack joined BHIS in 2024 as a security analyst, and loves that he gets to legally hack things with highly skilled people. Jack began working with computers when he was young. He built his first computer in middle school, taught computer repair during college, and has built racing... Read More →
Friday February 7, 2025 3:00pm - 3:50pm MST
Track 2 - Penrose Lower Level I

4:00pm MST

Real-World AI Risks (And Mitigating Them)
Friday February 7, 2025 4:00pm - 4:50pm MST
2024 was the year of fear, uncertainty, and doubt about generative AI. Many organizations moved rapidly to deploy AI solutions for "fear of being left behind" while others struggled with understanding their security implications. Regardless of how you feel about AI, one thing is for sure: AI is being embedded in the products your organization deploys. That means stakeholders will be looking to you to secure it. In this talk, Jake will break down the real risks of generative AI applications while helping to dispel the FUD. You'll walk away better equipped to answer questions from stakeholders and the confidence you're focusing your limited security resources in the right places.
Speakers
avatar for Jake Williams

Jake Williams

Jake Williams (aka MalwareJake) is a seasoned security researcher with decades of experience in the technology and security industries. Jake is a former startup founder, former senior SANS instructor and course author, and an intelligence community and military veteran. He loves forensics... Read More →
Friday February 7, 2025 4:00pm - 4:50pm MST
Track 1 - Colorado Ballroom Lower Level II

5:00pm MST

Closing Ceremony and Awards
Friday February 7, 2025 5:00pm - 5:15pm MST
Speakers
avatar for John Strand

John Strand

John Strand has both consulted and taught hundreds of organizations in the areas of security, regulatory compliance, and penetration testing. He is a coveted speaker and much-loved SANS teacher. John is a contributor to the industry-shaping Penetration Testing Execution Standard and... Read More →
Friday February 7, 2025 5:00pm - 5:15pm MST
Track 1 - Colorado Ballroom Lower Level II