Loading…
or to bookmark your favorites and sync them to your phone or calendar.
Company: Track 1 clear filter
arrow_back View All Dates
Friday, February 7
 

8:00am MST

Martial Arts Training Meetup
Friday February 7, 2025 8:00am - 8:45am MST
Looking to beat the Jetlag, get an easy workout in or just meet some cool people?

Join us Thursday and Friday morning for a mix of mobility training, self defense skills and other technique practice.

Everyone is welcome! It does not matter if you have never thrown a punch or just got your black belt in JiuJitsu. Instruction will be led by Cameron Cartier, but others are welcome to share their favorite tools, techniques, and tradecraft as well.
Friday February 7, 2025 8:00am - 8:45am MST
Track 1 - Colorado Ballroom Lower Level II

9:00am MST

Breaking Free From the Chains of Fate - Bypassing AWSCompromisedKeyQuarantineV2 Policy
Friday February 7, 2025 9:00am - 9:50am MST
Amazon's AWSCompromisedKeyQuarantineV2 policy is not the panacea it might seem. Join us on an adventure of all the myriad ways to work around this policy, when you discover leaked keys in the wild. This presentation is a fun, multimedia exploration of all the shortcomings of the AWSCompromisedKeyQuarantineV2 policy that is attached whenever Amazon detects that a key and secret pair have been leaked in the wild. We'll include demos of actual exploitation and color commentary on how this policy and defender strategy can be improved.
Speakers
avatar for Bleon Proko

Bleon Proko

Bleon is an Info-sec passionate about Infrastructure Penetration Testing and Security, including Active Directory, Cloud (AWS, Azure, GCP, Digital Ocean), Hybrid Infrastructures, as well as Defense, Detection and Thread Hunting. He has presented in conferences like BlackHat and BSides... Read More →
Friday February 7, 2025 9:00am - 9:50am MST
Track 1 - Colorado Ballroom Lower Level II

10:00am MST

Social Engineering My Way Into Conferences
Friday February 7, 2025 10:00am - 10:50am MST
Over the years, I've managed to get into numerous security and other conferences, and this talk will share some of the most intriguing stories of how I did it. By using a mix of social engineering, reconnaissance, insider knowledge, and quick thinking, I was able to navigate these events successfully. Social engineering played a key role, where I manipulated human psychology to gain access, often by exploiting the natural tendency to trust authority or the desire to be helpful. Reconnaissance was crucial, as gathering information about the event and its organizers helped me identify potential entry points. Quick thinking allowed me to adapt to unexpected situations, such as changes in security protocols. Throughout these experiences, I carefully considered the ethical implications, ensuring my actions didn't harm others or violate laws. I'll share specific stories where I gained entry by posing as an authority figure or creating a believable scenario to gain trust. Each experience taught me valuable lessons about human behavior and security vulnerabilities, highlighting the need for increased awareness and training in cybersecurity to defend against such tactics. This talk emphasizes the importance of ethical considerations in using social engineering techniques
Speakers
avatar for Frank Trezza

Frank Trezza

Frank Trezza is a penetration tester, senior security engineer, chief hacking officer, and hacker
Friday February 7, 2025 10:00am - 10:50am MST
Track 1 - Colorado Ballroom Lower Level II

11:00am MST

A Journey from Alert(1) to P1 (Cat Pic Graffiti and Phishing Payloads)
Friday February 7, 2025 11:00am - 11:50am MST
Tired of taking screenshots of alert boxes? Join me for a working session to discuss how to use JavaScript and DOM manipulation to craft a believable XSS phishing payload resulting in code execution in a target domain. This session was inspired while working on a web application pentest with some colleagues. They asked me to generate an XSS payload to help demonstrate impact within existing CSP restrictions. Today, I am hosting a learning session to show an approach for turning a reflected XSS bug from alert(1) to P1. This includes a live demo / working session to turn a target domain into a phishing page (and maybe some cat pics) and a discussion about how to turn that into a shell. Attendees are encouraged to follow along in their browsers. Following this session, you will emerge with additional knowledge of (1) manipulating the browser's DOM with JS, (2) CSP Limitations (and bypasses), and (3) a methodology for how to turn XSS into a phishing payload from scratch.
Speakers
avatar for Cary Hooper

Cary Hooper

Cary Hooper is an offensive security engineer working for a Fortune 500 institution. Cary is a combat veteran and graduate of the United States Military Academy at West Point. He led technical and non-technical teams within the Army Engineer Corps and Cyber Command. Cary’s certifications... Read More →
Friday February 7, 2025 11:00am - 11:50am MST
Track 1 - Colorado Ballroom Lower Level II

1:00pm MST

From User to Entra ID Admin
Friday February 7, 2025 1:00pm - 1:50pm MST
It only takes minutes for an attacker to compromise an account with access.  And the account doesn't even need to have obvious privileged rights for the attacker to own the cloud environment. This talk covers methods in Entra ID to go from standard user access to Entra ID Global Admin.
Speakers
avatar for Sean Metcalf

Sean Metcalf

Sean Metcalf is founder and CTO at Trimarc (TrimarcSecurity.com), a professional services company which focuses on improving enterprise security. He is one of about 100 people in the world who holds the Microsoft Certified Master Directory Services (MCM) Active Directory certification... Read More →
Friday February 7, 2025 1:00pm - 1:50pm MST
Track 1 - Colorado Ballroom Lower Level II

2:00pm MST

AI-Driven OSINT in the Hands of Cybercriminals
Friday February 7, 2025 2:00pm - 2:50pm MST
Cybercriminals increasingly leverage Artificial Intelligence (AI) and Generative AI in Open Source Intelligence (OSINT) activities to enhance reconnaissance efforts targeting individuals and organizations. By utilizing AI-driven techniques, attackers can efficiently gather, analyze, and exploit publicly available data, facilitating the creation of highly targeted and convincing social engineering schemes, phishing campaigns, and other forms of cyber attacks. The role of AI in OSINT not only broadens the scope of potential attack vectors but also raises significant considerations for cybersecurity strategies focused on detecting and mitigating AI-enhanced threats.
Speakers
avatar for James McQuiggan

James McQuiggan

Security Awareness Advocate, KnowBe4
James McQuiggan has over 20 years of experience in cybersecurity and is currently Security Awareness Advocate for KnowBe4, where he is responsible for amplifying the organization’s messaging related to the importance of, effectiveness of and the need for new-school security awareness... Read More →
Friday February 7, 2025 2:00pm - 2:50pm MST
Track 1 - Colorado Ballroom Lower Level II

3:00pm MST

Baselining For Bad Things With Surveyor!
Friday February 7, 2025 3:00pm - 3:50pm MST
Surveyor is a free and open source tool for quickly baselining your environments to help identify abnormal activity. You can use it to query supported endpoint detection and response (EDR) products in search of potentially dangerous software that shouldn’t be in your environment. In this session, we’ll look at remote monitoring and management (RMM) tools as an illustrative example—they have a variety of legitimate use cases, but bad guys use them as well. You’ll learn how to use Surveyor to list all of the RMM tools present in your environment, including ones you might not expect to be there.
Speakers
avatar for Tre Wilkins

Tre Wilkins

Threat Researcher, Red Canary
As a threat researcher at Red Canary, Tre leads research initiatives to analyze adversary techniques, develop automation code, and manage test environments for simulating and studying threats. These efforts enhance and refine threat detection and hunting strategies. He started his... Read More →
Friday February 7, 2025 3:00pm - 3:50pm MST
Track 1 - Colorado Ballroom Lower Level II

4:00pm MST

Real-World AI Risks (And Mitigating Them)
Friday February 7, 2025 4:00pm - 4:50pm MST
2024 was the year of fear, uncertainty, and doubt about generative AI. Many organizations moved rapidly to deploy AI solutions for "fear of being left behind" while others struggled with understanding their security implications. Regardless of how you feel about AI, one thing is for sure: AI is being embedded in the products your organization deploys. That means stakeholders will be looking to you to secure it. In this talk, Jake will break down the real risks of generative AI applications while helping to dispel the FUD. You'll walk away better equipped to answer questions from stakeholders and the confidence you're focusing your limited security resources in the right places.
Speakers
avatar for Jake Williams

Jake Williams

Jake Williams (aka MalwareJake) is a seasoned security researcher with decades of experience in the technology and security industries. Jake is a former startup founder, former senior SANS instructor and course author, and an intelligence community and military veteran. He loves forensics... Read More →
Friday February 7, 2025 4:00pm - 4:50pm MST
Track 1 - Colorado Ballroom Lower Level II

5:00pm MST

Closing Ceremony and Awards
Friday February 7, 2025 5:00pm - 5:15pm MST
Speakers
avatar for John Strand

John Strand

John Strand has both consulted and taught hundreds of organizations in the areas of security, regulatory compliance, and penetration testing. He is a coveted speaker and much-loved SANS teacher. John is a contributor to the industry-shaping Penetration Testing Execution Standard and... Read More →
Friday February 7, 2025 5:00pm - 5:15pm MST
Track 1 - Colorado Ballroom Lower Level II
 
Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
Filtered by Date -