Loading…
or to bookmark your favorites and sync them to your phone or calendar.
Company: Track 3 clear filter
Thursday, February 6
 

1:00pm MST

Identifying New Attack Paths via Password Analysis
Thursday February 6, 2025 1:00pm - 1:20pm MST
In this talk I will cover how you can enrich BloodHound with different fields and edges to expose previously unidentified attack paths. By combining multiple open source tools, it is possible to track password sharing relationships across separate accounts, and even across different Active Directory forests.
Speakers
avatar for Esteban Rodriguez

Esteban Rodriguez

Esteban is a Senior Security Consultant at TrustedSec. He has been penetration testing professionally for over 6 years and has authored a many blog posts on the topic of offensive security and developed tools to aid in penetration testing.
Thursday February 6, 2025 1:00pm - 1:20pm MST
Track 3 - Denver 5/6 Lower Level II

1:30pm MST

Powering Up Linux: Unleashing PowerShell for Penetration Testing and Red Teaming
Thursday February 6, 2025 1:30pm - 1:50pm MST
This talk explores the dynamic potential of PowerShell for Linux in the realms of penetration testing and red teaming. Delving into its capabilities, attendees will discover how this versatile tool enhances offensive security strategies. Intended for cybersecurity professionals and enthusiasts seeking to leverage PowerShell's prowess within Linux environments, the session promises insights and practical guidance for optimizing offensive tactics.
Speakers
avatar for Tj Null

Tj Null

Tj Null is a pentester and red teamer in the private sector. He's very passionate about red team development and supporting open source projects like Kali Linux and Powershell for Linux. Through his work and contributions to the community, TJ continues to advance the field of hacking... Read More →
Thursday February 6, 2025 1:30pm - 1:50pm MST
Track 3 - Denver 5/6 Lower Level II

2:00pm MST

How I Used AI to Crush CTF Challenges and What I Learned Along the Way
Thursday February 6, 2025 2:00pm - 2:20pm MST
Participating in Capture The Flag (CTF) competitions is always a thrilling experience, but this time, I had a secret weapon up my sleeve: AI. From cracking codes to navigating complex cyber challenges, AI became my go-to sidekick. Here's how I teamed up with AI to tackle CTF puzzles and what I learned on this wild ride.
Speakers
avatar for Tabatha Kossman

Tabatha Kossman

Tabatha is a powerhouse in cybersecurity with over a decade of experience and two decades in IT. Armed with a Master's in Information Assurance from Regis University, she's been a key player at companies like Hearst Technologies and Frontier Airlines. Tabatha's expertise spans finance... Read More →
Thursday February 6, 2025 2:00pm - 2:20pm MST
Track 3 - Denver 5/6 Lower Level II

2:30pm MST

What I Learned From Building A Tabletop Security Exercise
Thursday February 6, 2025 2:30pm - 2:50pm MST
At DEFCON 32, my team taught over 160 people the limitations of manual code review to solve secrets sprawl. We did not use new tech, we did not use computers or anything that needed electricity. We used paper cards. What we learned along the way was eye opening and changed the way I think about security.  This talk is a quick recap of the surprising findings we unexpectedly gathered and the power of getting away from the keyboard.  I will reveal my new theory on driving better conversations across teams and roles to actually try and improve security and not just show how clever we are.
Speakers
avatar for Dwayne McDaniel

Dwayne McDaniel

Dwayne has been working as a Developer Advocate since 2016 and has been involved in tech communities since 2005. He loves sharing his knowledge, and he has done so by giving talks at over a hundred events worldwide. He has been fortunate enough to speak at institutions like MIT and... Read More →
Thursday February 6, 2025 2:30pm - 2:50pm MST
Track 3 - Denver 5/6 Lower Level II

3:00pm MST

Solving Dumb Hacker Problems With Nix
Thursday February 6, 2025 3:00pm - 3:20pm MST
Between Python version mismatches, virtual environments, and containers, getting even popular software to work on every operating system and setup is more cumbersome than it should be. Hackers should be fighting vulnerabilities, not their own tooling. Nix has solved this for me and I need to share it with people.  It takes "it works on my machine" to a whole new level. Nix suffers from an inordinate degree of mystery that turns a lot of people away from it, but those of us who have pushed through the haze have come to appreciate just how brilliant Nix is. But it doesn't have to be complicated, and I'll be demonstrating that.  

Within and without NixOS, the Nix package management system alone offers hackers the ability to (at a minimum):
- Effortlessly install packages not available in their default repositories
- Replicate system setups for any machine or server with a single file
- Only activate virtual environments and access specific dependencies based on isolated environments or even just entering system directories

This is all done without technologies like Ansible or Docker, making even the base system dependency overhead much smaller.

Since this talk involves creating environments that help users deal with dependency management, tool installation, and system deployment, I'll be demonstrating all of those things. For example, we will:
1. Build a working Python virtual environment, handle all the dependencies, and successfully run highly opinionated tooling (impacket) alongside other highly opinionated tooling (CrackMapExec) using an ".envrc" file of our making.
2. Demonstrate native containerization via systemd-nspawn for keeping hacking tools isolated from the main system.
3. Deploying my favorite tools to a brand new virtual private server to starting hacking from it in seconds.

Much of these capabilities will be available as script and file templates via a Github repo I'll make public alongside the talk.
Speakers
avatar for Ryan Basden

Ryan Basden

I am a penetration tester and red teamer with eight years of information security and threat emulation experience. I specialize in simulating realistic attacks against complex environments as well as building high performing teams. Ultimately, I am a hacker who cares about the way... Read More →
Thursday February 6, 2025 3:00pm - 3:20pm MST
Track 3 - Denver 5/6 Lower Level II

3:30pm MST

Hacking Through the Weeds
Thursday February 6, 2025 3:30pm - 3:50pm MST
I would like for this conversation to be an in depth deep dive into both Nmap and other open source reconnaissance tools. A lot of times peers leave it at the very bare minimum and use the same script everytime they run these open source tools due to the fact they use them so often. These are tools that everyone has access to but they only use about 5% of the tool itself. I have worked with specific Open Source tools to learn every little thing there is to know especially the ones needed for every engagement and would love the opportunity to showcase these different arguments that a lot may not have knowledge of until shown like I was.
Speakers
avatar for Justin Watkins

Justin Watkins

Justin Watkins is a dedicated cybersecurity professional who has been in the industry now for 9 years. His expertise is in penetration testing, threat emulation, vulnerability management, and risk management through readiness assessments. He is a Certified Information Systems Security... Read More →
Thursday February 6, 2025 3:30pm - 3:50pm MST
Track 3 - Denver 5/6 Lower Level II

4:00pm MST

OSINT Gone Wild: How I Found Drug Traffickers and Narco Terrorist Online
Thursday February 6, 2025 4:00pm - 4:20pm MST
This presentation will consist of thorough research on narcotics, narcoterrorism and the fentanyl epidemic are a new cyber crime issue. In my presentation I will speak about how OSINT can be used to combat illicit narcotic transactions , narcoterrorism and uncover valuable information from OSINT on the dark web.
Speakers
avatar for Schuyler Davis

Schuyler Davis

Schuyler Davis was born and raised in Plainfield , NJ. He is a graduate student at Michigan State University pursuing a masters of science in Cyber Crime and Digital Investigations and currently teaches Computer Science to Kindergarten and First Graders. When he's not using OSINT... Read More →
Thursday February 6, 2025 4:00pm - 4:20pm MST
Track 3 - Denver 5/6 Lower Level II
 
Friday, February 7
 

9:00am MST

Hands on Kerberos
Friday February 7, 2025 9:00am - 11:00am MST
 In this workshop, you’ll get an overview of Kerberos based on a section straight from Red Siege’s Offense for Defense (O4D) course. We’ll cover what Kerberos is, and how to attack it. You’d work through a hands on lab exercise involving Kerberoasting (Tim’s baby) and a silver ticket attack.

Requirements: Just a laptop with a browser

Speakers
avatar for Tim Medin

Tim Medin

Red Siege
Tim is the CEO and founder of Red Siege Information Security. He is the creator of the Kerberoasting. Tim was a Senior Instructor and course author (SEC560) at The SANS Institute. Tim has performed penetration tests on a wide range of organizations and technologiesTim is an experienced... Read More →
Friday February 7, 2025 9:00am - 11:00am MST
Track 3 - Denver 5/6 Lower Level II
 
Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.