Loading…
or to bookmark your favorites and sync them to your phone or calendar.
Venue: Track 2 - Penrose clear filter
Tuesday, February 4
 

8:30am MST

Breaching the Cloud - Day 1
Tuesday February 4, 2025 8:30am - 5:00pm MST
Speakers
avatar for Beau Bullock

Beau Bullock

Senior Security Analyst, Antisyphon Training
Beau is a Senior Security Analyst at Black Hills Information Security where he performs penetration tests and red team assessments. He is the author of various red team/pentest tools such as MailSniper, PowerMeta, HostRecon, and DomainPasswordSpray. Beau is a host of the web shows... Read More →
Tuesday February 4, 2025 8:30am - 5:00pm MST
Track 2 - Penrose Lower Level I
 
Thursday, February 6
 

10:00am MST

Developing Better Payloads with Automated Testing
Thursday February 6, 2025 10:00am - 10:50am MST
Everyone else is doing automated testing - why aren't red teamers? Be confident your payload will execute, regardless of the options you picked, by integrating shellidate into your continuous integration pipelines!
Speakers
avatar for Nick McClendon

Nick McClendon

Nick McClendon is a principal red team consultant at Mandiant, Google Cloud and has been doing primarily red team tool development for the last 4 years.    Nick's experience maintaining tools year over year, managing contributions from other consultants, and keeping up with the... Read More →
Thursday February 6, 2025 10:00am - 10:50am MST
Track 2 - Penrose Lower Level I

11:00am MST

The Hacker’s Guide to Risk Management: Evolve Into a Golden Unicorn
Thursday February 6, 2025 11:00am - 11:50am MST
Are you ready to become the Golden Unicorn of cybersecurity—a technical powerhouse who bridges the gap between hacking and risk management? The industry buzz around Golden Unicorns refers to individuals who are not only masters of red teaming but also fluent in the language of governance, risk, and compliance (GRC). They’re rare, powerful, and essential to shaping a secure organization.In this session, we’ll decode the mystery of risk management and why it matters to hackers and red teamers. You’ll learn how the vulnerability tools you already use—like Snyk and Qualys—fit into risk management plans and how to level up your skills to communicate risks effectively to leaders and stakeholders. Plus, we’ll break down how to read workpapers and understand the fundamentals of control assessments, demystifying processes that are critical for effective risk mitigation.This session is packed with actionable insights and practical takeaways—so bring your A-game and get ready to rock and roll. Join me to hack risk management, elevate your career, and become the Golden Unicorn that every organization needs. It’s time to own the spotlight and prove that hackers can lead the way in managing risk with innovation and technical excellence.
Speakers
avatar for Jaclyn

Jaclyn "Jax" Scott

Jaclyn "Jax" Scott, Vice President of Cybersecurity at Pearson, brings over 16 years of expertise spanning military and civilian sectors. With a distinguished career as a 20-year Army Cyber and Electronic Warfare Special Operations Warrant Officer, Jax has spearheaded cybersecurity... Read More →
Thursday February 6, 2025 11:00am - 11:50am MST
Track 2 - Penrose Lower Level I

1:00pm MST

LLMs for Vulnerability Discovery: Finding 0days at Scale With a Click of a Button
Thursday February 6, 2025 1:00pm - 1:50pm MST
Large Language Models (LLMs) have opened up the floodgates for a whole new generation of security tooling. One of the most obvious applications is automatic discovery of vulnerabilities which so far has had extremely mixed results. Can LLMs “get good” at vulnerability discovery? In this talk, we cover our approach to the problem going into all the success and fails along the way. Finally, we will be tool dropping VulnHuntr, which implements our approach to using LLMs for discovering vulnerabilities through static code analysis along with presenting a number of 0days that were found by it.
Speakers
avatar for Dan McInerney

Dan McInerney

microwave (Dan McInerney) was a professional hacker and open source tool developer for a decade, pentesting Fortune 500 properties before leaning into machine learning engineering 4 years ago. The combinations of those skills has lead to the discovery of 11 CVEs in the AI domain... Read More →
avatar for Marcello Salvati

Marcello Salvati

byt3bl33d3r (Marcello Salvati) has seen some shit and done some shit, but the shit ain’t nothin’ to him man. If you’re interested in deets, ask. He likes talking to people, come talk to him if you want 😄
Thursday February 6, 2025 1:00pm - 1:50pm MST
Track 2 - Penrose Lower Level I

2:00pm MST

From Sore to SOAR: Reinventing Sentinel Automation Without Logic Apps
Thursday February 6, 2025 2:00pm - 2:50pm MST
TL;DR: This talk shares our journey building a custom SOAR-like solution for Microsoft Sentinel that 1) combines full-code flexibility with low-code simplicity, and 2) overcomes the limitations of Logic Apps in performance, maintainability, and debugging. Learn about architecture and design decisions, integrations, limitations and other lessons we learned when building our SOAR.
 
Microsoft Sentinel offers a robust SIEM platform, but its automation capabilities are heavily reliant on Logic Apps, Azure’s low-code automation tool. While functional, Logic Apps present a lot of challenges, most notably in performance, maintainability, and debugging. This is especially true for more complex automation needs.
These limitations motivated us to develop a custom SOAR-like solution that combines the flexibility of low-code automation with the power and precision of full-code capabilities.
 
We built a solution designed to:
  • Support both full-code and low-code automations.
  • Operate modularly across diverse environments.
  • Be extensible for custom integrations and enhancements.
  • Address known limitations in Sentinel’s native automation.
  • Run seamlessly within Azure.
 
In this talk, we share the architecture, implementation, and lessons learned from building this system. Key topics include:
  • System architecture and design decisions.
  • Integration with Sentinel data.
  • UI and dashboarding for visibility.
  • External and internal interfaces.
  • Caching strategies.
  • Error handling, traceability, and debugging.
 
By the end of this session, you will have actionable insights to build or enhance your own automation solutions on Microsoft Sentinel, avoiding common pitfalls and maximizing efficiency.
Speakers
avatar for Henri Hambartsumyan

Henri Hambartsumyan

Henri Hambartsumyan is an experienced technical security professional, with 10 years of technical security experience. Henri started his career as pentester and moved to the more advanced pentesting projects. Later he started executing "covert operations", which the industry later... Read More →
Thursday February 6, 2025 2:00pm - 2:50pm MST
Track 2 - Penrose Lower Level I

3:00pm MST

Effectively Detecting Modern Code Injection Techniques with Volatility 3
Thursday February 6, 2025 3:00pm - 3:50pm MST
Malware used in ransomware campaigns and targeted attacks makes a concerted effort to conceal its injected code from AVs, EDRs, and manual inspection. This deception includes removing obvious signs of malicious code like regions that are allocated readable, writable, and executable or DLLs loaded from unusual directories. Instead, modern forms of code injection, such as process hollowing, process ghosting, module stomping, and their many variants are used to bypass scanners that rely on outdated detections. In this talk, attendees will be taken through the methods that modern malware uses to inject code in a stealthy manner along with how such malware can be detected using volatile memory analysis. This analysis will be performed using Volatility 3, the latest version of the most widely used open-source memory forensics framework. Attendees will leave understanding how to detect modern code injection and with slides documenting how to integrate such detection workflows in real-world, enterprise settings.
Speakers
avatar for Andrew Case

Andrew Case

Digital Forensics Research, Volatility Project
Andrew Case is the Director of Research at Volexity and has significant experience in incident response handling, digital forensics, and malware analysis. He has conducted numerous large-scale investigations that span enterprises and industries. Case is a core developer of Volatility... Read More →
Thursday February 6, 2025 3:00pm - 3:50pm MST
Track 2 - Penrose Lower Level I

4:00pm MST

Streamlining Pentest and Vulnerability Reporting with AI: A Remediation-Focused Approach
Thursday February 6, 2025 4:00pm - 4:50pm MST
The sheer volume of pentest and vulnerability data can overwhelm security teams, making it challenging to turn this information into actionable insights. Manual reporting and prioritization of findings are often time-consuming and prone to error. This presentation will explore how AI can streamline these processes by automating report writing and prioritizing findings based on business impact and risk frameworks. Attendees will learn how to safely and effectively leverage AI to: Streamline report generation: AI can automatically create comprehensive, customized reports, significantly reducing the time and effort required by security teams. Improve accuracy: By analyzing data objectively, AI minimizes human error and identifies potential inconsistencies. Prioritize findings based on business impact: AI evaluates the potential effects of vulnerabilities on critical business functions, ensuring that remediation efforts target the most significant risks. Align with risk frameworks: AI can assist organizations in aligning their risk management practices with industry standards and regulatory requirements. This session will provide practical insights into how AI can automate pentest and vulnerability reporting, enabling security teams to focus on higher-value activities and make more informed decisions.
Speakers
avatar for Dan DeCloss

Dan DeCloss

Dan DeCloss is the Founder and CTO of PlexTrac and has over 19 years of experience in cybersecurity. Dan started his career in the Department of Defense and then moved on to the private sector where he worked for various companies including Telos, Veracode, Mayo Clinic, and Anthem... Read More →
Thursday February 6, 2025 4:00pm - 4:50pm MST
Track 2 - Penrose Lower Level I

4:00pm MST

Streamlining Pentest and Vulnerability Reporting with AI: A Remediation-Focused Approach
Thursday February 6, 2025 4:00pm - 4:50pm MST
The sheer volume of pentest and vulnerability data can overwhelm security teams, making it challenging to turn this information into actionable insights. Manual reporting and prioritization of findings are often time-consuming and prone to error. This presentation will explore how AI can streamline these processes by automating report writing and prioritizing findings based on business impact and risk frameworks.
Attendees will learn how to safely and effectively leverage AI to:
  • Streamline report generation: AI can automatically create comprehensive, customized reports, significantly reducing the time and effort required by security teams.
  • Improve accuracy: By analyzing data objectively, AI minimizes human error and identifies potential inconsistencies.
  • Prioritize findings based on business impact: AI evaluates the potential effects of vulnerabilities on critical business functions, ensuring that remediation efforts target the most significant risks.
  • Align with risk frameworks: AI can assist organizations in aligning their risk management practices with industry standards and regulatory requirements.
This session will provide practical insights into how AI can automate pentest and vulnerability reporting, enabling security teams to focus on higher-value activities and make more informed decisions
Speakers
avatar for Dan DeCloss

Dan DeCloss

Dan DeCloss is the Founder and CTO of PlexTrac and has over 19 years of experience in cybersecurity. Dan started his career in the Department of Defense and then moved on to the private sector where he worked for various companies including Telos, Veracode, Mayo Clinic, and Anthem... Read More →
Thursday February 6, 2025 4:00pm - 4:50pm MST
Track 2 - Penrose Lower Level I

5:00pm MST

The Tao and Te of Device Code Phishing
Thursday February 6, 2025 5:00pm - 5:50pm MST
Security experts continually tout the benefits of single sign on systems especially for cloud. In device code authentication cloud providers use a relying parting that exchanges a nonce with a backend service via a local listening callback on the users machine. That nonce is then exchanged for an oAuth token which is in turn exchanged for temporary cloud provider credentials.


This elegant multi step dance has many advantages including the elimination of long lived credentials on disk. In this session we’ll dive deep on the different ways device code authentication can be exploited and changes that cloud providers are  making to mitigate phishing that targets this type of authentication flow.  


As a bonus you’ll also get a peek at how a new concept; trusted identity propagation helps companies build chains of trust to custom applications leveraging these flows. Attendees can expect to leave understanding if device code, PKCE, and SSO is worth moving to the top of priority list. Red teamers will gain critical insight on how to exploit this in phishing campaigns.


Speakers
avatar for Andrew Krug

Andrew Krug

Andrew Krug is a Security Geek specializing in Cloud and Identity and Access Management. Andrew brings 15 years experience at the intersection of security, education, and systems administration. As a fierce advocate for Open Source and founder of ThreatResponse tool suite, Andrew... Read More →
Thursday February 6, 2025 5:00pm - 5:50pm MST
Track 2 - Penrose Lower Level I
 
Friday, February 7
 

9:00am MST

The Extendables - Exploiting Browser Extensions for Privesc and Persistence
Friday February 7, 2025 9:00am - 9:50am MST
This talk explores new ways to exploit browser extensions for both privilege escalation and persistence. It will explore the “NativeMessaging” functionality within all popular browsers (Edge, Chrome and Firefox) across all major Operating Systems (Windows, Linux, MacOS) and how it can be exploited to run arbitrary processes. This would be useful not only to execute code when the browser is launched, or when certain sites are visited, but it also leaves another area ripe for misconfigurations that we can exploit. This means that under certain circumstances, we may be able to escalate privileges. In addition to all of that, it provides an opportunity to run code in the context of other users, if a misconfiguration is present or the user has high enough privileges on the machine. We will go over the benefits to the offensive-side of using this method, as well as adjacent techniques that have been observed In-The-Wild. Alongside this talk explaining how it was discovered, how to exploit it and why it is useful, I will also be releasing a brand new tool which can be used to detect if any vulnerable extensions are installed and then exploit them to run a process of our choice.
Speakers
avatar for Fin Hume

Fin Hume

Fin has been a Security Consultant at WithSecure for over 3 years. In this time he has worked on a wide range of different projects for customers such as finding vulnerabilities in web applications, client and server applications, mobile, cloud and network security assessments to... Read More →
Friday February 7, 2025 9:00am - 9:50am MST
Track 2 - Penrose Lower Level I

10:00am MST

Detection Engineering is Hard; My Educational Failures That Proved to be Useful After All
Friday February 7, 2025 10:00am - 10:50am MST
Detection Engineering is a time consuming and deeply technical field. In this talk, I’ll share my process on researching and creating detections. This is not always success, in fact, when researching some harder to detect techniques we sometimes end up going into rabbit holes that turn out to be a dead end.  But it’s not all doom and gloom—failure can be a phenomenal teacher. I’ll share how these experiences brought me valuable skills and provided valuable insights which make the invested time more than worth the investment.
Speakers
avatar for Olaf Hartong

Olaf Hartong

Olaf Hartong is a Defensive Specialist and security researcher at FalconForce. He specialises in understanding the attacker tradecraft and thereby improving detection. He has a varied background in blue and purple team operations, network engineering, and security transformation... Read More →
Friday February 7, 2025 10:00am - 10:50am MST
Track 2 - Penrose Lower Level I

11:00am MST

MailFail: Spoof Emails in Seconds
Friday February 7, 2025 11:00am - 11:50am MST
Email (SMTP) is a topic where people either know it very well or not at all. I began my journey in the latter group, but after spending several months delving into the relevant RFCs, I gained a comprehensive understanding of how to abuse the email ecosystem. This knowledge culminated in the creation of a browser extension called MailFail. In this presentation, I will get you up to speed so that you can quickly identify and exploit email misconfigurations. Join me as we delve into the intricacies and quirks of email, uncovering both its complexities and its absurdities.
Speakers
avatar for Jack Hyland

Jack Hyland

Jack Hyland joined Black Hills Information Security (BHIS) during Summer 2021 and serves as a Security Analyst. He began as an intern but started working full-time as a Web Application Pentester after finishing his schooling. He enjoyed his internship and decided to stay on because... Read More →
Friday February 7, 2025 11:00am - 11:50am MST
Track 2 - Penrose Lower Level I

1:00pm MST

2024: A Cyborg Odyssey
Friday February 7, 2025 1:00pm - 1:50pm MST
Transhumans, individuals enhanced with technological augmentations, have moved beyond science fiction into reality. Historically viewed through medical or cyborg lenses, recent advancements like Brain-Computer Interfaces (BCIs) and SMART technologies are blurring the lines between physical and biological entities. This shift is significantly impacting cybersecurity, as these augmented humans can execute sophisticated cyberattacks, such as URL redirections, phishing, smishing, and man-in-the-middle (MiTM) attacks, using embedded technologies. Traditional security measures are becoming inadequate in this new landscape, requiring a fundamental reassessment of cybersecurity strategies. The presentation will explore these emerging threats through demonstrations of implant-initiated attacks and emphasize the urgent need for advanced, layered security solutions to protect against the unique risks posed by transhumans.
Speakers
avatar for Len Noe

Len Noe

Len Noe, a Technical Evangelist and White Hat Hacker at CyberArk Software, is a renowned figure in international security. With a track record of impactful presentations in over 50 countries and at prestigious conferences like the World Conference in The Hague and C.E.R.T. EU, Noe... Read More →
Friday February 7, 2025 1:00pm - 1:50pm MST
Track 2 - Penrose Lower Level I

2:00pm MST

Fusing Reverse Shells And Kernel Exploits For Fun & Profit
Friday February 7, 2025 2:00pm - 2:50pm MST
The Impersonator Shell started as a combination of two popular hacker tools: Netcat and Printspoofer. The exploit is named after the Windows privilege that Printspoofer uses to get administrative access to Windows machines, the SeImpersonate privilege. This shell abuses the SeImpersonate privilege to create an administrative reverse or bind shell.  Users running server software on Windows hosts will commonly have the SEImpersonate enabled. Security engineers who can obtain RCE on said servers can also obtain an administrative shell by abusing the SEImpersonate privilege. Instead of uploading Netcat and the corresponding kernel exploit, security engineers can use the Impersonator shell. If the inbuilt exploit does not work, security engineers will be provided a non-administrative shell. The Impersonator shell can connect to a Metasploit listener and be upgraded to a meterpreter shell. The Impersonator Shell can also leverage native Windows API functions to grab a process and capture information about the token associated with the process.  People who attend this talk can expect to learn the inner mechanics of reverse shells and bind shells, Offensive Windows API use, and the basics of exploit coding in the C programming language all under the umbrella of the newly created Impersonator shell.
Speakers
avatar for Aleksa Zatezalo

Aleksa Zatezalo

Aleksa is a passionate security engineer, software developer, and aspiring open sorcerer. He enjoys writing and publishing software that provides elegant solutions to offensive security problems. He has contributed to multiple projects, including Metasploit. In April of 2022, Aleksa... Read More →
Friday February 7, 2025 2:00pm - 2:50pm MST
Track 2 - Penrose Lower Level I

3:00pm MST

Did You Knock Out Our [noun]?
Friday February 7, 2025 3:00pm - 3:50pm MST
How many times have you heard, "Are you doing anything right now that could [verb] our [noun]?" The answer is sometimes "Yes", always "Maybe", and hopefully "No". After a recent client call, I set up a range and hammered common web servers to figure out the impact that pentesting tools have on typical client systems. I tried to answer questions like, "Does Nuclei cause performance issues for the target?", "Is testssl.sh slowing down that Linux server?" "How many Gobuster threads does it take to max out a standard WordPress server?" In this talk, I'll discuss results from tool testing that may or may not surprise you but will definitely leave you with more evidence for your next client call.
Speakers
JV

Jack Verrier

Jack joined BHIS in 2024 as a security analyst, and loves that he gets to legally hack things with highly skilled people. Jack began working with computers when he was young. He built his first computer in middle school, taught computer repair during college, and has built racing... Read More →
Friday February 7, 2025 3:00pm - 3:50pm MST
Track 2 - Penrose Lower Level I