BSidesDFW
BSidesDFW
  • 65
  • 8 172
I Knew You Were Trouble
BSidesDFW 2024 Track 1 Session 3 - 02 Nov 2024
I Knew You Were Trouble
This presentation unfolds a narrative of how a single OSINT pivot, a SHA-1 hash of a TLS certificate, unraveled a network of Lockbit Cobalt Strike servers. Beginning with an unexpected discovery during research on Blackcat ransomware investigation, the talk will highlight how a single pivot led to the identification of 44 related IP addresses and the nexus of domains managed by a single entity—shedding light on operational patterns, missteps, and mishaps.
@jbeley
Jeff has nearly 30 years of cybersecurity experience working with Fortune 500 organizations. He has led some of the largest nation state investigations - to include cyber espionage, critical national infrastructure, and cyber criminal ransomware cases and is currently a Senior Manager and Global lead investigator with Accenture Security's customer facing incident response team, working with Accenture's largest clients, to investigate and remediate latent and persistent cybersecurity threats. Jeff oversees teams of investigators and threat hunters, leading nation state cyber espionage investigations, threat actor eradication, and destructive ransomware response and recovery efforts.
*Jeff's current role entails making artisan Taylor Swift GIFs, chatting with various AI models and consulting law enforcement on breaches of national importance and his team's work has led to a number of convictions of threat actors at the behest of some Accenture's largest clients. Jeff's incident response themed cocktail recipes are legendary pain relievers.*
มุมมอง: 12

วีดีโอ

EMS and IR Professionals Have a Lot More in Common Than Just a Bunch of Acronyms
มุมมอง 232 ชั่วโมงที่ผ่านมา
BSidesDFW 2024 Track 2 Session 2 - 02 Nov 2024 EMS and IR Professionals Have a Lot More in Common Than Just a Bunch of Acronyms EMS and IR professionals are the "first responders" to incidents that people never want to happen. Whether the incident is a ransomware infection at your local hospital; or a respiratory infection caused by a virus that spreads through the air; the people on the front ...
Oh Crap, Do I Need a CNAPP?
มุมมอง 94 ชั่วโมงที่ผ่านมา
BSidesDFW 2024 Track 1 Session 2 - 02 Nov 2024 no sound for first 2 minutes Oh Crap, Do I Need a CNAPP? In the rapidly evolving world of cloud security, Cloud Native Application Protection Platforms (CNAPPs) have emerged as comprehensive solutions for safeguarding cloud environments. However, the term is often misunderstood, leading to confusion about what a CNAPP truly entails and whether it i...
Switch to Pole Position: What OT Security can achieve by changing the game.
มุมมอง 107 ชั่วโมงที่ผ่านมา
BSidesDFW 2024 Track 3 Session 1 - 02 Nov 2024 Switch to Pole Position: What OT Security can achieve by changing the game. Security is stuck being the knife in a gunfight. Instead, it should be an enabler of reliable and efficient operations, even safety. This presentation outlines how to get OT Security to Pole Position in the game that really matters. Vivek Ponnada Vivek Ponnada, currently a ...
The Art of Networking
มุมมอง 499 ชั่วโมงที่ผ่านมา
BSidesDFW 2024 Track 2 Session 1 - 02 Nov 2024 The Art of Networking You have heard that, "It's who you know that matters most", "Networking is a natural behavior", "You should network when you need it" If I tell you that all this is a big lie, would you be willing to listen to the truth ? What if I showed you the art of networking would you be willing to practice it? If the answer is yes, then...
Do you know where your secrets are? Exploring the problem of secret sprawl and management maturity
มุมมอง 47ปีที่แล้ว
BSidesDFW 2023 Track 1 Session 5 - 04 Nov 2023 Do you know where your secrets are? Exploring the problem of secret sprawl and secret management maturity Do you know what Uber, CircleCI, and Toyota all have in common? They had hardcoded credentials in their environments, which led to either a public leak or enabled an attacker to expand their footprint during a breach. It is easy to understand w...
You're In... Now what? A LotL discussion
มุมมอง 43ปีที่แล้ว
BSidesDFW 2023 Track 1 Session 3 - 04 Nov 2023 You're In... Now what? A LotL discussion You did it! You cracked the perimeter (legally of course) and are now staring at a fresh new shell. Now what? Join me for a discussion on Living off the Land (LotL) techniques to up your post exploit game. Scenarios for Windows (desktop server), NIX, and cloud (AWS Azure) will be explored. @rhodejo
Let Me In!!! An Overview of RFID Badge Systems and Attacks
มุมมอง 155ปีที่แล้ว
BSidesDFW 2023 Track 1 Session 3 - 04 Nov 2023 Let Me In!!! An Overview of RFID Badge Systems and Attacks A comprehensive overview of the RFID badge system technology currently in the wild, and how to attack those systems. @techemiiily
White Phoenix: Beating Intermittent Encryption
มุมมอง 60ปีที่แล้ว
BSidesDFW 2023 Track 1 Session 2 - 04 Nov 2023 White Phoenix: Beating Intermittent Encryption This presentation explores the emerging trend of intermittent encryption in ransomware attacks. Intermittent encryption is a technique where only certain parts of targeted files are encrypted, allowing attackers to impact more files in less time. The flaws and vulnerabilities of this approach are analy...
What the smish!?
มุมมอง 492 ปีที่แล้ว
BSidesDFW 2022 Track 2 Session 8 - 05 Nov 2022 What the smish!? Globally, we are seeing a drastic increase in smishing attempts. This will cover lessons learned while trying to identify methods of takedown, attempting to work with telco providers to identify the groups behind this, and best practices for prevention. @drb0n3z Steven is a technology and cyber risk leader who currently serves as t...
Minimizing AWS S3 bucket attack vectors at scale
มุมมอง 2552 ปีที่แล้ว
BSidesDFW 2022 Track 1 Session 8 - 05 Nov 2022 Minimizing AWS S3 bucket attack vectors at scale AWS provides services and third-party solutions, such as AWS Macie and Trend Micro, that can help us secure our S3 buckets and associated components. Macie is a fully-managed data privacy and data security solution that provides customizable alerts and findings on sensitive data found in S3. The down...
Effective DFIR Triage Techniques to Detect Modern Rootkits
มุมมอง 1552 ปีที่แล้ว
BSidesDFW 2022 Track 2 Session 7 - 05 Nov 2022 Effective DFIR Triage Techniques to Detect Modern Rootkits The wealth of data available to incident response handlers during breach investigations is often overwhelming to both junior and senior analysts alike. Depending on the IT maturity of the victim organization, this data can range from days to months of forensic data acquired from hard drives...
Visual Badge Forgery
มุมมอง 542 ปีที่แล้ว
BSidesDFW 2022 Track 2 Session 6 - 05 Nov 2022 Visual Badge Forgery @jacenrkohler
Cybersecurity Imposter Syndrome and Burnout
มุมมอง 862 ปีที่แล้ว
BSidesDFW 2022 Track 1 Session 6 - 05 Nov 2022 Cybersecurity Imposter Syndrome & Burnout A panel discussion of 3-4 people with pre-outlined questions specifically on how they have/have not experienced imposter syndrome specific to cybersecurity/hacking, what portions of that may be due to diversity or specifically cybersecurity/hacking niche, and how to not just get into security but stay in se...
Broken Access Control How to Protect Your APIs Against the World's Top Vulnerability
มุมมอง 752 ปีที่แล้ว
Broken Access Control How to Protect Your APIs Against the World's Top Vulnerability
Routers HATE This One Neat Trick Exploiting Cisco Smart Routers HATE This
มุมมอง 1772 ปีที่แล้ว
Routers HATE This One Neat Trick Exploiting Cisco Smart Routers HATE This
Rosetta 2 Keeping Mac Malware Alive for Years to Come
มุมมอง 2232 ปีที่แล้ว
Rosetta 2 Keeping Mac Malware Alive for Years to Come
Purple Teaming Cloud Identity Simulation Labs for Red and Blue teams
มุมมอง 1742 ปีที่แล้ว
Purple Teaming Cloud Identity Simulation Labs for Red and Blue teams
Intro to API Hacking
มุมมอง 2312 ปีที่แล้ว
Intro to API Hacking
Container Crisis 3 More Containers More Problems
มุมมอง 672 ปีที่แล้ว
Container Crisis 3 More Containers More Problems
Unraveling the Russian Snake Turla
มุมมอง 2642 ปีที่แล้ว
Unraveling the Russian Snake Turla
HTTP and De-Sync Attacks
มุมมอง 1543 ปีที่แล้ว
HTTP and De-Sync Attacks
Hashcat and Survivorship Bias: Cracking uncommon passwords
มุมมอง 1993 ปีที่แล้ว
Hashcat and Survivorship Bias: Cracking uncommon passwords
Credential Compromise: Well what Now?
มุมมอง 413 ปีที่แล้ว
Credential Compromise: Well what Now?
Automated Triage Collection at Scale in the AWS Cloud
มุมมอง 1043 ปีที่แล้ว
Automated Triage Collection at Scale in the AWS Cloud
First Contact with Container Security
มุมมอง 303 ปีที่แล้ว
First Contact with Container Security
PowerShell's Return to Power
มุมมอง 423 ปีที่แล้ว
PowerShell's Return to Power
Protecting the penguin! Linux security as amour!
มุมมอง 283 ปีที่แล้ว
Protecting the penguin! Linux security as amour!
Personal Security Preparedness & Risk Management for All
มุมมอง 303 ปีที่แล้ว
Personal Security Preparedness & Risk Management for All
Just Because It's Crazy Doesn't Make It Wrong: Bringing Your Hacker POV to the Election
มุมมอง 1383 ปีที่แล้ว
Just Because It's Crazy Doesn't Make It Wrong: Bringing Your Hacker POV to the Election

ความคิดเห็น

  • @joshuawlawson
    @joshuawlawson ปีที่แล้ว

    Great talk! Thank you!

  • @muio
    @muio ปีที่แล้ว

    Idea flowing, thank you for the demo.

  • @binarywasp
    @binarywasp ปีที่แล้ว

    I know that guy! 😊

  • @jonathanthoresen7646
    @jonathanthoresen7646 ปีที่แล้ว

    Let Me In!!!!

  • @Escalon-
    @Escalon- ปีที่แล้ว

    very informative thank you:)

  • @willemvdk4886
    @willemvdk4886 2 ปีที่แล้ว

    Ah what a bummer, no slides...

  • @poisonouscupcakes
    @poisonouscupcakes 2 ปีที่แล้ว

    Or at least link to the slides?

    • @jamycasteel1561
      @jamycasteel1561 2 ปีที่แล้ว

      Hey. I'm not sure what happened with the slides and the video. I also think that my other comment got removed because it had a link, but the slides are linked from my Twitter and LinkedIn. My name is my username on both services.

  • @sabyasachisahoo8975
    @sabyasachisahoo8975 2 ปีที่แล้ว

    Hello BSides,1st thanks for uploading this video,, but could you please recheck this video,because the slides are not visible..could you please reupload the video with correct format. Thanks

    • @jamycasteel1561
      @jamycasteel1561 2 ปีที่แล้ว

      Hey. I'm not sure what happened with the slides and the video. I also think that my other comment got removed because it had a link, but the slides are linked from my Twitter and LinkedIn. My name is my username on both services.

  • @mohamedelbaz9288
    @mohamedelbaz9288 2 ปีที่แล้ว

    you're awesome 🌷

  • @sydneyhutchison6692
    @sydneyhutchison6692 3 ปีที่แล้ว

    Great video!!

  • @JohnnyCiocca
    @JohnnyCiocca 3 ปีที่แล้ว

    I felt a little bit dissapointed because the title says "modular approach to penetration testing" but the presentation in itself talks about OSINT - but still gave a thumbs up because this is beautiful <3 would love to see some more about actual pentesting and red teaming on Jupyter Notebooks!

  • @datashark7048
    @datashark7048 4 ปีที่แล้ว

    Going all the way from the basics of Jupyter has been helpful. Definitely an underrated tool. I can already see myself using Jupyter for our pen tests.

  • @dozieprosper1651
    @dozieprosper1651 4 ปีที่แล้ว

    all doubts are cleared.all thanks to this great hacker anonymoushack he got me 6btc +14782076047 WhatsApp,Instagram all doubts are cleared.all thanks to this great hacker anonymoushack he got me 6btc +14782076047 WhatsApp,Instagram

  • @dozieprosper1651
    @dozieprosper1651 4 ปีที่แล้ว

    all doubts are cleared.all thanks to this great hacker anonymoushack he got me 6btc +14782076047 WhatsApp,Instagram all doubts are cleared.all thanks to this great hacker anonymoushack he got me 6btc +14782076047 WhatsApp,Instagram

  • @ferasdour
    @ferasdour 4 ปีที่แล้ว

    Woot proud texans!