Privacy & Net Neutrality Track
Deploying and protecting onion services
Systems Engineer based in Barcelona, EU. Currently working at torproject.org. In the past was part of the Information Security Group in the Department of Telematics Engineering at Universitat Politècnica de Catalunya (UPC) where got Ph.D. I research topics in the fields of privacy and anonymity and interested in online disinformation operations.
Una visión al día de la normativa europea de gestion de datos, personales o no.
Abogado, especializado en propiedad intelectual y derechos de autor , y gestor de conflictos. Es director del bufete Estudios Jurídicos. Obtiene su licenciatura por la Universidad de Barcelona y ejerce como abogado desde 1983 en las ramas de derecho civil, mercantil y comunitario; y como auditor informático desde 1997.
Abusos institucionales de los datos
Es un derecho que debería ser respetado tanto por parte de organismos públicos como privados. Se ha hablado mucho de los abusos con los datos personales por parte de Facebook y otras compañías privadas, pero en cambio, se han comentado poco los incumplimientos por parte de Administraciones públicas o instituciones, las políticas que socavan la privacidad del conjunto de la ciudadanía, los pequeños (o grandes) abusos cotidianos a los que se somete a las personas.
Simona Levi es directora de teatro, dramaturga, activista, estratega tecnopolítica, gestora y curadora cultural, artista multidisciplinar, investigadora, reportera y docente nacida en Italia, naturalizada española y afincada en Barcelona desde 1990.
Understanding and Hiding your Operations
Daniel Lopez Jimenez
Daniel has been focused on the penetration testing field since he finished his studies back in 2018. Currently he is a Security Consultant at NCC Group, where he delivers different kinds of security assessments and he collaborates developing tools for the Full Spectrum Attack Simulation (FSAS) team, in charge of delivering Red Teaming exercises around the world, has been pretty involved in the security community. He is a regular speaker in security conferences, mainly focused on enterprise security and Red Team operations.
Advanced fuzzing workshop
The workshop has a practical orientation so that attendees get a chance to learn by themselves and use their acquired knowledge. The format of the workshop will be a CTF (Capture-the-flag).
Also show real vulnerabilities that I have found during the last year, as well as how I've used fuzzing to find them. Such bugs will serve as a starting point for the rest of the workshop.
- Basic knowledge of fuzzing
- Working knowledge of C programming
- Command-line basics
- Bug hunting experience is desirable
Covers different fuzzing topics, including the following:
- Sanitizers (ASAN, UBSAN, MSAN, etc.)
- Custom coverage and efficient instrumentation
- Dictionaries optimization
- Dealing with checksums, ciphers, and other monsters
- Structure-aware fuzzing & Custom Mutators
- Domain-specific feedback (FuzzFactory)
- Parallel fuzzing and Mutation scheduling
Antonio Morales works as a security researcher at GitHub Security Lab, whose primary mission is to help improve Open Source project's security. Antonio's interests include fuzzing, code analysis, exploit development, and C/C++ security
Scaling detection with osquery + osctrl
None of the secret sauce is actually secret, since it’s still open source!
Osquery (https://osquery.io) is an open source tool, originally developed by the Facebook Security team and currently managed by its own community as part of the Linux Foundation. It allows you to run a SQL engine on top of your operative system, and to use SQL queries to extract information about the health state and changes of the systems in your networks. This tool enhances the incident response capabilities of a Security team and it is important to understand the differences between the osquery shell (osqueryi) and the osquery daemon (osqueryd) and how to use them in a large enterprise network. In particular the remote API of osquery.
Understanding well how the osquery remote API works is the first step to build scalable software around it. We will discuss the approach to go from just a few nodes to dozens of thousands while keeping everything working smoothly. None of the secret sauce is actually secret, since it’s still open source!
A solution to enhance the detection capabilities of osquery is osctrl (https://osctrl.net), a fast and efficient osquery management solution, that implements its remote API as TLS endpoint, and allows to monitor, configure and interact with all your production or corporate assets, that use osquery as host instrumentation solution.
Osctrl has been used in corporate and production environments with thousands of nodes, thanks to its ability to scale and provide a reliable solution. Its particular architecture is key to scale, whether the environment is cloud, virtualized, container based or even bare metal.
Javier is an experienced Security Engineer and Systems Architect with extensive experience in both well established corporations and startups. In the last 10+ years he has applied the expertise acquired in the field of software and systems engineering, towards building offensive and defense capabilities for some of the top companies in the world. His passion for Linux and open source has been reflected by his contributions to large projects, such as osquery, and recently with the creation of osctrl, a scalable and modular TLS endpoint for osquery assets.
Hardware Keyloggers around the world
Joel Serna Moreno
Los asistentes podrán ver los diferentes keyloggers comerciales y el desarrollo de keyloggers propios más avanzados y específicos, usando hardware de bajo coste, con el fin de desarrollar dispositivos keyloggers con otras funcionalidades añadidas: hacking WiFi, BadUSB, ADB, etc.
Durante la charla se mostrará el proceso del desarrollo de un keylogger de hardware (DIY) básico, usando la memoria EEPROM para almacenar las teclas presionadas, explicando el funcionamiento del mismo y el uso de las teclas/modificadores.
Finalmente se mostrará el desarrollo de un keylogger más avanzado, un dispositivo multi-uso capaz de actuar como un keylogger de hardware, capaz de almacenar las teclas presionadas en una tarjeta MicroSD y tener el control del dispositivo mediante una comunicación inalámbrica (WiFi). El dispositivo también tendrá otras funciones (hacking wifi, badusb, ejecución de comandos ADB, etc).
Ponente con experiencia en congresos como Noconname, CCN-CERT, C1b3rwall, Mundo Hacker Day, Dragonjar, Rooted, Navaja Negra, h-c0n, eastmadhack, etc; y varias universidades nacionales
Attacking Big Data Land
If you're running engagements, this should also give you a headstart on what to look for, how to attack networks where these products are running along with a few good ways to make them more defendable. Because if you want to defend well, you need to optimize towards mitigating actual risk vs theoretical, and there's no better way to determine if attacks are real than trying them out yourself. Let's say you just want to better understand how to shell out on servers running Apache Cassandra, Drill, Mesos... well, it may add a few pages to your playbook.
Jeremy is a security professional largely focused on offensive security along with vulnerability research and automation. He has gained extensive software security experience working at software and service companies, large and small, for over a decade as well as publishing research in the security community. He has taken the opportunity to gain expertise in many different areas including bug hunting, app/prod/infra security, fuzzing, as well as breaking cloud and web services.
Unrelocating Windows modules in memory dumps
Ricardo J. Rodríguez
To minimize the avalanche effect, similarity digest algorithms allow an analyst to compute a similarity score of inputs that can be slightly different. In this talk, we focus on the issues caused by relocation of Windows processes and system libraries when computing similarities between them and introduce two methods (Guided De-relocation and Linear Sweep De-relocation) to pre-process a memory dump.
The goal of both methods is to identify and undo the effect of relocation in every module contained in the dump, providing sanitized inputs to similarity digest algorithms that improve similarity scores between modules. Both methods have been integrated in a Volatility plugin and evaluated them in different scenarios, showing the practicability of our approach.
My Google Scholar is accessible in https://scholar.google.es/citations?user=HlQC1OcAAAAJ&hl=en ,while my publications are available in https://webdiis.unizar.es/~ricardo/publications/
I’ve experience in other CONs such as several past editions of NcN, RootedCON, HackLU, HackInParis, HITB Amsterdam, among others. My research interests span over program binary analysis and forensics.
Istio is BKF (best kubernetes friend)
En este taller se busca enseñar los conceptos base de la cultural secdevops en entornos cloud native con kubernetes e istio como service mesh para securizar pods.
Antonio Juanilla es desarrollador de software, amante del hacking y la ciberseguridad en los ratos libres, con una mente “inquieta” y fuertemente involucrado con las nuevas tecnologías. Co-Organizador de las comunidades de HackMadrid %27 y HackBarcelona %27, defensor de la democratización de la tecnología para mejorar sociedad, Speaker en los diferentes eventos de ciberseguridad de España y Latam.
Explorations in Wireless cracking techniques
Michael Saine and Juan Wilson
This talk will finish with a frank discussion of the appropriate attack vectors this device can provide, within the context of attack vectors and ways to mitigate the probable/possible damages and discuss the training of the next generation of young future security personnel, WHO is training them, and why aren’t we starting now?
Michael Saine has a 4.00 MS degree with honors in Cybersecurity from University of Maryland College (2020) with a myriad of different industrial certificates. He was most recently published in the 2020 ITSN Journal Publication.
Enrique Wilson is a 9 th grader and future aspiring Ethical Hacker
Pete Herzog and Xavi de la Iglesia
We applied AI and a meta research approach correlating the research on sound, music, behavioral psychology, and the physical effects of frequencies to determine a template for creating constructive music with a purpose. We will walk you through our findings and provide examples of the music we created according to these templates.
Understanding what’s in your music is almost as important as knowing what’s in your food. We know how important sound is in movies for building the atmosphere but few people recognize how what’s in their music can also affect their behaviors. And there’s no patch for it.
XAVI DE LA IGLESIA Músic, compositor, lletrista i il·lustrador de Barcelona. Co-fundador de Invisibles. Fundador, compositor, lletrista i productor de Blaumut.
PETE HERZOG Hacker, Discrete Problem-Solver, Straight-shooter. Co-founder of Invisibles, ISECOM, Urvin.AI, and Akiya Research. Creator of the OSSTMM and Hacker Highschool. Five-time speaker at RSA San Francisco, regular Keynote speaker at security conferences, and Security Trainer. Advisor at NATO, Blackberry/Cylance.