BH2021 #2
View Show IndexSegments
1. Automate Hacker Knowledge – Carolin Solskär – BH21 #2
The reason our founder started Detectify is that they wanted to automate hacker knowledge and make it scalable. This is very different from how most hackers work today and what we believe will revolutionize hacking.
This segment is sponsored by Detectify.
Visit https://securityweekly.com/detectify to learn more about them!
Guest
Carolin is the Community Manager for Detectify Crowdsource; an invite-only platform for ethical hackers. Detectify Crowdsource works differently from most bug bounty platforms; instead of hacking one company at a time, we focus on commonly used technologies, so that all companies using that technology can be protected.
Host
2. Dradis Community Edition BHUS21 Arsenal – Tabatha DiDomenico – BH21 #2
Dradis is an open source tool for information security pros that simplifies collaborating and reporting. Combine the output of different scanners, add your manual findings, centralize work across the team, and generate a report with a click.
Segment Resources:
https://www.blackhat.com/us-21/arsenal/schedule/#report-writing-is-half-the-battle-finish-your-report-in-less-time-and-get-back-to-hacking-24109
Guest
Tabatha DiDomenico leads marketing at the Dradis Framework and is a grad student studying Cybersecurity at the University of South Florida. Tabatha is engaged in the infosec community serving on staff with The Diana Initiative, Board Member with B-Sides Orlando, a serial infosec conference volunteer, advocate for diversity and inclusion in the industry, and has presented most recently at IntroSecCon 2021.
Hosts
3. Attacking & Defending Kubernetes Cluster – Eviatar Gerzi – BH21 #2
Eviatar will explain how they built two tools: Kubiscan and Kubesploit (the one Eviatar will show in the arsenal) to help red and blue teamers to make k8s more secured.
Guest
Eviatar Gerzi is a Sr. Security Researcher at CyberArk. He worked in a range of professions in the security industry (malware analysis, mobile hacking, etc.). During this time, he developed open-source projects (security tools). His projects include: Ketshash, Manifesto, KubiScan, Kubeltctl, and Kubesploit. His current research is on DevOps security, focusing on Docker and Kubernetes.
Host
4. PurpleSharp: Automated Adversary Simulation – Mauricio Velazco – BH21 #2
Defending enterprise networks against attackers continues to present a difficult challenge for blue teams. Prevention has fallen short; improving detection & response capabilities has proven to be a step in the right direction. However, without the telemetry produced by adversary behavior, building new and testing existing detection capabilities will be constrained. PurpleSharp is an open source adversary simulation tool written in C# that executes adversary techniques within Windows Active Directory environments. The resulting telemetry can be leveraged to measure and improve the efficacy of a detection engineering program. PurpleSharp leverages the MITRE ATT&CK Framework and executes different techniques across the attack life cycle: execution, persistence, privilege escalation, credential access, lateral movement, etc.
Segment Resources:
BlackHat 2020 Presentation: https://www.youtube.com/watch?v=yaeNwdElYaQ
Guest
Mauricio Velazco (@mvelazco) is a Peruvian, information security professionalwith more than a decade of work experience across different roles on both offensive and defensive security. In his current role as a Principal Threat Researcher on Splunk’s Threat Research Team, Mauricio focuses on adversary simulation and threat detection. Prior to Splunk, he led the Threat Management team at a Fortune 500 organization. Mauricio has presented/hosted workshops at conferences like Defcon, BlackHat, Derbycon, BSides, SANS, etc.
Host
5. Supply Chain Perils, Death by Security Alerts, SolarWinds & BlackHat 2021 – BH21 #2
Derek Johnson will be covering Matt Tait's keynote and another session on major supply chain attacks over the past year and how they're changing best practices in DFIR. Supply chain attacks and software interdependence are creating an existential crisis for the cybersecurity industry
XDR, automation and the growing need to solve the problem of Death by Security Alerts that make things like XDR and SIEM impractical for all but a handful of companies right now.
He will also talk about the SolarWinds lawsuit, because this week they just submitted their formal response in court, and it gets at an issue that I think is becoming more and more important: what if any legal standards or liability threshold should there be when companies with bad security practices get breached?
Finally, we will check in with Derek about what his thoughts are of his first experience at BlackHat!
Guest
Derek covers the federal government and its intersection with critical infrastructure and the private sector for SC Media. Prior to that he spent three years covering the intersection of cybersecurity policy and government for FCW.