AISA Australia Cyber Conference – Security & Hacking

AISA Australia Cyber Conference – Security & Hacking

On October 10 & 11 I was lucky enough to attend AISA Cyber Conference. This was a security focused conference with someone for all levels.
What an eye opener on many levels, but also I’m not surprised.
I took lots of notes and below is a summary of insights and links I collected or researched as follow up. Where possible, I have provided video links to the sessions/talks – so you get the full context.
I learnt so many things – something from every session.

Click, explore and learn

TLDR; for the best of

  • for techs/architects – Exploring the DevSecOps Toolchain
  • for Management/HR/Recruitment – Hacking the Skills Gap
  • for AWS builders – Serverless From F to A+

Opening Keynote

Speaker – Greg Touhill https://www.linkedin.com/in/gregorytouhill

The Future Impact of AI on Cybercrime

Speaker – Dave Palmer https://www.linkedin.com/in/davepalmersecurity/

  • YouTube link to the same talk/different location https://youtu.be/ooPOOs7Y7lk
  • Ambient surveillance
  • is high risk and received low attention. May not be on the radar of the InfoSec team, and AV suppliers are less inclined about security
  • Attack the Edge
  • IOT; Where none IT control the infrastructure (think submersibles and sailors)
  • it is outside the traditional security perimeter
  • likely not ready/capable of running anti-virus software for example
  • Ransomware/encryption is becoming less effective, the next thing criminals/APT will be after is DATA INTEGRITY and attacking the Information Supply Chain
  • Big enterprises rarely pay ransomware anymore. Regular backups are winning the war here. But Small/Medium Enterprise (SME) may be more at risk due still as they may not have current data. Its an economics equation, backups cost money, and sometimes they consider the ransom price to be cheaper.
  • Little Bing / Xiao-ice https://en.wikipedia.org/wiki/Xiaoice, pronouced ‘shao-ice’ is AI system developed by Microsoft STCA in 2014 based on emotional computing framework. Instead of criminals setting up call centres to help you buy Bitcoins for your ransomware payments (who does this anyways!), crims can now use smart chat bots to smooth out the processes and reduce costs.
  • https://sociable.co/technology/microsofts-little-bing-ai-evoking-love-in-chinas-lonely-hearts/
  • Tools
  • American fuzzy lop http://lcamtuf.coredump.cx/afl/ is a security-oriented fuzzer for binaries
  • Microsoft Security Risk Detection
  • Windows and Linux (sign-up required) https://www.microsoft.com/en-us/security-risk-detection/ Upload binaries (yours or others!), run fuzzers, identify bugs, get a bug report – then fix bugs
  • MSFT Security Risk Detection in practice – video https://www.youtube.com/watch?v=kRCCLtDF_Z4
  • Dave Palmer works at https://www.darktrace.com/en/, AI network immune system and threat detection software

Embracing the Rise of DevSecOps

Speaker – Jameson Cooke https://www.linkedin.com/in/jameson-cooke-52a69948/

Hacking the Skills Gap

Speaker – Jane Frankland https://www.linkedin.com/in/janefrankland/

Cyberwarfare and the Journalist

Speaker – Ben Makuch – https://www.vice.com/en_au/contributor/ben-makuch

Popular Misconceptions about Security and Cybercrime

Speaker – Brian Krebs https://twitter.com/briankrebs

Exploring the DevSecOps Toolchain

Speaker – Eric Johnson https://www.sans.org/instructors/eric-johnson

SOC – How to

Speaker – Gavin Reid https://www.linkedin.com/in/gavinsreid/

Ruin your life feat. Google Chrome

Speaker – Sam Reid https://www.linkedin.com/in/sreid11

  • How Google Chrome extension with too many permission (read/write all) can be really dangerous
  • demo'd a Bitcoin extension, with full perm's, which when logged in, created API keys on btcmarkets.net, which then did a blind transfer of all currency from his account.
  • He developed https://github.com/sudosammy/chrown – Chrown – A Google Chrome Extension Exploitation Framework – easy to make Chrome extensions for submission to google. Like a boilerplate for Chrome extensions. Written to handle V2 Manifests (current)
  • Chrome background permission allows Chrome to start up system login and persist until system log off, all without opening Chrome (unless explicitly Chrome/Exit)
  • BeEF – Browser Exploition Framework https://blog.beefproject.com/ – like Kali Linux or Metasploit for browser extension
  • provides a Persistent Man in the Browser attack – demo'd how to hook and then get a shell on the victim
  • Demo'd how even just browser to Facebook, he got user/password in plain text
  • Demo'd how using a 'decoy' LastPass, even if the user just types on the screen, without pressing Enter, he still got the keystrokes
  • Allows hardware control, like webcam and screen shot as well.
  • https://www.youtube.com/watch?v=GNBSEbn9tEc BeEF – How to link/hook a browser with BeEF – this is an eye opener.
  • https://docs.kali.org/general-use/starting-metasploit-framework-in-kali Kali / Metasploit
  • Inspiration – BlackHat 2012 – https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Osborn
  • Defending against this;
  • Disable installation of Extension in Group Policy
  • Lock the installation folder with folder permissions
  • (Hope) Googles static code analysis will get better – fast
  • The key message I took from this was, like all apps, check the permission we grant them – anything with 'too much' may not be good for your health
  • Yes, he still uses Chrome (and Firefox)
  • Incognito is a good way to not run extensions (must be allowed to run in Incognito mode)

Voice of the Customer Analytics

Speaker – Tom McMeekin – AWS Solution Architect https://www.linkedin.com/in/tommcmeekin

AWSUG Forum talk / sub stream of Cyber Conference

Serverless From F to A+

Speaker – Chris Coombes – https://www.linkedin.com/in/chriscoombs/

AWSUG Forum talk / sub stream of Cyber Conference