Uncategorized
Thursday, December 10th – 6:12pm @ Virtual
Happy December Hackers !!
This month we have a special remote guest all the way from Chennai! I for one am ready to be enthralled by black art of virtual machine management!
Setting up a Pentesting Lab with Vagrant
Vagrant is a tool that helps with the management of virtual machines. In this talk, we will explore what is, why Vagrant, some Vagrant basic commands and Vagrant features like scaling and provisioning.
We will end the talk by setting up the pentesting lab using the Vagrant. By the end of the talk, the attendees can able to understand the basics of Vagrant.
About Our Speaker – @joshva_jebaraj
Joshua Jebaraj is a student currently pursuing his undergrad at Vellore Institute of Technology Chennai. He is an active member of many open-source communities like Null, Ansible and Hashicorp He frequently speaks at the @nullchennai chapter and #OwaspVITChennai.
He has also spoken at conferences like Owasp-Seasides, Bsides-Delhi and Open-Security-Summit. He also holds a certification for CDP. When away from the screen he can be found watching movies and making memes
– @nightmareJS
Thursday, November 12th – 6:12pm @ Virtual
Hello hackers!
This month we will have our heads in the clouds as Yoni Leitersdorf performs a live demo of 5 days’ worth of research into non-traditional cloud hacking:
Oftentimes, when we think about protecting resources in the cloud, we immediately think about the typical ways in – via public-facing applications or abuse of credentials. In this talk, we will look at one additional way: through the work unit parameters of a service. During the development of Indeni’s Cloudrail SaaS product, Yoni was responsible for trying to find ways to hack into the service. One of the ways he found, raises questions about how secure ECS workloads really are.
As usual these past few months, we will be meeting online at https://cafe.cyberia.club/dc612.
— TactiFail
Thursday, October 8th – 6:12pm @ Virtual
Hello hackers!
Look around your workspace – do you have a wireless keyboard or mouse? If so, maybe power them off while @FreqyXin is around:
Mousejack and its associated wireless HID attack surface came to notoriety a few years ago, with the help of some exceptionally cheap hardware, and Bastille Labs’ eye-catching web site. The risk that users could be attacked through their wireless mouse or keyboard from major manufactures, certainly rattled more than a few CISOs. During this chat we will talk about Mousejack and the resulting corporate response, from my first chance exposure to the device as an intern, through to being offered a position to lead internal pen testing for uncovering massive exposure within an organization. This is essentially the story of how I broke into the security industry –while still in college, with tales of technical triumphs and hacker pranks for both red and blue team to enjoy.
Always love a good prank, can’t wait!
As usual these past few months, we will be meeting online at https://cafe.cyberia.club/dc612.
— TactiFail
Thursday, September 10th – 6:12pm @ Virtual Only
Hello hackers!
Last month, DefCon had its first-ever fully-online, widely-distributed, fault-tolerant, canceled conference. There were some hiccups, but overall things went smoothly. While we are hopeful that it won’t need to be virtual again in the future, it was undeniably a unique experience.
This month, we have a special guest speaker who has given several talks at DefCon and other conferences, instructs for SANS, and knows a thing or two about Kerberoast. You may know him as none other than Tim Medin!
Tim will be presenting on various Kerberoast attacks and defenses:
Kerberos, besides having three heads and guarding the gates of hell, protects services on Microsoft Windows Domains. Its use is increasing due to the growing number of attacks targeting NTLM authentication. Attacking Kerberos to access Windows resources represents the next generation of attacks on Windows authentication. In this talk Tim will discuss his research on new attacks against Kerberos, including a way to attack the credentials of a remote service without sending traffic to the service as well as rewriting tickets to access systems. He will also examine potential countermeasures against Kerberos attacks with suggestions for mitigating the most common weaknesses in Windows Kerberos deployments.
Whether you are an attacker or a defender, or just a curious hacker, or all three, this is not to be missed.
As usual these past few months, we will be meeting online at https://cafe.cyberia.club/dc612.
— TactiFail
August 2020 – DC612 is Canceled!
Hello Hackers!
As most of you have probably gleaned, DefCon is canceled. For real. Sort of.
Since DefCon is moving to a virtual-only SafeMode this year, things are a little different to say the least. Nobody really knows what it will be like. Will there be connection issues? A DDoS? Will DNS stop working? Probably all of them at once if we’re being honest.
This is definitely a unique situation to find ourselves in, and one that will hopefully not repeat in 2021. As such, we are encouraging everyone to experience it in its fullest (if you are able) and we will not be having a DC612 “meetup” like we normally would in Vegas. Take this time to see what works and what doesn’t, what needs improvement, and maybe take some notes for our future virtual meets.
With luck, masks, and common sense, we’ll see you all in-person next year. But hopefully sooner. But probably not. Expect a September virtual meeting to be planned as usual.
— TactiFail