Missed DEF CON 32? Don’t Worry, We’ve Got You Covered! 

Posted August 27, 2024 by Sayers 

If you couldn’t make it to Las Vegas for DEF CON 32 and braving the sweltering 110+ degree weather wasn’t in the cards, don’t sweat it—literally! The Sayers Engineering team has all the highlights for you, and no SPF 50 required. 

What is DEF CON? 

DEF CON is not your typical cybersecurity conference. Unlike Black Hat, which focuses heavily on enterprise cybersecurity, DEF CON is a creative hacking conference that brings together a broad and diverse community. Here, the content is more accessible and geared towards the curious mind—individuals who enjoy delving deep into how things work and figuring out how to compromise them, not out of malice, but out of a sense of curiosity and the drive to prevent potential threats. The emphasis at DEF CON is on responsible disclosure and collaboration to enhance security, rather than causing disruption. 

The Venue

This year, DEF CON moved to the Las Vegas Convention Center’s West Hall, a stunning and modern facility. Although not the originally planned venue, it turned out to be the best location yet. Having all sessions and events under one roof made the experience more streamlined for the 30,000+ attendees, with shorter lines (LineCon) and ample seating in most sessions. 

Unique Features of DEF CON

Unlike other conferences, DEF CON doesn’t have a traditional vendor expo hall. Instead, it offers a variety of “villages” that cater to specific interests, ensuring there’s something for everyone. These villages provide hands-on workshops, contests, communities of similar interest, workshops, and much more where you can dive deep into learning, collaboration and putting your skills to the test.  For those who thrive on competition, DEF CON’s extreme Capture the Flag (CTF) events offer challenges in various areas and skill levels, keeping participants fully engaged. 

Car Hacking Village

One of the standout villages this year was the Car Hacking Village, which featured not only a Tesla but also a Rivian and a Freightliner Semi-Truck, provided by Sayers client Saia. This village highlighted a growing trend: companies collaborating with the hacking community to rigorously test their business systems. This cooperative approach is a win for both sides, leading to more secure outcomes. More organizations should adopt this proactive stance. 

Our Top Talks 

Below is a sample of our favorite talks, categorized by topic: 

Cloud   

Bucket Monopoly: Breaching AWS Accounts Through Shadow Resources 

Aqua Security hosted a great presentation around what they are dubbing “Bucket Monopoly”. The concept is surprisingly simple but affected the following services: CloudFormation, Glue, EMR, SageMaker, ServiceCatelog, and CodeStar. When using these services, a “shadow” s3 bucket is created automatically, who’s naming convention is predictable. The fascinating part is the service interaction when the bucket is already created. This could be by the organization, or a nefarious actor. If an attacker were to create the bucket following the predictable naming convention for CloudFormation and open it publicly, then an organization’s service would in fact place a CloudFormation template in the bucket which then could be altered in whatever way an attacker wanted.  

Links:  Aqua Security’s Blog Post  

Kicking in the Door to the Cloud: Exploiting Cloud Provider Vulnerabilities for Initial Access 

Nick Frichette at Datadog highlighted vulnerabilities that deal with AWS’ AssumeRole that can lead to nefarious cross-account access. The more recent expansion on this is through Cognito Identity pool and AssumeRoleWithWebIdentity. An attacker can generate their identity token that is necessary in the AssumeRoleWithWebIdentity API call, then by utilizing a misconfigured role trust policy be able to provide the ARN of the role in the victim account. The result would be that an attacker would have access to all the resources with which the role had privileges. It is important to add Condition Keys such as aws:SourceArn or aws:SourceAccount among others to tighten down AssumeRole. 

Links: PresentationAmplified Exposure | Confused Deputy Vulnerability 

General Security 

Atomic Honeypot: A MySQL Honeypot That Drops Shells 

Alexander Rubin and Martin Rakhmanov from AWS delivered a talk on MySQL honeypots that are capable of dropping shells on attacking systems. By using a fake MySQL server, the researchers were able to utilize MySQL client RCE’s CVE-2023-21980 and CVE-2024-21096 to gain access remote access that can attack and stop bots/attackers. 

Links: PresentationCVE-2023-21980 | CVE-2024-21096 

Breaking Secure Web Gateways (SWG) for Fun and Profit 

SquareX founder Vivek Ramachandran highlighted and demonstrated attacks that can bypass even the most popular Secure Web Gateways.  Utilizing Last Mile Reassembly attacks, even the most common malware can slip through to an end user’s computer undetected. According to SquareX, “a Last Mile Ressebly Attack refers to a type of cyberattack where the malicious components are assembled directly in the victim’s browser from seemingly non-malicious data”1. Vivek even showcased a site where Organizations can test their current security against this style of attack at https://browser.security/ .  

Links:1 https://sqrx.com/lastmilereassemblyattacks | browser.security | Session Overview 

The XZ Backdoor Story 

One of the most famous security stories of 2024, revolving around the XZ Utils and subsequent research surrounding the project. Thomas Roccia a Senior Threat Research at Microsoft highlights his journey from the discovery and timeline to what it means for the security industry.  

Links: Presentation  

Miscellaneous Talks 

Bioterrorism with Maxael Swan Laufer – Standing Ovation! 

Links: Presentation 

AI Hacking at a Casino with Harriet Farlow 

Links: Presentation 

Laundering Money From Laundry Machines with Michael Orlitzky 

Links: Presentation Recording     

The Pwnie Awards Most Epic Fail goes to Crowd Strike – Professionally accepted! 

Links:  N/A

Behind Enemy Lines: Going Undercover to Breach the LockBit Ransomware Operation  

Author and Chief Security Strategist John DiMaggio gave a fantastic firsthand account on infiltrating the LockBit crime syndicate. LockBit was the most deployed ransomware variant in 2022, going so far as to operate as a Ransomware-as-a-Service(RaaS) model. John went on to publish Ransomware Diaries series that is well worth the read.    

Links: Presentation | Ransomware Diaries Vol 1 | Understanding Ransomware Threat Actors: LockBit  

Smishing Smackdown: Unraveling the Threads of USPS Smishing and Fighting Back 

One of my personal favorite talks of DEF CON this year, Grant Smith highlights how he hunted down the Smishing Triad network that sends up to 100,000 texts per day globally. In total, over 438,000 unique credit cards were identified through Smith’s research. The journey from a simple USPS phishing text to uncovering a massive operation is well worth the read/watch.  

Links: Presentation | Wired Article 

    Addresses

  • Atlanta
    675 Mansell Road, Suite 115
    Roswell, GA 30076
  • Boston
    25 Walpole Park South, Suite 12, Walpole, MA 02081
  • Rosemont
    10275 W. Higgins Road, Suite 470 Rosemont, IL 60018

 

  • Bloomington
    1701 E Empire St Ste 360-280 Bloomington, IL 61704
  • Chicago
    233 S Wacker Dr. Suite 9550 Chicago, IL 60606
  • Tampa
    380 Park Place, Suite 130, Clearwater, FL 33759

Have a Question?

Subscribe Contact us