This year I was extremely lucky to be able to sit the awesome SecEDU Bsides bus again! Not only that, I was sponsored by MercuryISS for travel, accomodation and food costs — Thanks Edward and Alexi!
This year’s venue at the National Convention Centre was by far the best, being located near the CBD meant there were tons of accomodation options nearby — I only had to walk 10 minutes to get to the event compared to the 10-15 mins bus ride last year.
Tamper Evidence and Locksport
During last year’s Bsides I totally skipped this section, so I dedicated some hours to it this time round and wasn’t disappointed.
I learnt how to bypass simple tamper-evident stickers using alcohol-based substances such as shellite. The theory here is that most substances have a solvent, and when you apply the solvent (using a syringe for precision) the sticker will give way, and you can reapply it afterwards
Similarly the plastic seals can be bypassed by simply cutting a straw, folding it into a V-shape, putting it in the hole and sliding the shim and the plastic backwards. |
The wristbands operate in a similar fashion to the stickers but with the added difficulty of being ribbed and also only being able to use one hand (if performing on yourself)
While we were playing around, a physical security enthusiast from RMIT came by and gave more in-depth knowledge on the techniques as well as attempting to bypass some of the harder stuff himself. The metallic seals looked extremely hard to break! I believe he recommended us to go to OzSecCon
, which unfortunately is in Melbourne, not Sydney…
Talks, talks, talks
I listened to mostly talks this time around, slightly controversial subject but I actually preferred single-stream talks compared to the previous years’ multi-stream in different rooms. This meant that I wouldn’t have to choose between two good talks happening at the same time
Main Track
Here are the talks that stood out to me:
-
Apathy and Arsenic: a Victorian Era lesson on fighting the surveillance state [talk] [notes]
- Would recommend any security/privacy conscious individual to watch this
- It touches on many concepts and has great analogies
- I felt like I was listening to a TEDTalk
-
Attacking JWT [notes]
- I learnt lots of new techniques from this talk, mainly:
- When re-encoding a tampered JWT remember to use url-safe base64!
- Spoofing the signature in the event that no strict checking is done
- Setting the algorithm field to None
- Spoofing algo field to be
RSA
but actually sendingHMAC
-signed JWT - SQLi in a special
kid
field -
jku
header may lead to SSRF
- Problem ? — paseto
- I learnt lots of new techniques from this talk, mainly:
-
IoT Pentesting [notes]
-
IoT making its ways into enterprise, more @internetofshit content!
- Hardware presents whole new attack surface for pentesters:
- Dump firmware
- Get source
- Exploit Web Interface and get RCE with vulns
- Attack surfaces:
- Manuals/Data sheets from the interwebz
- USB-oriented attacks (sniffing/replaying)
- Use wifi to hook to access point, monitor traffic to cloud
- Watch more hardware hacking videos to learn techniques such as desoldering chips
-
-
Deobfuscating malicious JavaScript [notes]
- Compiler Theory: deobfuscation process and decompiling process similar
- Think of deofbuscation as “optimization”
- There are beautifiers out there but they don’t preserve semantics ie:
// int convert to string "price = $" + 10 <=> "price = $10"
- Look at
SAFE
andUGLIFYJS
- Techniques are so similar that you can use pre-existing pieces of compilers to build your own deobfuscater
-
Abusing trust in public repos [notes]
- Summary: Software supply-chain is not as safe as you thought it was
- Pseudo-solution:
DockEnv
— virtual env for Python using Docker- Suitable for testing, quick (one-time) solutions and development
Hardware Hacking Village
-
There was a cool talk about hacking a USB-powered LED fan involving:
- sniffing the USB packets
- reverse engineering the protocol
- tampering and replaying packets
- in the end displaying your own patterns/ascii with the lights
-
I also sat in to listen to @gnustomp’s talk about controlling your BIOS (UNSW support!)
- The
coreboot
project seems quite interesting, and it is definitely a good idea if you’re paranoid about the manufacturer settings being vulnerable
- The
The hardware
This year’s conference badge traded functionality for aesthetics Which I think was definitely worth it! It’s called the “Nopia 1337“, and its pretty fucking awesome | It has custom firmware flashed onto it that resembles old Nokia-style interfaces Complete with - Tetris - Snake - Hidden flags - Talk schedule |
(Image from the Privasec website) | (Sauce for the adventurous) |
I actually went sightseeing this time !
On the Sunday morning myself, @adamyi, @jk, and Lew woke up early and went to check out the Parliament House building.
We took our time getting there (by foot), unfortunately we had to rush through the building to take photos and hurriedly Uber back as time was running out and we didn’t want to miss the Bsides bus back!
Stuff I didn’t do
Conversely to last year, I did not take part in any of the competitions, ie: ASIC IR Challenge, Cybears CTF and Drone Hacking.
I did network a little bit more at the event this year, but not as much as I had set out to — imposter syndrome can be a dick sometimes…
I will try harder next year at Bsides 2020
(but maybe by then I would have had a job already... who knows?)