Saturday, January 16, 2016 15 months ago ,
MWR is sponsoring the inaugural BSides New York conference, where we will be presenting three talks on QNX, SSH and MPLS.
MWR is pleased to announce that we are the platinum sponsor at the inaugural BSides New York conference. Alex Plaskett, Stuart Morgan & Georgi Geshev will be presenting at BSides New York which according to the organisers, is a Security conference that is different. It’s an 100% volunteer organised event, put on by and for the community, striving to keep information free.
Topic: 99 Problems but a Microkernel ain’t one!
Speakers: Alex Plaskett
Cars, Safety Critical Systems and consumer devices (phones) all run QNX, however, very little security research has been performed in this area. This talk will provide an overview of QNX security architecture with Blackberry 10 used as the primary target. It will discuss research on a locked down highly secured embedded OS, the OS attack surface and methods of identifying vulnerabilities from both a reverse engineering perspective and automated fuzzing approach. This talk will also highlight some of the novel QNX weaknesses identified with this research and the challenges faced with exploit development on the platform.
Topic: The Pagentry of Lateral Movement
Speakers: Stuart Morgan
In order to meaningfully compromise a client, you need to take advantage of every opportunity to gather information and laterally move around the network. This talk will discuss ways of abusing Pageant (PuTTY’s SSH agent) on a fully patched Windows host, including a demonstration of a meterpreter extension which can tunnel SSH agent traffic in a manner that is almost undetectable with default logging options, and the way that an existing reconnaissance tool from 2012 was improved to make its output easier to use during a simulated attack or penetration test.
Topic: Warranty Void If Label Removed – Attacking MPLS Networks
Speakers: Georgi Geshev
This talk will be a walk-through of research findings from assessing multiple MPLS implementations and the various key weaknesses that were found to affect a number of leading vendors. General MPLS and MPLS related terms and concepts will be briefly introduced to the audience, followed by an overview of a typical service provider network, classic topologies and basic traffic engineering strategies. It should be noted that none of the examples and demonstrations require access to the MPLS backbone. This talk will be concluded with both general and, where applicable, vendor specific best practices and recommendations on reducing the attack surface of an MPLS network.
You can register for tickets here.