t2’16 infosec conference

Thursday, October 27, 2016 1 month ago Helsinki, Finland

MWR will be returning to t2 and we're delighted to announce that Kostas Lintovois will be presenting at the conference in Helsinki this year!

Event Description

t2 was born at a time when there was a need for a conference that was "from hacker to hacker" when there was not one single independent, technically oriented, information security conference in Finland in existence.

The mission of t2 has remained the same from its commencement, to be an annual conference dedicated to those who are interested in the technical aspects of information security. t2 offers the opportunity to publish new research and ideas as well as networking, the latter an elemental part of its ideology.

Talk presented by MWR

  • Time:
  • Room: TBC
  • Topic: One Template to Rule 'em All
  • Speakers: Kostas Lintovois
  • Description: Current attack vectors indicate that malware families are still abusing Microsoft Office's functionality to attack unsuspecting victims and formulate attacks against today's businesses. Cracking the perimeter is no longer a requirement in order to obtain a foothold within a target environment. As the Office Suite is an integral tool in business today, such attack vectors stay current and relevant.

    This presentation will walk the audience through the different configurations and mitigating controls made available by Microsoft over the years. It will discuss various bypasses that have been known and highlight Office templates and the ways that they can be used to assist in different stages of an APT life cycle. More specifically, in this talk we demonstrate how they can be used as a covert persistence mechanism as well as for asynchronous C2 communications. Furthermore, the presentation identifies how these templates can be used as a mechanism for native code execution in locked down environments where VBA is explicitly disabled.

    The talk will include the demonstration and release of a new tool that generates VBA architecture independent code to be used in an Office template and capable of enumerating a target system's configuration. The generated implant evaluates the applied security controls and decides what the appropriate attack elements should be in order to reliably bypass application control and circumvent EMET's mitigations.

 

 

Registration

You can register for tickets here.

Get tickets

Accreditations

As members of CHECK we are measured against high standards set by CESG for the services we provide to Her Majesty's Government.
We are certified in the ISO 9001 quality management system (QMS) in the UK, ensuring reliable delivery of our products and services.
We are certified to comply with ISO 14001 in the UK, an internationally accepted standard that outlines how to put an effective environmental management system in place.
MWR is certified to comply with ISO 27001 to help ensure our client information is managed securely.
As an Approved Scanning Vendor MWR are approved by PCI SSC to conduct external vulnerability scanning services to PCI DSS Requirement 11.2.2.
We are members of the Council of Registered Ethical Security Testers (CREST), an organisation serving the needs of the information security sector.
MWR is a supplier to the Crown Commercial Service (CCS), which provides commercial and procurement services to the UK public sector.
MWR is a Qualified Security Assessor, meaning we have been qualified by PCI to validate other organisation's adherence to PCI DSS.