-
13:15 - 13:45
You look like a terrorist
Tobias Schrödel
In Germany a "most wanted" terrorist was caught by the police after hiding for over 30 years. How ever, it was not the police who found her. It was a journalist, using a free face recognition software in the web. In this talk, Tobias will explain, how the tool works. And - as always in talks from Tobias aka Comedyhacker - we will try it out LIVE. Let's identify a person behind a famous meme or a real criminal on the run.
-
13:50 - 14:10
Digital parenting
from sandboxes to passwords
Óbuda University
Our research deals with the digital and generation gap between children and parents. To bridge the "gap", we develop cyber security games that are AI assisted. The topics are constantly tested and developed. The development of cybersecurity and information security awareness plays a pioneering role in our research, and we place great emphasis on modern education, gamification, and motivational elements.
-
14:15 - 14:55
Linux Under Siege
Analyzing the Latest Cyber Espionage Tactics and Malware Trends
Marc Rivero Lopez
In 2023, cybersecurity research sheds light on the increasing targeting of Linux systems. The AppleJeus campaign by the Lazarus Group, highlighted by Volexity and Microsoft, marks a tactical evolution with new malware impacting Linux and macOS, focusing on cryptocurrency theft. The DTrack campaign, a branch of Lazarus, represents a significant development in diverse attacks including ransomware and espionage malware. This campaign has evolved over nearly a decade, expanding knowledge about attacker commands and associated post-exploitation tools.
-
14:55 - 15:20
Break
-
15:20 - 16:00
Local Admin in less than 60 seconds
My guilty pleasure
Nikos Vourdas
Local Privilege Escalation, also known as LPE, refers to the process of elevating user privileges on a computing system or network beyond what is intended, granting unauthorized access to resources or capabilities typically restricted to higher privilege levels. Gaining local admin privileges during red teaming significantly enhances the potential for lateral movement and access to additional resources. Modern environments offer unprecedented opportunities to gain local admin privileges more easily than one might imagine. The days of relying solely on traditional techniques such as exploiting unquoted service paths, weak service permissions, misconfigured AlwaysInstallElevated policies etc. are long gone (still possible but rare). Thus, in this presentation, we will explore together some alternative and realistic methods for escalating privileges and moving laterally within an internal network, inspired by my recent engagements.
-
16:05 - 16:45
Open by Default
The Hidden Cost of Convenience in Network Security
Aurelio Picon Lopez
This presentation will discuss the almost obvious realization I had after a year of reviewing anonymized network security event logs for more than 2 billion devices spread across north America and Europe, tracking malware, trending TTP, IOT software updates, targeted devices, botnet compositions and behaviors, etc, All that is good but ultimately the only reason the majority of current botnet spreading and behaviour is happening because the routers on households have "auto port forwarding" enabled by default.
-
16:50 - 17:20
Context-Based Security
What Your Cloud Native Apps Really Need
Ben Hirschberg
-
17:20 - 17:25
Closing notes
Ingrid Donenwirth