News / Wall of Sheep

Four More Talks Added to Packet Hacking Village Talks at DEF CON 26

Car Infotainment Hacking Methodology and Attack Surface Scenarios

Jay Turla, Application Security Engineer at Bugcrowd

The battle for supremacy for the control of the dashboard display or infotainment systems has always been a race. Most of these systems run on Linux, Android, Windows (customized dashboards - perhaps Windows ME or CE) and Blackberry's QNX. In-Vehicle Infotainment (IVI) or In-car entertainment (ICE) Systems are indeed fun consoles where you can play media, movies, or work with your car's navigational system. But somehow it also comes with a risk of being hacked or attacked because they have also been plagued with vulnerabilities. In this talk, join Jay as he presents his own Car Hacker's Methodology in finding security bugs in order to pwn a car's infotainment system without having to do a drive by wire or CANbus hacking tools but will simply point out the common attack surfaces e.g WiFi, Bluetooth, USB Ports, etc. and some scenarios on how to exploit it just like how he popped a shell or issue an arbitrary command in his car which he tweeted in Twitter before.

Jay Turla (Twitter: @shipcod3) is an application security engineer at Bugcrowd Inc., and one of the goons of ROOTCON. He has been acknowledged and rewarded by Facebook, Adobe, Yahoo, Microsoft, Mozilla, etc. for his responsible disclosures. He has also contributed auxiliary and exploit modules to the Metasploit Framework and presented at ROOTCON, Nullcon, and TCON. He used to work for HP Fortify where he performs Vulnerability Assessment, Remediation and Advance Testing.

IoT Data Exfiltration

Mike Raggo, CSO of 802 Secure, Inc.
Chet Hosmer, Owner of Python Forensics

IoT offers new protocols and frequencies over which communication travels. Due to lack of familiarity amongst most enterprises, most organizations are ill-equipped to monitor or detect these mysterious channels. This introduces a plethora of covert channels by which data could be exfiltrated, or malware to be infiltrated into the network. In this session we explore this new frontier by focusing on new methods of IoT protocol exploitation by revealing research conducted over the last 2 years. Detailed examples will be provided, as well as demo of a python tool for exploiting unused portions of protocol fields. From our research, we'll also reveal new methods of detecting aberrant behavior emanating to/from these devices gathered from our lab and real world testing.

Mike Raggo (Twitter: @DataHiding) is Chief Security Officer at 802 Secure and has over 20 years of security research experience. 
His current focus is wireless IoT threats impacting the enterprise. Michael is the author of "Mobile Data Loss: Threats & Countermeasures" and "Data Hiding" for Syngress Books, and contributing author for "Information Security the Complete Reference 2nd Edition". A former security trainer, Michael has briefed international defense agencies including the FBI and Pentagon, and is a frequent presenter at security conferences, including Black Hat, DEF CON, Gartner, DoD Cyber Crime, OWASP, HackCon, and SANS.

Chet Hosmer is an international author, educator & researcher, and founder of Python Forensics, Inc., a non-profit research institute focused on the collaborative development of open source investigative technologies using the Python programming language. Chet is also a Visiting Professor at Utica College in the Cybersecurity Graduate Program, where his research and teaching is focused on data hiding, active cyber defense and security of industrial control systems. Additionally, Chet is an Adjunct Professor at Champlain College in the Digital Forensics Graduate Program, where his research and teaching is focused on solving hard digital investigation problems using the Python programming language.

An OSINT Approach to Third Party Cloud Service Provider Evaluation

Lokesh Pidawekar, Senior Cloud and Application Security Engineer at Cisco

In the era of third party cloud service providers where enterprise critical data is hosted and shared with various vendors, third party security reviews have become essential part of Information Security. It has become a challenge for security teams to ensure parity is maintained between security controls that are available on premise, to those offered by the cloud provider. Typically, companies send a word document or excel sheet to get answers from cloud providers, however, this process is done only once and the review is point in time. In this talk, the attendees will learn about various methods of identifying security posture of the third-party cloud service using information available on Internet, how to use this information for performing cloud service review and improve their own cloud offerings. This can also supplement the tedious questionnaire process and provide an option to fast track the vendor reviews.

Lokesh Pidawekar (Twitter: @MaverickRocky02) work as Senior Cloud and Application Security Engineer in Cisco InfoSec team where he is responsible for designing secure architecture for applications, evaluating third party cloud service providers, and providing training to enterprise architects. He has Master's in Information Assurance & Cyber Security from Northeastern University, Boston. Previously, he has spoken at BSides Las Vegas, DEFCON Packet Hacking Village talks, OWASP Boston chapter and CarolinaCon. He likes to read about application vulnerabilities in free time and has reported security bugs to vendors as part of their bug bounty program.

Protecting Crypto Exchanges from a New Wave of Man-in-the-Browser Attacks

Pedro Fortuna, CTO and Co-Founder of Jscrambler

In the last year or so, we have seen a massive increase in the value of cryptocurrencies and the emergence of hundreds of new coins and ICOs, getting millions of people into an investment frenzy. A lot of them being non-technical regular consumers that rushed to create new accounts in the most popular crypto exchanges like Coinbase or Bitstamp. Crypto exchanges are naturally appealing for attackers and have been targeted since as long as we can remember. However, since last year, they are also being targeted by Man-in-the-Browser (MITB) attacks. Malware families such as Zeus Panda, Ramnit and Trickbot are already aiming at websites such as Coinbase.com or Blockchain.info. In this talk, we will detail how these attacks work, from account takeover to moving out the coins to attacker-controlled wallets. We’ll discuss current defenses e.g. multi-factor authentication or strong SSL encryption and why they are failing to mitigate this type of attacks.

Pedro Fortuna (Twitter: @pedrofortuna) is CTO and Co-Founder of Jscrambler where he leads the technical vision for the product suite and contributes with his cybersecurity knowledge for R&D. Pedro holds a degree in Computing Engineering and a MSc in Computer Networks and Services, having more than a decade of experience researching and working in the application security area. He is a regular speaker at OWASP AppSec events and other cybersecurity conferences but also contributes to web development events. His research interests lie in the fields of Application Security, Reverse Engineering and Malware and Software Engineering. Author of several patents in application security.

Read more →

Packet Hacking Village Talks at DEF CON 26 Call for Presentations Now Open

Overview

The Wall of Sheep would like to announce a call for presentations at DEF CON 26 at the Caesars Palace in Las Vegas, NV from Thursday, August 9th to Sunday, August 12th. Speaker Workshops has been renamed Packet Hacking Village Talks as we now offer hands-on workshops. Packet Hacking Village Talks goal is to deliver talks that increase security awareness and provide skills that can be immediately applied after the conference. Our audience ranges from those who are new to security to the most seasoned practitioners in the security industry. Introductory talks are welcome.

Topics of interest include:

  • Tools on network sniffing, intrusion detection, monitoring, forensics
  • How to find and evict people harvesting cryptocurrency on your devices
  • How to do refresh your PC without losing all your stuff and eliminate the malware
  • Incident response recovery
  • Justifying hacking / security tools in the corporate world
  • Finding rootkits and malware
  • General Digital Forensics and Incident Response (DFIR) talks
  • How to use regulatory compliance requirements in your favor to enhance your overall funding and security posture
  • Security awareness program success and failure stories
  • Enterprise defense using open source tools (e.g., Yara, Cuckoo Sandbox)
  • Tool / task automation and optimization
  • New and innovative ways of using old tools
  • Incident response process and procedures
  • Tools for data collection and visualization
  • Purple teaming

The Wall of Sheep will not accept product or vendor related pitches. If your talk is a thinly-veiled advertisement for a product or service your company is offering, please do not apply!

All accepted talks will be announced, recorded, and published by Aries Security, LLC. and DEF CON Communications, Inc. Please see our YouTube channel for all talks from previous years: https://www.youtube.com/channel/UCnL9S5Wv_dNvO381slSA06w.

The Call for Presentations will close on Friday, June 15th at 11:59 PM. The list of talks will be finalized and published on Saturday, June 30th.

Speaking Format

Each presentation slot is 1 hour maximum, including time for Q&A. If we have time and it is in line with our goals mentioned above, then there is a good chance you will be selected.

To submit a presentation, please provide the following information in the form below to cfp2018[at]wallofsheep[dot]com

Primary Speaker Name:

Primary Speaker Title and Company (if applicable):

Primary Speaker Email Address:

Primary Speaker Phone Number (to contact you if necessary during the conference):

Primary Speaker Twitter name (if you want it known if you are accepted):

Primary Speaker Facebook page (if you want it known if you are accepted):

Additional Speakers' name(s), titles, and social information:

Additional Email Addresses:

Is there a specific day or time you MUST speak by?

Name of Presentation:

Length of presentation:

(20 minutes or 50 minutes)

Abstract:

Your abstract will be used for the website and printed materials. Summarize what your presentation will cover. Attendees will read this to get an idea of what they should know before your presentation, and what they will learn after. Use this to inform about how technical your talk is. This abstract is the primary way people will be drawn to your session. CFP reviews like to see what tools will be used and what materials you suggest to read in advance to get the most out of your presentation.

Equipment Needs & Special Requests:

The Wall of Sheep will provide 1 projector feed, and microphones. If you need to use multiple outputs for a demo, please mention this below.

Speaker's Bio(s):

This text will be used for the website and printed materials and should be written in the third person. Cover any professional history that is relevant to the presentation, including past jobs, tools that you have written, etc. Let people know who you are and why you are qualified to speak on your topic. Presentations that are submitted without biographies will not be considered.

Detailed Outline:

You must provide a detailed outline containing the main points and navigation through your talk. Show how you intend to begin, where you intend to lead the audience and how you plan to get there. The outline may be provided in a separate attachment and may be as simple as a text file or as detailed as a "bare bones" presentation. The better your outline then the better we are able to best review your presentation against other submissions (and the higher chance you have of being accepted). SUBMISSION NOTE: Presentations that are submitted without abstracts, outlines, or speaker bios (e.g., that have only PDFs, PPTs, or white papers attached or only point to a URL) will not be considered.

Supporting File(s):

Additional supporting materials such as code, white papers, proof of concept, etc. should be sent along with this email to cfp2018[at]wallofsheep[dot]com. Note that additional files that may help in the selection process should be included. We are not asking for a complete presentation for this initial submission. That will only be required if you are selected for presenting.

Terms and Conditions

By submitting you agree to the Terms and Conditions below. Please read and accept these terms by inserting your name in the appropriate area, otherwise your application will be considered incomplete and returned to you.

Grant of Copyright Use

I warrant that the above work has not been previously published elsewhere, or if it has, that I have obtained permission for its publication by DEF CON Communications, Inc. and Aries Security, LLC. and that I will promptly supply DEF CON Communications, Inc. and Aries Security, LLC. with wording for crediting the original publication and copyright owner. If I am selected for presentation, I hereby give DEF CON Communications, Inc. and Aries Security, LLC. permission to duplicate, record and redistribute this presentation, which includes, but is not limited to, the conference proceedings, conference CD, video, audio, and hand-outs to the conference attendees for educational, on-line, and all other purposes.

Terms of Speaking Requirements

1. I will submit a completed (and possibly updated) presentation and a reference to all of the tool(s), law(s), Web sites and/or publications referenced to at the end of my talk and as described in this CFP submission by noon PST, June 30th, 2018.

2. I will submit a final Abstract and Biography to the Wall of Sheep by noon PST, June 30th, 2018.

3. I will include a detailed bibliography as either a separate document or included within the presentation of all resources cited and/or used in my presentation.

4. I will complete my presentation within the time allocated to me - not running over the time allocation.

5. I understand that the Wall of Sheep will provide 1 LCD projector feed, 2 screens, and microphones. I understand that I am responsible for providing all other necessary equipment, including laptops and machines (with VGA output), to complete my presentation.

6. I understand that I will be responsible for my own hotel and travel expenses, and admissions to the DEF CON Conference.

Yes, I, (insert primary speaker name), have read and agree to the Grant of Copyright Use.

I, (insert your name here), have read and understand and agree to the terms as detailed in the Agreement to Terms of Speaking Requirements.

In the case that a speaker is a child under the age of 13 years old: in compliance with the Children's Online Privacy Protection Act (COPPA) regulations, http://www.coppa.org, any child under age 13 must have parental consent for the collection, use, or disclosure of that child's personal information by a website. Parent/Guardian Consent: I (insert parent/guardian's name here) am the parent or guardian of the minor/s named above. I have read and understand and agree to the terms as detailed in the Agreement to Terms of Speaking Requirements.

Read more →

Super Secret DEF CON 25 MAP - How to get to the Packet Hacking Village - SHHHHH!!!

Secret Map - How to get to the Packet Hacking Village
Read more →

New Batch of Accepted Speakers and Our Schedule at DEF CON 25 Now Available

Read more →

Speaker Workshops at DEF CON 25 Call for Presentations Now Open

The Wall of Sheep would like to announce a call for presentations at DEF CON 25 at the Caesars Palace in Las Vegas, NV from Thursday, July 27th to Sunday, July 30th. This will be the 5th anniversary of our Speaker Workshops.

Read more →

Packet Hacking Village Equipment Check for DEF CON 24

[Written by @donds.  Originally posted at http://hackvault.blogspot.com/2016/07/phv-equipment-check.html.]

They say not to bring any electronic devices at DEFCON!? .... what's the fun in that? Well, your mother also said not to get in a strange car with a stranger... UBER, anyone?

It’s time to prep your gear for the Packet Hacking Village (PHV) at DEFCON 24. Although, the PHV staff will have some gear for you to use, I highly recommend to bring your own "FOR DEFCON USE ONLY" gear. 

For the Wall of Sheep and WiFi Sheep Hunt you'll need a laptop with wired and wireless sniffing capabilities.  I spent about $200 for a used laptop from eBay. Also invested on an Alpha wireless USB card from Amazon. Load Kali on the laptop and you're basically good to go. Most tools you'll need are already included in Kali.  The PHV staff can help you refine your setup and config depending on what event you want to try out.

For Sheep City, you can use the same laptop you plan to use for WoS and WIFISH.  But it will require a bit more creativity and possibly a visit to the vendor area or Fry's.  Prep for Bluetooth, ZigBee, IrDa, RF...etc. Be ready for anything.

Packet Detective runs like a classroom format. IMHO, this is a "MUST DO" event at PHV. PHV will have laptops setup for PD Agent trainees to use... Yes, you don't have to bring your own laptop to participate.  This is a very popular event and laptops are limited. Sign up early.

WiFi Sheep Hunt will also have a sign-up sheet for the FoxHunt gear. You can use your own equipment to join the FoxHunt and code breaking fun.  There will also be a couple of laptops for players to use, but only for limited time slots. 

Capture the Packet has produced Black Badge winners at DEFCON. If you're just prepping now, you're already behind... you get my drift.

If you're asking which one to do first, I'd say do it all! But if it's your first ever visit at PHV, here's the order of events I'd suggest..

1. Packet Detective
2. Wall of Sheep
3. WiFi Sheep Hunt
4. Sheep City
5. Capture The Packet

Our DEF CON 24 schedule is available at https://www.wallofsheep.com/pages/dc24

Read more →

Our Speaker Workshops Schedule at DEF CON 24 is Now LIVE!

We will be adding more talks in the upcoming weeks.

Link: http://www.wallofsheep.com/pages/speaker-workshops-at-def-con-24/

Read more →

All Speaker Workshops from DEF CON 23 Now Posted On YouTube

Read more →

Wall of Sheep releases a low cost 48 Port Gigabit LAN TAP at DEF CON!!!

For nearly 20 years we have been sniffing traffic at conferences using 10/100 Ethernet HUBs.  Although using a HUB is one of the easiest fastest setups you can do, this method has slowly become obsolete. 

While 10/100MB shared was great back in the day, it’s considered extremely slow by today’s standards.

Frankly, as our fleet of HUBS started aging, we started experiencing more and more failures (port outages, loud/dead fans, more than normal slowness, etc.)  Trying to replace the hubs was getting harder and harder and fleet age wasn’t the only problem we were experiencing. People would spew traffic back into the HUB tainting the data everyone was trying to capture.  And… depending on the venue no names (DEF CON), we would have people intentionally saturate the HUB or attack others on the HUB intended for network forensics.

We knew we had to do something, the ideal alternative to using network HUBS is using a network TAP. This would also solve all the other issues mentioned above with just one catch.  High port count Gigabit Network TAP technologies are freaking expensive!!!  We didn't have 15-20 thousand dollars per device laying around.

So we looked into seeing if one of the manufactures would give us a discount or possibly sponsor our projects.  When this didn’t pan out, we had this crazy idea…

Was it was possible to make our own? 

Well, the answer is YES!  We are proud to announce after several years of development and testing, we have released our first 48 Port high speed network device intended for network forensics that won’t require a luxury car loan to buy.  

While it sounds insane, we are releasing the CTP410052T for the low cost of $2500.00 so labs everywhere can finally actually afford to upgrade! 

If you’re interested and didn’t get a chance to swing by the Packet Hacking Village at DEF CON this year to see one in action check it out here: 

http://www.wallofsheep.com/collections/lan-taps/products/ctp410052t-48-port-gigabit-lan-tap

Read more →

Our DJ Schedule at DEF CON 23 and DJ Bios

  Thursday Friday Saturday Sunday
10:00 AM   n-Way DJ Tag Team! phreakocious, Tense Future, yurk, + Special Guest(s) Habikki  
11:00 AM phreakocious Habikki kampf
12:00 PM phreakocious / TBD phreakocious VNA
1:00 PM Tense Future DJ %27 Taishi phreakocious
2:00 PM DJ Rene Deep Therapy AliKat yurk
3:00 PM AliKat Habikki DJ Rene  
4:00 PM AliKat DJ Rene DJ Federico Nan  
5:00 PM Taishi CTRL yurk  
6:00 PM yurk phreakocious    

phreakocious (@phreakocious, https://soundcloud.com/phreakocious, https://mixcloud.com/phreakocious)

Inspired by experiences at Detroit raves and private parties in the early 90s, phreakocious bought a pair of 1200s in Y2K and has shaken booties with the finest in funky techno, house, and breaks ever since. The orchestrator of musical shenanigans at the Wall of Sheep and Packet Hacking Village since DC20 (or was it 19?).

DJ %27, (@djpercent27, https://www.mixcloud.com/djpercent27)

DJing since the 80s and HackMiami resident DJ/VJ, DJ %27 has also performed at chillout and pool areas for DEF CON 20 and 21.

DJ Alikat (@suckitpig, http://alikat.ca, https://mixcloud.com/alikat)

DJ Alikat was born under the rainy lights of Vancouver’s nightlife with a pawful of skills that were passed down to her from some high profile mentors on the scene. A champion in the lost art of crate digging, Alikat’s passion for music is rooted in a history of endlessly searching for those hidden vinyl gems that taught her the art of mixing, scratching and working the room. She’s brought her process with her into the digital world, putting in the hours searching for those Internet gems that’ll light up the dance floor.

CTRL (@deejayCTRL, http://www.deejayctrl.com, http://www.mixcrate.com/deejayctrl)

Emerging from the Los Angeles warehouse and underground music culture of the early 90s, spending the 2000’s in the European club and festival circuit; nurturing a global dance music community for more than two decades. Returning to the Los Angeles music scene in 2010, CTRL can be found mixing it up in underground clubs and at events like California’s Wasteland Weekend and Nevada's DEF CON.

Deep Therapy (@therapy_life, https://www.mixcloud.com/SoundboxMiami, http://www.residentadvisor.net/dj/deeptherapy)

Based out of South Florida (Miami, Ft. Lauderdale, and West Palm Beach) The duo began hosting and DJ'n their own college radio shows. Constantly achieving new heights of dancefloor energy and pushing the boundaries of convention, Deep Therapy is recognized as one of South Florida’s essential DJ’s. Deep Therapy has been featured on Sirius XM radio in Ultra Music Festival Radio, opening up for Infected Mushroom as well as performing at Ultra Music Festival Miami two years in a row and holds a residency at Club Space in Miami in the Technoloft.

Federico Nan (https://soundcloud.com/dj-federico-nan)

Federico Nan designs his sets with compelling sounds that lure you into having to move your body. He spent nights crafting his sound spinning in Capital Federal, Gran Buenos Aires, Las Leñas, Salta, San Martín de los Andes and Pinamar. Federico has the scope to scan the dance floor and inject his infectious grooves into the atmosphere. Creating energy with the crowd is Federico's passion and his love for Acid House and Techno add to the experience he creates.

Habikki (https://www.mixcloud.com/Habikki, https://soundcloud.com/habikki)

DJ turned Enterprise Architect (with a security focus), Habikki has been rocking the southwest for over a decade. His knack for blurring the lines of genres shines in each set, bridging soul, high energy, melodic and, fist pumping as the mood strikes. Habikki prefers closing slots and longer sets found on the second stage where he's open to use the dance floor as his canvas. An Arizona staple, this artist has held residencies at Club Myst, Afterhours at Polyesthers, a monthly at UC Berkeley Radio and a pool party regular at Luxor.

kampf (@nerd_show, https://www.mixcloud.com/NerdShow)

With over a decade of experience as a college radio DJ at KWCR on Nerd Show, kampf has waded long and deep through the muddied waters of electronic music, casting his rod time and again to obtain, then share the eclectic, the compelling, the sounds off the beaten path and those lesser know varieties or species. Resident DJ for the DEF CON Chillout Lounge and for DEF CON Radio on SomaFM.com. Spinning vinyl for WoS/Packet Hacking Village since DEF CON 20!

DJ Rene (https://soundcloud.com/dj-rene)

DJ Rene is best known for his eclectic style of quick mixes that transcend from the old school original style of mixing to the new ever changing art of mixing and scratching. At age 15, he started to play music for his own birthday party and was soon hooked on the energy he was able to provide. He has gone on to spin at some of the biggest social events in the U.S. and opened for some of the best international DJ's. He has residencies in D.C. and Thailand and has spun at the world famous Full Moon Party in Koh Phangan, Thailand.

Tense Future (https://soundcloud.com/tensefuture)

It goes largely unnoticed, but most people spend a majority of their waking hours pondering, planning, stressing about what may come... it's been this way forever. Gathering, searching, learning, negotiating... Every action we take is an attempt to make the next one less labored. Tense Future is the result of this recursive internal monologue inside the mind of Daniel Samarin, who can only find relief from the neural thrashing in the regular beat of synthesized percussion.

TK (https://www.mixcloud.com/TK-Austin/)

Hailing from Austin with a smooth mixing style incorporating various facets of dance music, TK's primary focus has been house. Wrecking the decks since 2001 with funky, jazzy, groovy, techy, get up and go music heavily influenced by producers such as Derrick Carter, Inland Knights and DJ Dan. At the height of the funky house movement he has been told by fans, "I started listening to funky house because of you." TK's roots are grounded in the Houston underground house scene and venues like the Underground Lounge, Lotus Lounge, Clarks and Deans, as well as Karma Lounge, Bambu Lounge and Red Eyed Fly in Austin. Pumped to be back for DEF CON 23 alongside VNA, pheakocious, yurk and all the others. Hack all the things!

VNA (https://www.mixcloud.com/V-N-A)

VNA has been spinning in the Houston area since the turn of the century. His flexible musical palette encompasses blends of prog, tech, funky house, electro, occasionally some cut-and-scratch breaks. This DJ’s mission is to keep the night going by infusing his eclectic style into the sounds he pumps into the crowd. VNA has spun at various clubs in the Houston area, the longest of which being Revolve @ Numbers, and also frequently guested many other residencies of his assorted crewmates in the Texas scene. Classically a vinyl DJ and member of the legendary Traffic Crew, he stays true to his origins. VNA is super glad to be back again for DEF CON 23 this year.

yurk (@yurkmeister)

The man, the myth, the legend.

Read more →