Ron Kuriscak

Ron Kuriscak

When your IoT goes bump in the night

In our always connected world the prevalence of internet connect devices has multiplied significantly. Internet connected devices have skyrocketed in our businesses, factories, infrastructures, and hospitals. This “Internet of things” (IoT) is becoming an increasing topic of conversation both in the workplace and outside of it. It’s a concept that not only has the potential to impact how we live but also how we work and are secured. IoT devices have become prevalent in many of the products and services that we have come to rely upon in our everyday lives. IoT security is the safeguarding of connected devices and networks in the IoT world. Managing and securing the ever-growing number of internet connected devices is posing new challenges to organizations of all sizes. Businesses must now address this new threat landscape to determine how to protect themselves. What are some examples of IoT devices? What is the threat? How prevalent is the risk? How are organizations protecting all of these IoT devices? What should do to reduce the risks.


Dan Walters

Dan Walters

Your cable modem is secure Right? Oh!

Most people think their devices are “secure” well its time to talk about things most cable company don’t want you to be aware of…. ignorance is bliss right?


Dustin Heywood (evil_mog)

Dustin Heywood (evil_mog)

Silver Tickets Through the Printer Bug: How NTLMv1 Brings Down the Kingdom

Have you ever wanted to know how the MS-RPRN Print Spooler service can lead to local admin? This talk will go through the NTLMv1 hash format, reverse it to an NTLM hash, and show how to use that information to generate Silver Tickets. It will also cover defenses for this devastating attack.


Shannon Fritz

Shannon Fritz

Is that a PickleNIC in your Pocket or are you just Cap’n Password Hashes?

When a device is set to automatically connect to wifi it may actually be exposing themselves AND the networks to attacks, but what you can do about it? The PickleNIC is a combination of custom hardware and software that was built to automate the collection and cracking of WPA2 Password Hashes. Hear the story about my daily commute with a raspberry pi that collects thousands of hashes using hcxtools and then automatically submits them to hashtopolis for distributed cracking. We’ll cover how the PickleNIC works and how it was built in order to help expose the risks in a fun way that (hopefully) encourages better security practices in my friends and strangers. You too can have a pickle in your pocket, in your bag, or in your car, and you’ll get all the information you need to make your very own PickleNIC today. This is going to be fun!


Tymkrs & AND!XOR

Tymkrs & AND!XOR compukidmike

compukidmike

Badge Makers Panel

Come listen to how new world’s are created for your curiosity and enjoyment!