<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Black Hat on System Overlord</title><link>https://systemoverlord.com/tags/black-hat.html</link><description>Recent content in Black Hat on System Overlord</description><generator>Hugo</generator><language>en-us</language><managingEditor>david@systemoverlord.com (David Tomaschik)</managingEditor><webMaster>david@systemoverlord.com (David Tomaschik)</webMaster><lastBuildDate>Tue, 09 Aug 2016 00:00:00 +0000</lastBuildDate><atom:link href="https://systemoverlord.com/tags/black-hat/index.xml" rel="self" type="application/rss+xml"/><item><title>HSC Part 1: Hardware Hacking with the Hardsploit Framework</title><link>https://systemoverlord.com/2016/08/09/hsc-part-i-hardware-hacking-with-the-hardsploit-framework.html</link><pubDate>Tue, 09 Aug 2016 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2016/08/09/hsc-part-i-hardware-hacking-with-the-hardsploit-framework.html</guid><description>&lt;p&gt;Just returned from Hacker Summer Camp (Black Hat, BSides LV, DEF CON) and I&amp;rsquo;m
exhausted. 10 days in Las Vegas is a &lt;em&gt;lot&lt;/em&gt; of Las Vegas, even if you don&amp;rsquo;t
spend a lot of time at the slot machines, table games, and shows.&lt;/p&gt;
&lt;p&gt;My week started off with a training class at Black Hat: &lt;a href="https://www.blackhat.com/us-16/training/hardware-hacking-with-hardsploit-framework.html"&gt;Hardware Hacking with
the Hardsploit
Framework&lt;/a&gt;
taught by a couple of guys who clearly knew their hardware. I&amp;rsquo;ve previously
taken Xipiter&amp;rsquo;s &lt;a href="http://www.sexviahex.com/"&gt;Software Exploitation via Hardware
Exploitation&lt;/a&gt;, which helped with some of the basic
concepts, but the two classes were definitely complimentary. SexViaHex
predominantly focused on dumping firmware from embedded microcomputers (that is,
they had a kernel, typically Linux, and were running applications on them) and
analyzing them for exploitable software vulnerabilities (mostly memory
corruption-esque issues). HH with Hardsploit, on the other hand, mostly focused
on microcontroller-based embedded devices. This was much more a class of
dumping flash to locate stored secrets, understanding the hardware of the
device, and working from there.&lt;/p&gt;</description></item><item><title>DEF CON 22 Recap</title><link>https://systemoverlord.com/2014/08/13/def-con-22-recap/</link><pubDate>Wed, 13 Aug 2014 05:45:33 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2014/08/13/def-con-22-recap/</guid><description>&lt;p&gt;&lt;img src="https://systemoverlord.com/img/blog/badges.jpg" alt="Conference Badges"&gt;&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;m back and recovering with typical post-con fatigue. This year, I made several mistakes, not the least of which was trying to do &lt;a href="http://www.bsideslv.org/"&gt;BSides&lt;/a&gt;, &lt;a href="https://www.blackhat.com/"&gt;Black Hat&lt;/a&gt;, and &lt;a href="https://www.defcon.org/"&gt;DEF CON&lt;/a&gt;. Given the overlapping schedules and the events occurring outside the conferences, this left me really drained, not to mention spending more time transiting between the events than I&amp;rsquo;d like.&lt;/p&gt;
&lt;h3 id="bsides-las-vegas"&gt;BSides Las Vegas&lt;/h3&gt;
&lt;p&gt;B-Sides was a blast, but I spent most of the time I was there playing in the Pros vs Joes CTF run by &lt;a href="https://twitter.com/dichotomy1"&gt;Dichotomy&lt;/a&gt;. This is a particularly nice Capture the Flag competition, since it&amp;rsquo;s based on defending (and attacking) &amp;ldquo;real world&amp;rdquo; networks, rather than the typical Jeopardy-style &amp;ldquo;crack this binary&amp;rdquo; competitions. Most of the problems seen in the real world aren&amp;rsquo;t, in fact, 0-day produced by talented hackers, but in fact configuration weaknesses, outdated software, and insecure practices exploited by script kiddies. PvJ forces you to consider how to harden a &amp;ldquo;corporate&amp;rdquo; environment while still providing the same services. You get a Cisco ASA as your firewall, and can reconfigure services as needed to establish your perimeter and secure your systems. On Day 2, you also get to see just how good you are at breaking in, and just how good (or bad) your opponents are at securing their network.&lt;/p&gt;</description></item></channel></rss>