<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>BSides on System Overlord</title><link>https://systemoverlord.com/tags/bsides.html</link><description>Recent content in BSides on System Overlord</description><generator>Hugo</generator><language>en-us</language><managingEditor>david@systemoverlord.com (David Tomaschik)</managingEditor><webMaster>david@systemoverlord.com (David Tomaschik)</webMaster><lastBuildDate>Wed, 15 Feb 2017 00:00:00 +0000</lastBuildDate><atom:link href="https://systemoverlord.com/tags/bsides/index.xml" rel="self" type="application/rss+xml"/><item><title>BSidesSF 2017</title><link>https://systemoverlord.com/2017/02/15/bsidessf-2017.html</link><pubDate>Wed, 15 Feb 2017 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2017/02/15/bsidessf-2017.html</guid><description>&lt;p&gt;BSidesSF 2017 was, by far, the best yet. I&amp;rsquo;ve been to the last 5 or so, and had
a blast at almost every one. This year, I was super busy &amp;ndash; gave a talk, ran a
workshop, and I was one of the organizers for the BSidesSF CTF. I&amp;rsquo;ve posted
&lt;a href="https://systemoverlord.com/projects/assessing_embedded_devices.html"&gt;the summary and slides for my talk&lt;/a&gt;
and I&amp;rsquo;ll update the video link once it gets posted.&lt;/p&gt;
&lt;p&gt;I think it&amp;rsquo;s important to thank the BSidesSF organizers &amp;ndash; they did a phenomenal
job with an even bigger venue and I think everyone loved it. It was clearly a
success, and I can only imagine how much work it takes to plan something like
this.&lt;/p&gt;</description></item><item><title>HSC Part 2: Pros versus Joes CTF</title><link>https://systemoverlord.com/2016/08/10/hsc-part-2-pros-versus-joes-ctf.html</link><pubDate>Wed, 10 Aug 2016 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2016/08/10/hsc-part-2-pros-versus-joes-ctf.html</guid><description>&lt;p&gt;Continuing my &lt;a href="https://systemoverlord.com/2016/08/09/hsc-part-i-hardware-hacking-with-the-hardsploit-framework.html"&gt;Hacker Summer Camp Series&lt;/a&gt;,
I&amp;rsquo;m going to talk about one of my Hacker Summer Camp traditions.
That&amp;rsquo;s right, it&amp;rsquo;s the Pros versus Joes CTF at BSidesLV. I&amp;rsquo;ve
written &lt;a href="https://systemoverlord.com/2015/08/12/hacker-summer-camp-2015-bsides-lv-pros-vs-joes-ctf"&gt;about my experiences&lt;/a&gt;
and even a &lt;a href="https://systemoverlord.com/2015/08/15/blue-team-players-guide-for-pros-vs-joes-ctf"&gt;player&amp;rsquo;s guide&lt;/a&gt;
before, but this was my first year as a Pro, captaining a blue team (The SYNdicate).&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s important to me to start by congratulating all of the Joes &amp;ndash; this is an
intense two days, and your pushing through it is a feat in and of itself. In
past years, we had players burn out early, but I&amp;rsquo;m proud to say that nearly all
of the Joes (from every team) worked hard until the final scorched earth. Every
one of the players on my team was outstanding and worked their ass off for this
CTF, and it paid off, as The SYNdicate was declared the victors of the 2016
BSides LV Pros versus Joes.&lt;/p&gt;</description></item><item><title>BSides Seattle</title><link>https://systemoverlord.com/2016/02/20/bsides-seattle.html</link><pubDate>Sat, 20 Feb 2016 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2016/02/20/bsides-seattle.html</guid><description>&lt;p&gt;These are just (essentially) my raw notes dumped from the talks I attended at
BSides Seattle (2015-ish). Unfortunate I developed a migraine so I only caught
the morning talks.&lt;/p&gt;
&lt;h3 id="active-directory"&gt;Active Directory&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Use scripts to dump AD&lt;/li&gt;
&lt;li&gt;Use scripts to sync with 3rd party providers&lt;/li&gt;
&lt;li&gt;Lots of story, not much technical depth&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="red-team"&gt;Red Team&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Presenter: Sean Malone, FusionX&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Types of Security Assessment&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Vulnerability Assessment
&lt;ul&gt;
&lt;li&gt;Find vulnerability&lt;/li&gt;
&lt;li&gt;Limited Scope&lt;/li&gt;
&lt;li&gt;Broad &amp;amp; Shallow&lt;/li&gt;
&lt;li&gt;Cooperates with SecOps&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Pentesting
&lt;ul&gt;
&lt;li&gt;Achieve Technical Compromise/Domain Admin&lt;/li&gt;
&lt;li&gt;Moderate Depth&lt;/li&gt;
&lt;li&gt;Techniques include Network, Application Assessment&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Red Team
&lt;ul&gt;
&lt;li&gt;Narrow Scope&lt;/li&gt;
&lt;li&gt;Whole Enterprise is In Scope&lt;/li&gt;
&lt;li&gt;Techniques include Social, Physical, Technical&lt;/li&gt;
&lt;li&gt;RT Objectives
&lt;ul&gt;
&lt;li&gt;Simulate Sophisticated Adversary&lt;/li&gt;
&lt;li&gt;Achieve &amp;ldquo;Nightmare Scenario&amp;rdquo; without detection&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Client Objectives
&lt;ul&gt;
&lt;li&gt;Understand resiliency&lt;/li&gt;
&lt;li&gt;Risk reduction, not just vulnerability count&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Effective Red Teams&lt;/p&gt;</description></item><item><title>Blue Team Player's Guide for Pros vs Joes CTF</title><link>https://systemoverlord.com/2015/08/15/blue-team-players-guide-for-pros-vs-joes-ctf/</link><pubDate>Sat, 15 Aug 2015 19:15:36 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2015/08/15/blue-team-players-guide-for-pros-vs-joes-ctf/</guid><description>&lt;p&gt;I&amp;rsquo;ve played in Dichotomy&amp;rsquo;s &lt;a href="http://www.prosversusjoes.net/"&gt;Pros v Joes&lt;/a&gt; CTF for
the past 3 years &amp;ndash; which, I&amp;rsquo;m told, makes me the only player to have done so.
It&amp;rsquo;s an incredible CTF and dramatically different from any other that I&amp;rsquo;ve ever
played. Dichotomy and I were having lunch at DEF CON when he said &amp;ldquo;You know
what would be cool? A blue team player&amp;rsquo;s guide.&amp;rdquo; So, I give to you, the blue
team player&amp;rsquo;s guide to the Pros v Joes CTF.&lt;/p&gt;</description></item><item><title>Hacker Summer Camp 2015: BSides LV &amp; Pros vs Joes CTF</title><link>https://systemoverlord.com/2015/08/12/hacker-summer-camp-2015-bsides-lv-pros-vs-joes-ctf/</link><pubDate>Wed, 12 Aug 2015 00:13:58 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2015/08/12/hacker-summer-camp-2015-bsides-lv-pros-vs-joes-ctf/</guid><description>&lt;p&gt;I&amp;rsquo;ve just returned from Las Vegas for the annual &amp;ldquo;hacker summer camp&amp;rdquo;, and am
going to be putting up a series of blog posts covering the week. Tuesday and
Wednesday were &lt;a href="https://bsideslv.org"&gt;BSides Las Vegas&lt;/a&gt;. For the uninitiated,
BSides was founded as the &amp;ldquo;flip side&amp;rdquo; to Black Hat, and has spawned into a
series of community organized and oriented conferences around the globe.
Entrance to BSides LV was free, but you could guarantee a spot by donating in
advance if you were so inclined. (I was.)&lt;/p&gt;</description></item><item><title>DEF CON 22 Recap</title><link>https://systemoverlord.com/2014/08/13/def-con-22-recap/</link><pubDate>Wed, 13 Aug 2014 05:45:33 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2014/08/13/def-con-22-recap/</guid><description>&lt;p&gt;&lt;img src="https://systemoverlord.com/img/blog/badges.jpg" alt="Conference Badges"&gt;&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;m back and recovering with typical post-con fatigue. This year, I made several mistakes, not the least of which was trying to do &lt;a href="http://www.bsideslv.org/"&gt;BSides&lt;/a&gt;, &lt;a href="https://www.blackhat.com/"&gt;Black Hat&lt;/a&gt;, and &lt;a href="https://www.defcon.org/"&gt;DEF CON&lt;/a&gt;. Given the overlapping schedules and the events occurring outside the conferences, this left me really drained, not to mention spending more time transiting between the events than I&amp;rsquo;d like.&lt;/p&gt;
&lt;h3 id="bsides-las-vegas"&gt;BSides Las Vegas&lt;/h3&gt;
&lt;p&gt;B-Sides was a blast, but I spent most of the time I was there playing in the Pros vs Joes CTF run by &lt;a href="https://twitter.com/dichotomy1"&gt;Dichotomy&lt;/a&gt;. This is a particularly nice Capture the Flag competition, since it&amp;rsquo;s based on defending (and attacking) &amp;ldquo;real world&amp;rdquo; networks, rather than the typical Jeopardy-style &amp;ldquo;crack this binary&amp;rdquo; competitions. Most of the problems seen in the real world aren&amp;rsquo;t, in fact, 0-day produced by talented hackers, but in fact configuration weaknesses, outdated software, and insecure practices exploited by script kiddies. PvJ forces you to consider how to harden a &amp;ldquo;corporate&amp;rdquo; environment while still providing the same services. You get a Cisco ASA as your firewall, and can reconfigure services as needed to establish your perimeter and secure your systems. On Day 2, you also get to see just how good you are at breaking in, and just how good (or bad) your opponents are at securing their network.&lt;/p&gt;</description></item><item><title>BSides SF CTF by MAD Security, Conclusion</title><link>https://systemoverlord.com/2013/03/06/bsides-sf-ctf-by-mad-security-conclusion/</link><pubDate>Wed, 06 Mar 2013 05:51:21 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2013/03/06/bsides-sf-ctf-by-mad-security-conclusion/</guid><description>&lt;p&gt;This is the conclusion to my write-up of the awesome BSides SF CTF by &lt;a href="http://madsecurity.com"&gt;MAD Security&lt;/a&gt;/&lt;a href="http://thehackeracademy.com"&gt;The Hacker Academy&lt;/a&gt;.  You can find the other parts here: &lt;a href="https://systemoverlord.com/2013/03/02/bsides-sf-ctf-by-mad-security-part-1"&gt;Levels 1-2&lt;/a&gt;, &lt;a href="https://systemoverlord.com/2013/03/03/bsides-sf-ctf-by-mad-security-part-2"&gt;Levels 3-4&lt;/a&gt;, &lt;a href="https://systemoverlord.com/2013/03/03/bsides-sf-ctf-by-mad-security-part-3"&gt;Levels 5-7&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What I Learned&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
		Don't overthink things -- work from the simplest case.&lt;/li&gt;
&lt;li&gt;
		Internet access during a CTF may be spotty (or nonexistent) -- be prepared to work fully offline.  (Download a copy of exploit-db, etc.)&lt;/li&gt;
&lt;li&gt;
		Keep meticulous notes -- otherwise you'll find yourself revisiting avenues you've exhausted, forgetting things, etc.&lt;/li&gt;
&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;What I Wish I'd Done&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>BSides SF CTF by MAD Security, Part 3</title><link>https://systemoverlord.com/2013/03/03/bsides-sf-ctf-by-mad-security-part-3/</link><pubDate>Sun, 03 Mar 2013 19:41:47 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2013/03/03/bsides-sf-ctf-by-mad-security-part-3/</guid><description>&lt;p&gt;This is a continuation of my &lt;a href="https://systemoverlord.com/2013/03/02/bsides-sf-ctf-by-mad-security-part-1" style="outline: none; color: rgb(26, 150, 212); font-family: Arial, Verdana, Helvetica, sans-serif;"&gt;write-up of the BSides SF 2013 CTF&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Level 5: Phone Work&lt;/strong&gt;&lt;br /&gt;
	This level required that we find a phone number on the Absurdistani snoop's computer and gain access to the voicemail box associated with the number.  Finding the number was straightforward -- there was an email draft that contained the signature of the snoop, and in that signature was his phone number and voice mail box number.  (This also lets us know his name is Marco.)  Calling the phone number and entering the VM box number, we're asked for the PIN of the voicemail box.  After trying some obvious things (the VM box number, the last 4 digits of the phone number, 1234, 0000, etc.) I started looking through his machine for any clues, but his machine was very sparsely populated with files.  So, off to the internet for &lt;a href="http://mashable.com/2012/09/24/pin-number-top-20/"&gt;a list of the most common pins&lt;/a&gt;.  Yeah, humans are predictable... the top 20 PINs (20/10000 =~ 0.2% of pins) represent a whopping 27% of PINs in use.  Turns out Marco was that predictable too.  One of the top 10 and we're in!  The voicemail tells Marco that his new secure key is available on the secure keyserver, which he can retrieve using the 15 digit project access code.&lt;/p&gt;</description></item><item><title>BSides SF CTF by MAD Security, Part 2</title><link>https://systemoverlord.com/2013/03/03/bsides-sf-ctf-by-mad-security-part-2/</link><pubDate>Sun, 03 Mar 2013 00:43:10 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2013/03/03/bsides-sf-ctf-by-mad-security-part-2/</guid><description>&lt;p&gt;This is a continuation of my &lt;a href="https://systemoverlord.com/2013/03/02/bsides-sf-ctf-by-mad-security-part-1"&gt;write-up of the BSides SF 2013 CTF&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Level 3: Disk Forensics&lt;/strong&gt;&lt;br /&gt;
	A professional cleaner who has done some work for Nick provides you with an image of a flash drive, and you're to find the most "interesting file" on the drive and provide its md5sum.  The first thing I do is run &lt;tt&gt;file&lt;/tt&gt; on the image to get an idea of what we're working with:&lt;/p&gt;</description></item><item><title>BSides SF CTF by MAD Security, Part 1</title><link>https://systemoverlord.com/2013/03/02/bsides-sf-ctf-by-mad-security-part-1/</link><pubDate>Sat, 02 Mar 2013 07:47:38 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2013/03/02/bsides-sf-ctf-by-mad-security-part-1/</guid><description>&lt;p&gt;Last weekend I was at BSides SF and had the opportunity to participate in the Capture the Flag competition run by MAD Security/The Hacker Academy. I was able to clear 6 of the levels, and thought I'd write them up here to share my experience. Most of this is from my memory, so there might be a few inaccuracies, but the intent is to share the general concepts, not the specifics.&lt;/p&gt;</description></item></channel></rss>