<?xml version='1.0' encoding='utf-8' ?>
<!-- Made with love by pretalx v2026.1.0.dev0. -->
<schedule>
    <generator name="pretalx" version="2026.1.0.dev0" />
    <version>0.7</version>
    <conference>
        <title>Bsides London 2024</title>
        <acronym>bsides-london-2024</acronym>
        <start>2024-12-14</start>
        <end>2024-12-14</end>
        <days>1</days>
        <timeslot_duration>00:05</timeslot_duration>
        <base_url>https://cfp.securitybsides.org.uk</base_url>
        <logo>https://cfp.securitybsides.org.uk/media/bsides-london-2024/img/Bsides_David_2_XpG0Hu6.jpg</logo>
        <time_zone_name>Europe/London</time_zone_name>
        
        
        <track name="Workshops" slug="4947-workshops"  color="#22ba76" />
        
        <track name="Mentors" slug="4949-mentors"  color="#4220c8" />
        
        <track name="Rookies" slug="4951-rookies"  color="#d01515" />
        
        <track name="Main talk track" slug="4946-main-talk-track"  color="#7c0c8a" />
        
        <track name="Aerospace Village" slug="5297-aerospace-village"  color="#bbbbbb" />
        
        <track name="Car Hacking Village" slug="5294-car-hacking-village"  color="#d65432" />
        
        <track name="InfoSec Battlebots" slug="5293-infosec-battlebots"  color="#a12366" />
        
        <track name="Lock Picking Village" slug="5295-lock-picking-village"  color="#a3e456" />
        
        <track name="Malware Village" slug="5349-malware-village"  color="#d5dd45" />
        
        <track name="Quantum Village" slug="5296-quantum-village"  color="#b55425" />
        
        <track name="Train Hacking Village" slug="5298-train-hacking-village"  color="#477777" />
        
    </conference>
    <day index='1' date='2024-12-14' start='2024-12-14T04:00:00+00:00' end='2024-12-15T03:59:00+00:00'>
        <room name='Clappy Monkey Track' guid='d848d81b-97fa-5061-8baf-96160d7a57dc'>
            <event guid='deca5129-d915-59ab-b70e-7b930ea5e300' id='56941' code='WZXUTA'>
                <room>Clappy Monkey Track</room>
                <title>BYOTB - Bring Your Own Trusted Binary</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-14T10:00:00+00:00</date>
                <start>10:00</start>
                <duration>00:45</duration>
                <abstract>Ever tried to get a callback from a client device only to be continually thwarted by their EDR, so you then have to ask for an exclusion to be placed on a specific folder? Join Red Teamer David Kennedy as he walks you through a novel way of approaching this conundrum by (ab)using trusted binaries that EDR&#8217;s normally pay very little attention to. 

This presentation will cover the execution of these trusted binaries on Windows as well as running them in ways that even the original developers haven&#8217;t advertised as being possible via &#8216;undocumented features&#8217; within their code! With these techniques, struggling to get access to your client&#8217;s infrastructure should hopefully become a thing of the past or at least until these binaries are no longer trusted!</abstract>
                <slug>bsides-london-2024-56941-byotb-bring-your-own-trusted-binary</slug>
                <track>Main talk track</track>
                
                <persons>
                    <person id='58720'>David Kennedy</person>
                </persons>
                <language>en</language>
                <description>Security professionals are locked in a constant cat-and-mouse game with attackers who continuously find creative ways to bypass modern defences. One such technique is Bring Your Own Trusted Binaries (BYOTB)&#169;, where attackers use legitimate, signed or checksum verified binaries which may not be present on the host machine to achieve their aims. Since these binaries are oftentimes trusted by the OS and EDR solutions, they are less likely to raise red flags, providing attackers with a stealthy way to circumvent traditional security mechanisms.

This session will explore how the BYOTB technique works, some examples of trusted binaries and why they are so effective at bypassing EDR solutions.

I&apos;ll cover:
 - Understanding the BYOTB idea: I will explain which trusted binaries are used and how they can provide access to external adversaries and testers alike. 
 - EDR and Firewall Evasion Tactics: I will demonstrate how adversaries leverage trusted binaries to exploit gaps in EDR detection as well as bypassing modern firewalls.
 - Detection and Mitigation Strategies: The concluding section of the talk will focus on defensive measures. I&#8217;ll discuss practical detection techniques, including monitoring the usage of known binaries, and implementing tighter security controls around execution policies for certain trusted binaries.

This talk is geared towards a technical audience, including Red Teamers and Pentesters looking to understand how to exploit these techniques as well as Blue Teamers interested in improving their detection and mitigation strategies. Attendees will leave with actionable insights into how they can detect BYOTB techniques in their environments, as well as best practices for preventing such attacks from slipping through the cracks.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/WZXUTA/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/WZXUTA/feedback/</feedback_url>
            </event>
            <event guid='3c1ea3a5-a58f-5269-b2da-5f55f117703c' id='55834' code='EHBRYZ'>
                <room>Clappy Monkey Track</room>
                <title>The Practical Application of Indirect Prompt Injection Attacks: From Academia to Industry</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-14T10:55:00+00:00</date>
                <start>10:55</start>
                <duration>00:45</duration>
                <abstract>Indirect Prompt Injection (IPI) is a fascinating exploit. As organizations race to capitalize on the hype surrounding AI, Large Language Models are being increasingly integrated with existing back-end services. In theory, many of these implementations are vulnerable to Indirect Prompt Injection, allowing cunning attackers to execute arbitrary malicious actions in the context of a victim user. In practice, IPI is poorly understood outside of academia, with few real-world findings and even fewer practical explanations.

This presentation seeks to bridge the gap between academia and industry by introducing the Indirect Prompt Injection Methodology - a structured approach to finding and exploiting IPI vulnerabilities. By analyzing each step, examining sample prompts, and breaking down case studies, participants will gain insights into constructing Indirect Prompt Injection attacks and reproducing similar findings in other applications.

Finally, the talk will cover IPI mitigations, elaborating on why this vulnerability is so difficult to defend against. The presentation will provide practical knowledge on securing LLM applications against IPI and highlight how this exploit poses a major roadblock to the future of advanced AI implementations.</abstract>
                <slug>bsides-london-2024-55834-the-practical-application-of-indirect-prompt-injection-attacks-from-academia-to-industry</slug>
                <track>Main talk track</track>
                
                <persons>
                    <person id='57721'>David Willis-Owen</person>
                </persons>
                <language>en</language>
                <description>For further clarity on any sections, please refer to my white paper: https://www.researchgate.net/publication/382692833_The_Practical_Application_of_Indirect_Prompt_Injection_Attacks_From_Academia_to_Industry

----------------------------------------------------------------------------------------
1. PROMPT INJECTION - THE PROBLEM AFFECTING ALL LLMS
-----------------------------------------------------------------------------------------

Definition

- Prompt injection was originally used to describe attacks where untrusted user input was concatenated with a trusted prompt in an application.
- The definition has expanded to include any prompt that causes an LLM to perform harmful actions - to avoid confusion, the latter definition will be used in this presentation.

The Problem

- All LLMs are vulnerable to prompt injection!
- In web application security, the most effective way to prevent injection attacks is to maintain a small allowlist of known safe input values.
- Applying this to LLMs would render them functionally useless - the value of LLMs comes from being able to answer any query.
- Instead, organizations like OpenAI are training LLMs to detect and block common prompt injection techniques.
- Attackers can easily formulate new techniques since they can use any characters and words to craft prompt injections.

------------------------------------------------
2. INDIRECT PROMPT INJECTION
------------------------------------------------

Attack Sequence

- Breaking down the anatomy of an indirect prompt injection attack as follows, along with a diagram:
    1. An attacker injects a malicious prompt into a resource which they know LLMs
    will read from.
    2. A victim user asks an LLM to read from this resource.
    3. The LLM visits the resource and reads in the malicious prompt.
    4. The LLM performs the actions specified in the malicious prompt.
- When an LLM reads in data from an attacker-injectable source, the chat should be considered COMPROMISED, since it may contain a malicious prompt.

Impacts

- The main impacts of regular prompt injection are generating harmful content  - which only negatively impacts an LLM provider&apos;s reputation - and attacks launched against an application or service that ingests an LLM&apos;s input or output.
- The main impacts of IPI are socially engineering a user by instructing the LLM to provide misleading information to the victim or performing arbitrary actions on behalf of users. The latter impact is more interesting and will be the focus of the remaining presentation.
- The impact of an Indirect Prompt Injection attack directly depends on the actions an LLM has access to perform. Actions can be chained to cause a greater impact.

Vulnerability Criteria

1. Can an attacker inject into a source the LLM will read from? This can be a public source, e.g. a social media comment, or it can be a victim&apos;s private source which an attacker can send data to, e.g. an email inbox.

2. Can the LLM perform any actions that could harm a user? Consider any actions that could impact the CIA triad of a user&apos;s data, e.g. deleting a victim&apos;s GitHub branch.

3. Can the LLM perform this harmful action after reading from the injectable
source? LLMs can do this in most cases, but developers may implement logic to prevent this from happening as IPI attacks become more prevalent.

------------------------------------------------------------------------
3. INDIRECT PROMPT INJECTION METHODOLOGY
------------------------------------------------------------------------

This section introduces the Indirect Prompt Injection Methodology, along with a diagram. In the presentation, sample prompts will be attached for each relevant step:

Explore the attack surface

1. Map out all harmful actions the LLM has access to perform - Ask the LLM to provide a list of all functions it can invoke. Analyze the list and write down the harmful actions.

2. Map out all attacker-injectable sources the LLM can read from - Ask the LLM to provide a list of all data sources it can read from. Analyze the list and write down the sources you could inject a prompt into.

3. Attempt to obtain the system prompt - Ask the LLM to provide the statements programmed into it by its developer, allowing you to see any verbal guardrails that you may need to bypass. 

Craft the exploit

For each source-action pairing:

4. Determine if the LLM can be pre-authorized to perform the action - Certain LLMs may ask the user to approve an action before carrying it out. By tailoring the prompt you may be able to provide pre-approval, convincing the LLM to carry out the action without delay!

5. Inject a more persuasive prompt into the source - The indirectly injected prompt needs to be made more convincing to an LLM since it will carry less conversational weight than the user&apos;s initial request. By emphasizing key parts of the prompt with mock Markdown, repeating sentences, and tailoring the prompt semantics to the observed behavior, you can craft a successful exploit. These techniques will be clearly showcased in the presentation.

6. Ask the LLM to read from the source and observe if the action occurs - Simulate a plausible user query, e.g. &quot;visit this URL: {url}&quot;. The LLM should read from the injected source and carry out the actions set out in the prompt injection.  

Refine the prompt

7. Repeat steps 5 and 6, iteratively modifying the prompt until the attack is
successful - If the attack is unsuccessful, systematically make small changes until you achieve success. A table will be provided in the presentation to facilitate this process.

-------------------------------------------------------------------------------
4. CASE STUDY - MAVY GPT CALENDAR EXFILTRATION
-------------------------------------------------------------------------------

Background

- Mavy GPT is a personal assistant on the GPT Plus store that allows people to send emails and view their Google calendars by hooking into Google APIs.

Applying IPIM

- This is a walkthrough of each step in IPIM, applied to MavyGPT. Screenshots for each step are provided:

1. Map harmful actions - I obtained a list of 7 actions, considered the impact of each and noted down &quot;Send Email&quot; as potentially harmful. I recorded the associated function call.

2. Map injectable sources - I obtained a list of 3 actions that read from injectable sources and noted down &quot;Google Calendar&quot; as an injectable source.

3. Obtain the system prompt - I asked Mavy for its system prompt and it immediately complied - I noted this down.

4. Determine if LLM can be pre-authorized - I pasted the function call from earlier and Mavy complied immediately.

5. Inject a more persuasive prompt - I considered a potential attack chain - asking Mavy to summarize all user events in the Google Calendar, then asking it to email this to me. I iterated several times to craft a prompt that allowed me to execute the chain. This will be provided in the presentation, along with a breakdown of each sentence in the prompt.

6. Ask LLM to read from the source - I sent a calendar invite containing the prompt injection as its description to the mock victim, then asked Mavy to print the event description in the victim&apos;s session. As expected Mavy summarized all events in the calendar and emailed them back to me. Video evidence will be provided, serving as a POC and a demo. 

Impact

- Many users store private information in their calendars such as locations, relative names, and even credentials. An attacker could sell this information or use it to launch further attacks.

-------------------------------------------------------------------------------------
5. INDIRECT PROMPT INJECTION PRACTICAL MITIGATIONS
-------------------------------------------------------------------------------------

Instruction Hierarchy

- Proposed by OpenAI earlier this year - treats externally ingested data as lower-privileged.
- Shows an improvement against prompt injection benchmarks, but can be bypassed by crafting better payloads.

Human-in-the-loop

- A human has to approve each action an LLM will take. Theoretically, this prevents any unwanted actions.
- Implementing this effectively causes a poor user experience, making developers unlikely to use it properly.

No Actions After Reads

- Server-side logic which prevents any actions from occurring after an LLM has ingested external data.
- This compromises the functionality of an LLM, again worsening user experience.

Mitigation Summary

- Current mitigations are either not 100% effective or severely impact user experience, making Indirect Prompt Injection difficult to defend against.

----------------------------
6. LOOKING AHEAD
----------------------------

The Future of Indirect Prompt Injection

- IPI is a serious issue - the same techniques outlined in IPIM could be used to exploit future AI implementations linked to critical infrastructure, leading to devastating impacts.
- Human-in-the-loop or &quot;no actions after reads&quot; could be implemented, but this would limit the value of these AI implementations by stripping their autonomy.

Application and Future Development of IPIM

- IPIM will be maintained and updated on GitHub to ensure its continued relevance in the AI space.

-----------------------
7. CONCLUSION
-----------------------

- IPI is a serious issue
- IPIM bridges the gap between academia and industry, improving awareness of IPI and contributing to the future of AI Security.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/EHBRYZ/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/EHBRYZ/feedback/</feedback_url>
            </event>
            <event guid='0d32973f-8f3e-52b4-9b1f-3b0c946a3dbf' id='55716' code='HYSYLN'>
                <room>Clappy Monkey Track</room>
                <title>CyberHUMINT: Recruit, Deceive, Exploit</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-14T11:50:00+00:00</date>
                <start>11:50</start>
                <duration>00:45</duration>
                <abstract>After introducing the Bsides audience to the Fligistan Intelligence Bureau at Bsides Cymru 2024, we wanted to expand that for the London audience by diving deep into the world of Cyber HUMINT. This talk will delve into how Fligistan deploys tactics, technologies, people and processes, and then pivot to how we can use that knowledge, as cyber practitioners, to gain insight for our own defenses and offensive security.</abstract>
                <slug>bsides-london-2024-55716-cyberhumint-recruit-deceive-exploit</slug>
                <track>Main talk track</track>
                
                <persons>
                    <person id='57626'>Tony Gee</person><person id='57627'>Hugo Page-Turner</person>
                </persons>
                <language>en</language>
                <description>At Bsides Cymru we introduced the audience to what modern intelligence apparatus looks like using the fictional country of Fligistan. This talk builds upon that and focuses on Cyber HUMINT, the fusion of traditional human intelligence (HUMINT) with cyber operations.  It is a powerful tool for both attackers and defenders. In this talk we explore how CyberHUMINT exploits human vulnerabilities, leverages social engineering, and manipulates insider threats, leading to significant risks such as data breaches or disclosure of corporate secrets. We&#8217;ll examine real world examples where adversaries use remote working job opportunities for infiltration, platforms like LinkedIn for agent recruitment, using avatars for covert dark web operations, and psychological manipulation through bot farms and psyops to influence and deceive organisational and military targets.

We will also delve into how behavioral analysis and patterns of life in computer networks and subcultures can help to identify malicious actors early. Attendees will gain actionable insights on how to recognise and mitigate insider threats, as well as the critical role CyberHUMINT plays in understanding patterns of life and digital behaviour. Whether you&#8217;re part of the Fligistan red team, social engineering corps, or an intelligence analyst,  this session will equip you with the tools to protect your organisation from advanced human and cyber-based threats.</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/HYSYLN/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/HYSYLN/feedback/</feedback_url>
            </event>
            <event guid='e8131abb-6a56-5fbb-942a-042245a49c7d' id='54601' code='LV7GFV'>
                <room>Clappy Monkey Track</room>
                <title>SSRF&#178; | Breaking Trust Zones Through Self-Reference</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-14T12:55:00+00:00</date>
                <start>12:55</start>
                <duration>00:45</duration>
                <abstract>In modern web architectures, SSRF vulnerabilities have become increasingly difficult to exploit due to sophisticated defense mechanisms. This presentation introduces SSRF&#178; - a novel technique that challenges fundamental assumptions about trust boundaries by using the same SSRF primitive twice across different security contexts. Through real-world discoveries, we demonstrate how a seemingly limited SSRF primitive, when used twice, can bypass an entire security stack designed to prevent internal access. What makes this technique particularly powerful is its ability to transform restricted blind SSRF vulnerabilities into critical security breaches without complex chains or extensive reconnaissance.</abstract>
                <slug>bsides-london-2024-54601-ssrf-breaking-trust-zones-through-self-reference</slug>
                <track>Main talk track</track>
                
                <persons>
                    <person id='56602'>Guy  Arazi</person>
                </persons>
                <language>en</language>
                <description>This talk introduces a groundbreaking approach to SSRF exploitation that fundamentally changes how we think about trust boundaries and security contexts. Rather than focusing on finding new SSRF vectors, we&apos;ll demonstrate how using the same primitive twice can bypass sophisticated security controls including URL rewrite rules, origin validation, and network segregation.

Key takeaways:
- How a single SSRF primitive can be leveraged across different security contexts
- Why position matters more than payload in modern architectures
- Real-world examples of bypassing Kubernetes API protections
- Turning blind SSRF into critical internal access
- New methodology for approaching SSRF research

Through live demonstrations and real-world cases, attendees will learn how traditional security controls can fail when the same primitive operates across different trust contexts. This research provides valuable insights for both offensive security researchers looking to expand their methodology and defenders implementing trust boundaries.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/LV7GFV/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/LV7GFV/feedback/</feedback_url>
            </event>
            <event guid='da705cf1-927e-54da-aecb-6498fb9d396e' id='55533' code='RHQA9X'>
                <room>Clappy Monkey Track</room>
                <title>Inside the Ransomware Toolbox: How to Beat Cybercriminals at Their Own Game</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-14T13:50:00+00:00</date>
                <start>13:50</start>
                <duration>00:45</duration>
                <abstract>Let&#8217;s face it: ransomware operators are the digital villains we all love to hate. But what if I told you there&apos;s a way to outsmart these cybercriminals by using their own tools against them? Join me in taking the red pill, to find out about the &quot;Ransomware Tool Matrix,&quot; your new secret weapon in the fight against cyber extortionists.</abstract>
                <slug>bsides-london-2024-55533-inside-the-ransomware-toolbox-how-to-beat-cybercriminals-at-their-own-game</slug>
                <track>Main talk track</track>
                
                <persons>
                    <person id='57494'>Will Thomas</person>
                </persons>
                <language>en</language>
                <description>In this session, we will at into the inner workings of ransomware gang attack paths and unpack the exact sets of tools they use to wreak havoc. Imagine having a cheat sheet that tells you exactly what the cyber baddies are up to before they even hit your network. Sounds like a game-changer, right?

We will find out how this matrix can supercharge your threat hunting, boost your incident response game, and help you simulate attacks just like the pros. But it&#8217;s not all smooth sailing&#8212;we&#8217;ll also talk about the tricky bits, like figuring out if a tool is being used by a cybercriminal or just your IT team.

Why should you join? Because you&apos;ll walk away with:
- Insider knowledge on the tools and tactics of the biggest ransomware gangs.
- Practical tips to turn these insights into action&#8212;detect, block, and stay ahead of attacks.
- A fresh perspective on using intelligence to not just survive, but thrive in today&#8217;s threat landscape.
- Whether you&#8217;re a seasoned defender or just stepping into the world of cybersecurity, this talk will arm you with the strategies to beat these pesky cybercriminals at their own game. 

Come ready to learn, laugh, and leave with a whole new set of ideas to take back to work.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/RHQA9X/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/RHQA9X/feedback/</feedback_url>
            </event>
            <event guid='2eda79f6-5ebb-53e4-9bb7-7408650032aa' id='55907' code='GXUA37'>
                <room>Clappy Monkey Track</room>
                <title>From Garden to Grid: Lessons from Gardening for a Resilient Cybersecurity Strategy</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-14T14:45:00+00:00</date>
                <start>14:45</start>
                <duration>00:45</duration>
                <abstract>In today&apos;s rapidly evolving digital landscape, cybersecurity professionals are constantly seeking innovative strategies to protect their systems. Surprisingly, some of the most powerful lessons can be found in a place often overlooked&#8212;the garden. This talk, &quot;From Garden to Grid,&quot; draws thought-provoking parallels between gardening practices and cybersecurity strategies, offering a fresh perspective on how we can cultivate a more resilient and adaptive approach to protecting our digital environments.

By exploring key principles such as nurturing growth, pruning for efficiency, building resilience, and harvesting success, this presentation will highlight actionable insights that cybersecurity professionals can apply to their daily work. The talk will delve into topics such as continuous learning and innovation, streamlining security processes, safeguarding systems against threats, and celebrating wins by measuring key performance metrics. Attendees will leave with a deeper understanding of how these natural principles can inspire a sustainable, secure, and forward-thinking cybersecurity strategy.

This session will benefit cybersecurity professionals seeking to enhance their strategic approach by embracing a mindset that encourages adaptability, efficiency, and resilience&#8212;qualities essential for thriving in both the digital and natural worlds.</abstract>
                <slug>bsides-london-2024-55907-from-garden-to-grid-lessons-from-gardening-for-a-resilient-cybersecurity-strategy</slug>
                <track>Main talk track</track>
                
                <persons>
                    <person id='57787'>Becky Hall</person>
                </persons>
                <language>en</language>
                <description>In an increasingly complex digital world, cybersecurity professionals are continuously looking for new ways to strengthen their defenses and build resilient systems. 
This talk, &quot;From Garden to Grid,&quot; introduces a fresh and unexpected perspective by exploring how the principles of gardening can be applied to cybersecurity to create stronger, more adaptable strategies.

Drawing parallels between gardening practices&#8212;such as nurturing growth, pruning for efficiency, building resilience, and harvesting success&#8212;and essential cybersecurity approaches, this session will provide practical, actionable insights for security professionals. 
Attendees will learn how:
Continuous learning and innovation, akin to nurturing a garden, can foster growth in security practices.
Pruning unnecessary or outdated systems, much like trimming overgrown plants, can streamline security operations and reduce vulnerabilities.
Building resilience through backup systems and response plans mirrors the way gardeners protect plants from external threats.
Measuring success and reflecting on achievements, just like harvesting in gardening, ensures sustained cybersecurity effectiveness.
Through relatable analogies and real-world examples, this session will inspire attendees to rethink their cybersecurity strategies with a focus on adaptability, efficiency, and long-term sustainability. Perfect for professionals at all levels, this talk will equip participants with the tools and mindset needed to cultivate a digital environment that thrives in the face of emerging threats.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/GXUA37/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/GXUA37/feedback/</feedback_url>
            </event>
            <event guid='f197743c-24e2-56fa-b433-c1d425f81221' id='55862' code='DAM993'>
                <room>Clappy Monkey Track</room>
                <title>Inside the Phish Tank: A Guide to Compromising Phishing Infrastructure</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-14T15:40:00+00:00</date>
                <start>15:40</start>
                <duration>00:45</duration>
                <abstract>Criminal groups rely on phishing web panels to manage their campaigns and interactions against ordinary people. Due to its nature, information showing the details and complexity of these platforms is not widely available. In this presentation, we will delve into the strategies and methodologies for infiltrating and commandeering the web panels used by phishing groups to manage their campaigns against ordinary people.</abstract>
                <slug>bsides-london-2024-55862-inside-the-phish-tank-a-guide-to-compromising-phishing-infrastructure</slug>
                <track>Main talk track</track>
                
                <persons>
                    <person id='57743'>Vangelis Stykas</person><person id='57763'>Felipe Solferini</person>
                </persons>
                <language>en</language>
                <description>We will demonstrate how to leverage these vulnerabilities to gain unauthorised access to their phishing infrastructure. This can be used to gather intelligence to help identify the threat actors operating these panels, disrupt their operations, and minimise the damage caused to their victims. Through this session, we aim to provide valuable insights and encourage proactive, ethical approaches to combating cyber threats.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/DAM993/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/DAM993/feedback/</feedback_url>
            </event>
            <event guid='40030565-c427-5898-b6d1-71a7108ad8bc' id='56921' code='AFDMQM'>
                <room>Clappy Monkey Track</room>
                <title>Building the ATT&amp;CK pipeline for Linux</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-14T16:35:00+00:00</date>
                <start>16:35</start>
                <duration>00:45</duration>
                <abstract>ATT&amp;CK is a game changer and where it works, it can enable both blue and red teams to co-exist and work effectively together. However, what do attackers on Linux do when bitcoin miners aren&apos;t their motivation? This talk looks at how the linux-malware repo came to take shape and how I&apos;ve used it to inform both MITRE and Cisco&apos;s view on adversarial behaviour over the last three years.</abstract>
                <slug>bsides-london-2024-56921-building-the-att-ck-pipeline-for-linux</slug>
                <track>Main talk track</track>
                
                <persons>
                    <person id='58707'>Tim Wadhwa-Brown</person>
                </persons>
                <language>en</language>
                <description>The session will cover:

* Introducing linux-malware - what is it and why might both red and blue want to pay attention?
* Automating the TI pipeline - applying custom analytics to someone else&apos;s DFIR report?
* What new threats should you worry about and why - Linux is unhackable, right?
* Building better detections - how can you figure out whether you&apos;re exposed?

Takeaways will include:

* A summary of the Linux threat landscape
* Just because we&apos;re not looking for the bad guys, doesn&apos;t mean they&apos;re not there
* Attackers will use the easiest TTP that gets them to a root prompt
* If you&apos;re running adversary simulations, here are some non-Windows TTPs you should consider
* If you&apos;re playing defence, this is how you develop behavioural IOCs and tools to leverage them</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/AFDMQM/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/AFDMQM/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Track 2' guid='911d6e46-4d32-5fb9-b8a7-f6dc9f2db9b2'>
            <event guid='c72cf741-adb6-5b36-8bf8-461b8a730f06' id='55596' code='7GAQNS'>
                <room>Track 2</room>
                <title>Unmasking APT Malware Activity: Real-World Malware Campaign Tracking Using Big Data Analytics and Machine Learning Clustering</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-14T10:00:00+00:00</date>
                <start>10:00</start>
                <duration>00:45</duration>
                <abstract>Our talk introduces an innovative framework for automating the identification and handling of malware samples targeting web servers, leveraging big data analytics and machine learning to cluster and track active malware campaigns. We will demonstrate an innovative and unique framework that employs heuristic analysis to autonomously identify and process web-delivered malware samples. This framework enhances the efficiency and accuracy of malware detection in large data sets, reducing the reliance on manual intervention, and enabling near real-time threat hunting, and campaign tracking. 

Building upon the collected malware data, we utilize big data analytics techniques to track and monitor malwares, cluster similar malware samples and associated network activity, to unveil patterns and connections between various campaigns. This clustering approach provides deeper insights into the tactics, techniques, and procedures (TTPs) employed by threat actors, facilitating the identification of overarching strategies and objectives. 

We will conclude with a detailed analysis of notable real-world malware campaigns identified through this system. Attendees will gain insights into the operational methodologies of these campaigns, their impact and the defensive measures that can be employed. Case studies will highlight real-world applications and the effectiveness of our automated approach in enhancing cybersecurity posture.</abstract>
                <slug>bsides-london-2024-55596-unmasking-apt-malware-activity-real-world-malware-campaign-tracking-using-big-data-analytics-and-machine-learning-clustering</slug>
                <track>Main talk track</track>
                
                <persons>
                    <person id='57542'>Daniel Johnston</person><person id='60818'>Ori Nakar</person>
                </persons>
                <language>en</language>
                <description>In this talk we will conduct a deep dive into the framework we developed for automating the identification and handling of malware samples targeting web servers, it will consist of four parts:

Part 1: Introduction

- Provide a baseline understanding of how threat actors can leverage web vulnerabilities to deploy malware.
- Introduce the challenge of identifying, clustering and tracking malware data in the real world.
- Introduction to the data we collect, with a focus on the real-world malware data we track.
- Discuss what can be gained by effectively identifying and tracking malware campaigns in real world scenarios.

Part 2: Automated Malware Handling

- Explain and demonstrate the framework we developed to automate the handling of web-delivered malware samples, including:
1. Identification of malware delivery using RCE attacks against web applications.
2. Safe downloading, storing and analysis of identified samples using a sandboxed environment.
3. Importing sample information to enrich existing data.

Part 3: Clustering of Malware data and Anomaly Detection

- Using big data analytics to aggregate data from multiple cloud regions, and calculate distances for clustering
- Demonstrate a novel open source tool we developed, for counters collection, aggregation and anomaly detection powered by an SQL engine and cloud functions
- Explain how the tool utilizes advanced detection methods for trends and patterns in the malware data

Part 4: Identified Campaigns

Review several campaigns detected by the framework, including:
- Sysrv Botnet: How we identified and correlated events related to activity of the Sysrv botnet, uncovering new attack vectors and TTPs. (https://tinyurl.com/sysrvb)
- AndroxGhost: How we identified AndroxGh0st malware activity, and were able to provide previously undocumented TTPs and attack vectors augmenting a previously published report by CISA. (https://tinyurl.com/axghost)
- TellYouThePass: How we quickly uncovered a malicious campaign to deliver TellYouThePass ransomware leveraging the new PHP vulnerability CVE-2024-4577. (https://tinyurl.com/tytpr)
- 8220 Gang: How we exposed new tactics and vectors utilized by the well-known threat actors 8220 Gang. (https://tinyurl.com/8220gang)
- APT29: How we were able to identify and track activity from the Russian APT specifically targeting Polish Government domains to drop RAT Malware (unpublished)


Atendees can expect the following takeaways:

1. Utilizing a combination of automation, big data analytics, and anomaly detection allows you to effectively identify and track cyber attacks. Usage of common tools like cloud data lakes and managed query engines can make such tasks quick and efficient.

2. Many threat actors, including APT groups, commonly use web vulnerabilities to target nation states and propagate dangerous malware. This activity can be consistently detected using the demonstrated framework.

3. Identification, correlation and tracking of malware campaign activity is of interest to a wide demographic within the security community, we aim to provide a useful set of ideas and tools to assist with this difficult problem.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/7GAQNS/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/7GAQNS/feedback/</feedback_url>
            </event>
            <event guid='6ee6ad30-1f00-52cc-b5b9-77d87f405e3a' id='56708' code='8Z8VTW'>
                <room>Track 2</room>
                <title>To you its a Black Swan, to me its a Tuesday</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-14T10:55:00+00:00</date>
                <start>10:55</start>
                <duration>00:45</duration>
                <abstract>In cybersecurity, Black Swan events are seen as rare, high impact threats or attacks from unknown or neglected vectors, that post event are rationalised as predictable in hindsight despite being unforeseen at the time.  Our role in Cybersecurity is to help organisations prepare for the worst but how can we prepare for unpredictable, rare, high impact events? This talk will examine some real-world Black Swan breaches and then discuss approaches company&apos;s can take to prepare for them.</abstract>
                <slug>bsides-london-2024-56708-to-you-its-a-black-swan-to-me-its-a-tuesday</slug>
                <track>Main talk track</track>
                
                <persons>
                    <person id='58566'>David V.</person>
                </persons>
                <language>en</language>
                <description>This talk takes a real-world look at how red teams help organisations prepare for incidents. Starting with a light touch review of real-world high impact &quot;black swan&quot; breaches to show why we should try to do such testing. We will then look at how we can design red team engagements to test similar high impact scenarios, and what skills are needed to deliver such testing. We will finish off the talk with looking at the practical steps we can advise organisations to take to prepare for the worst.</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/8Z8VTW/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/8Z8VTW/feedback/</feedback_url>
            </event>
            <event guid='690db21c-51a8-5057-ac59-b4e38a09c4ab' id='57019' code='PHX7TQ'>
                <room>Track 2</room>
                <title>Software security issues for small IoT SoCs</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-14T11:50:00+00:00</date>
                <start>11:50</start>
                <duration>00:45</duration>
                <abstract>Ever wondered how your smart toothbrush or connected garden rock stays secure in our digital world? As the Internet of Things (IoT) brings connectivity to everyday objects&#8212;from cars to clothing&#8212;it&apos;s more important than ever to keep these devices safe from cyber threats. But here&apos;s the challenge: many IoT gadgets run on tiny chips called Systems on Chip (SoCs) that don&apos;t have the power of full-sized computers, making them uniquely vulnerable.

In this presentation, I&apos;ll guide you through the fascinating world of hardware/software binding&#8212;a key technique that ensures only authorized software runs on specific hardware. We&apos;ll explore how this practice helps protect IoT devices by linking software tightly to the hardware it runs on, preventing unauthorized code from sneaking in.

We&apos;ll look at different SoCs used in IoT devices, discuss SoC architecture, review the security methods provided (or not) by manufacturers, and dive into some cool techniques from research and industry. Don&apos;t worry if you&apos;re new to this&#8212;I&apos;ll break down the jargon and share practical insights from my own experiences in software development and security.

Plus, I&apos;ll introduce a handy questionnaire you can use when choosing SoCs for new products, helping you evaluate their security features with confidence. Whether you&apos;re just starting out in cybersecurity or simply curious about how to keep our connected world safe, this talk will give you the understanding and tools to make a real difference.</abstract>
                <slug>bsides-london-2024-57019-software-security-issues-for-small-iot-socs</slug>
                <track>Main talk track</track>
                
                <persons>
                    <person id='58780'>Stephen Cravey</person>
                </persons>
                <language>en</language>
                <description>As the Internet of Things (IoT) weaves itself into the fabric of our daily lives&#8212;from smart toothbrushes and connected cars to wearable tech and home gadgets&#8212;the security of these devices becomes more critical than ever. This presentation offers a friendly and accessible introduction to IoT security, focusing on Systems on Chip (SoCs) and the essential practice of hardware/software binding. It is based on my dissertation for the MSc Information Security program at RHUL.

We&apos;ll explore:

IoT and SoCs Demystified: Understand what IoT and SoCs are, and how they power the devices we use every day.
Unique Security Challenges: Learn about the vulnerabilities inherent in IoT devices due to their limited computational resources.
Hardware/Software Binding Concepts: Discover how binding software to hardware (and vice versa) prevents unauthorized access and enhances security.
Binding Methods and Solutions: Review current approaches from manufacturers and innovative solutions from academic and industry research, including their risks and limitations.
Physically Unclonable Functions (PUFs) and Hardware Security Modules (HSMs): Get introduced to these advanced security mechanisms and their practical applications in IoT devices.
Selecting Secure SoCs: Gain practical tips on choosing the right SoCs for new products, with examples of affordable development kits (often under &#163;10) that make this field accessible to all.
Security Evaluation Tool: Receive a handy security questionnaire designed to help you assess SoCs for product development and understand governance and lifecycle considerations.
Whether you&apos;re a beginner cybersecurity enthusiast, a developer looking to build secure products, a red teamer interested in potential attack surfaces, or simply curious about the gadgets around you, this session will equip you with the knowledge to make informed decisions and contribute to a safer, more secure IoT ecosystem.

Join us to explore how we can collectively enhance security in our increasingly connected world.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/PHX7TQ/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/PHX7TQ/feedback/</feedback_url>
            </event>
            <event guid='ae2d3721-6ff0-51ef-95ca-ca8b6dc3d5f0' id='56959' code='DBRFFP'>
                <room>Track 2</room>
                <title>What&#8217;s inside the open directory from 96 different threat actors?</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-14T12:55:00+00:00</date>
                <start>12:55</start>
                <duration>00:45</duration>
                <abstract>This talk examines how 96 threat actors disclosed their systems, logs, and tools in open directories, providing unique insights into their tactics and operations in real-time.</abstract>
                <slug>bsides-london-2024-56959-what-s-inside-the-open-directory-from-96-different-threat-actors</slug>
                <track>Main talk track</track>
                
                <persons>
                    <person id='58736'>Alana Witten</person>
                </persons>
                <language>en</language>
                <description>Understanding the TTPs used by threat actors is often only done after an incident when the damage is done, made from inferences of what they allow us to see. What if analysts had full access to exactly how these actors operate: the commands they ran, their targets, accurate geolocations, tools, and more. Luckily, over the last few years, 96 brazen threat actors, ranging from script kids to alleged APTs, made the decision to publish their systems, bash_history, log files, configs, source code, and more in open directories. Hopefully this talk begins to explore such open data.</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/DBRFFP/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/DBRFFP/feedback/</feedback_url>
            </event>
            <event guid='5dbe5467-28d7-55e4-b471-27017b5fd9e4' id='55826' code='P8GMHQ'>
                <room>Track 2</room>
                <title>Is Your Approach to Pipeline Security Flawed? Rethinking CI/CD Security</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-14T13:50:00+00:00</date>
                <start>13:50</start>
                <duration>00:45</duration>
                <abstract>With CI/CD pipelines driving modern DevSecOps, ensuring they don&apos;t become attack vectors is a shared concern across organisations. This talk introduces a new perspective focusing on provable CI/CD security, while steering away from securing pipelines directly. Maintain compliance, ensure visibility, and prevent potential threats from compromising critical systems by focusing on what really matters.</abstract>
                <slug>bsides-london-2024-55826-is-your-approach-to-pipeline-security-flawed-rethinking-ci-cd-security</slug>
                <track>Main talk track</track>
                
                <persons>
                    <person id='57712'>Patricia R</person>
                </persons>
                <language>en</language>
                <description>With DevSecOps becoming the standard, CI/CD pipelines have become the backbone of software development and deployment, running thousands of times a day. Each pipeline executes critical tasks such as building, testing, and deploying code - often leveraging automation and guardrails to ensure quality and security. Tools that integrate in pipelines promise to help.

But what exactly is a pipeline? What systems and resources does it interact with? And most importantly, how can we ensure that no pipeline becomes a pivot point for an attacker to compromise our most valuable systems? Can we be confident pipelines are running what we expect and providing the necessary data for other processes?

These questions point to a (perhaps overlooked) concept: Protected Resources. In this talk, we will explore how shifting to a new mindset could enhance visibility into pipelines, ensure adherence to security protocols, and prevent pipelines from becoming attack vectors. We&apos;ll delve into practical strategies to gain observability, improve compliance, and better secure your CI/CD system in the age of DevSecOps.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/P8GMHQ/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/P8GMHQ/feedback/</feedback_url>
            </event>
            <event guid='4d06b47c-29d1-5526-9531-ff63a5bfd51f' id='56748' code='EHRQSN'>
                <room>Track 2</room>
                <title>Roll your own vulnerabilities; an introduction to Fault-Injection for exploiting bug-free code in embedded systems.</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-14T14:45:00+00:00</date>
                <start>14:45</start>
                <duration>00:45</duration>
                <abstract>Embedded systems are everywhere, automating more and more of our everyday lives. Our cars, phones, games consoles, industrial controllers and IoT devices increasingly require security mechanisms to protect their security configurations, and in some cases, stored secrets, such as cryptographic keys, debug/flash protection access mechanisms, firmware images, and AI models. For a long time, local, physical attacks on general purpose microcontrollers were considered out of scope during threat analysis, but the increase in value of breaking the device security protections, the decrease in cost of the attacks, and the increase in awareness of such attacks, means that we&#8217;re in a transitional state regarding protection against fault-injection.</abstract>
                <slug>bsides-london-2024-56748-roll-your-own-vulnerabilities-an-introduction-to-fault-injection-for-exploiting-bug-free-code-in-embedded-systems</slug>
                <track>Main talk track</track>
                
                <persons>
                    <person id='58600'>@barsteward</person>
                </persons>
                <language>en</language>
                <description>This talk will introduce attendees to fault-injection, a local attack category which is often used as the first step in the attack chain for embedded systems, and in some cases can also lead to remote attacks. It will cover the techniques which attackers use to generate security violations such as bypassing read protection, secure boot, or debug protection in embedded systems, even when the code is completely free of bugs. You will learn about the attacker motivations, tools and techniques, as well as the methods used to harden devices against these attacks, and how increased public awareness, certification, and regulation is changing the landscape. You will see how the cost of the equipment needed is often very low, and learn how you can begin your &#8220;glitching&#8221; journey for under &#163;20.
We will look at the fault-injection mitigations added in the Raspberry Pi Pico 2, and consider their efficacy - there is currently a $20,000 bug bounty available for breaking these protections leading to recovery of a secret stored in the One-Time-Programmable flash memory. 
We shall also touch upon side-channel analysis, which can recover cryptographic keys in use through measurement and analysis of tiny power fluctuations, or even by using a coil to pick up electro-magnetic emanations.

Keywords/phrases:
- Embedded Systems
- Microcontrollers
- Hardware Attacks
- Fault-Injection
- Voltage Fault Injection (VFI)
- Electro-Magnetic Faul Injection (EMFI)
- Clock Fault Injection (CFI)
- Risk Assessment
- Threat Modelling
- Automotive
- Industrial Control Systems
- IoT
- Mitigation Strategies
- Raspberry Pi Pico 2
- Side-Channel Analysis</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/EHRQSN/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/EHRQSN/feedback/</feedback_url>
            </event>
            <event guid='dc6ed809-63bc-5e53-ba48-2ee50e9bf1ff' id='56950' code='HQ7GKR'>
                <room>Track 2</room>
                <title>Cybersecurity&#8217;s New Imperative:  Defending Enterprise and National Cognitive Infrastructures (by strengthening  the mental immune system)</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-14T15:40:00+00:00</date>
                <start>15:40</start>
                <duration>00:45</duration>
                <abstract>This Talk is Important&#8212;very important&#8212;for the cybersecurity industry, hackers, and policymakers from the Boardroom to the Halls of Government.

A long time ago, on June 27, 1991, Winn testified before the US Congress and was asked, &#8220;Mr. Schwartau: Why would the bad guys ever want to use the internet?&#8221; 

Today, our cognitive infrastructure is under attack, and humanity needs cybersecurity professionals more than ever. Reality is only a keystroke away. 

Metawar is the art and science of manipulating your reality. It is the battle for control over one&#8217;s belief systems, identity, and sense of reality outside one&#8217;s conscious awareness. Reason and emotion are incompatible operating systems. 

Big Tech is digitally terraforming the planet&#8217;s future cognitive infrastructure, Web 3.0, with little concern for the downsides. The metaverse is an evolving, immersive storytelling environment designed to be the most powerful and addictive reality distortion machine ever conceived. It will also predict and anticipate your every desire and every move! 

On the global stage, metawar represents the sixth domain of warfare. They who control the technology control the narrative. We have no choice but to learn how to coexist with the reality-distorting technologies we have created by implementing technical, policy, and cognitive defenses to protect our sense of truth, reality, and self-identity.

Winn&#8217;s keynote is a call to action.

The cybersecurity community is among the best problem solvers the planet has ever seen. It acts as a team, a collective of like-minded individuals with an amazing array of skills who stop at nothing to achieve their aims&#8212;against all odds. Winn challenges us with a new goal: Strengthen and defend the human mental immune system. Our brains, sensory nervous systems, and minds are the new attack surfaces. Will the cybersecurity community rise to the challenge of solving the most existential threat it has ever faced? Or not.

To survive, humanity must adapt to and Coexist with technology.</abstract>
                <slug>bsides-london-2024-56950-cybersecurity-s-new-imperative-defending-enterprise-and-national-cognitive-infrastructures-by-strengthening-the-mental-immune-system</slug>
                <track>Main talk track</track>
                
                <persons>
                    <person id='58728'>winn schwartau</person>
                </persons>
                <language>en</language>
                <description>Winn will make you question everything in your current reality. Ready?

How do you know what&apos;s real? Who controls and might be distorting your perception of reality? 

As technology intertwines with our lives in complex and sometimes hidden ways, these questions become more urgent. We face a world where the metaverse, TMI, algorithms, and digital addiction shape our everyday experiences. They who control the technology control the narrative. 

In 1991, Winn Schwartau, the civilian architect of information warfare postulated cyberwar in front of US Congress. Today, he warns that America faces a national security crisis; a cognitive Pearl Harbor waiting to happen. The lack of a national security imperative to strengthen our population&apos;s mental immune systems and our ability to coexist with technology makes Ame1ica&apos;s cognitive infrastructure essentially defenseless. 

Schwartau&apos;s Metawar Thesis employs an analogue engineering approach and a cybersecurity prism to view the disconnects between humans and technology. The Art &amp; Science of Metawar is a compelling and groundbreaking exploration of the forces shaping our reality and the personal, enterprise, and national security implications of cognitive conflict: metawar. Through a blend of technical insights and philosophical ref lections, Schwartau offers a roadmap of hope for strengthening our mental immune system and cognitive defenses to better coexist with the technology we now rely upon. 

The Art &amp; Science of Metawar serves as both a call to action and a guide to reclaiming control over our individual narratives in an increasingly aggressive digital landscape. 

Who controls your narrative? Are you ready to find out?</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments>
                    <attachment href="https://cfp.securitybsides.org.uk/media/bsides-london-2024/submissions/HQ7GKR/resources/A_Preview_of_Metawar_for_CONTENT_8Oct24_CDHxRPQ.pdf">The Art &amp; Science of Metawar: A Preview</attachment>
                </attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/HQ7GKR/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/HQ7GKR/feedback/</feedback_url>
            </event>
            <event guid='9095c83c-5a14-551c-906a-df2b5896a6f6' id='56104' code='RZCWXJ'>
                <room>Track 2</room>
                <title>The Past, Present and Future of Cloud-Native Security</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-14T16:35:00+00:00</date>
                <start>16:35</start>
                <duration>00:45</duration>
                <abstract>Cloud-native has revolutionised how we build and deploy applications, but let&apos;s face it - we&apos;ve made our share of mistakes along the way. From the early days of on-prem to today&apos;s massive cloud-native deployments, this has not only transformed application development but also dramatically reshaped the infrastructure, DevOps practices, and the overall security landscape. This talk takes a look at the evolution of cloud-native security, highlighting the real-world incidents and attack techniques that have evolved alongside our technologies.
We&apos;ll trace the threat landscape from on-prem to hybrid cloud to cloud-first, then dive deep into the current cloud-native risks: identity breaches, misconfigured cloud services, vulnerable CI/CD pipelines, and the long-standing threat of supply chain. We&apos;ll look ahead, exploring the emerging technologies that will shape the future of both attacks and defenses.
Wrapping up the session, actionable strategies to secure your cloud-native environment will be discussed, highlighting tools which can be used to proactively mitigate risks, enhance runtime visibility and automate security.</abstract>
                <slug>bsides-london-2024-56104-the-past-present-and-future-of-cloud-native-security</slug>
                <track>Main talk track</track>
                
                <persons>
                    <person id='57942'>Emma Yuan Fang</person>
                </persons>
                <language>en</language>
                <description>Key Takeaways:
Analyse the evolution of cloud-native security threats.
Learn how attack techniques evolved over time, and assess the shortcomings of addressing cloud-native security challenges.
Explore the future impacts and trends of cloud-native security and discover practical defense strategies.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/RZCWXJ/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/RZCWXJ/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Track 3' guid='b3030b13-a59b-510b-83b2-059761bbb081'>
            <event guid='cbfaa14f-48ac-58fd-9790-fc97503fc7b2' id='56993' code='S7UNUC'>
                <room>Track 3</room>
                <title>Using the OWASP Top 10 to Save the Astronauts from HAL</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-14T10:00:00+00:00</date>
                <start>10:00</start>
                <duration>00:45</duration>
                <abstract>A discussion of the OWASP ML Top 10 and OWASP LLM Top 10, and how a failure to apply these principles in 2001 A Space Odyssey, led to implementation flaws in HAL 9000, resulting in disastrous consequences for the crew.</abstract>
                <slug>bsides-london-2024-56993-using-the-owasp-top-10-to-save-the-astronauts-from-hal</slug>
                <track>Main talk track</track>
                
                <persons>
                    <person id='58760'>Nick Dunn</person>
                </persons>
                <language>en</language>
                <description>The talk will use the OWASP Top 10 for ML and OWASP Top 10 for LLMs to anyalze the nature of the flaws in HAL 9000, the AI in 2001: A Space Odyssey, and how this led to disastrous results for the mission.
There will be a discussion of failures to consider different aspects of both the LLM and ML top 10 during HAL&apos;s design and training phases, and the subsequent attempts to implement fixes during the mission. Each omission or failure to apply an OWASP principle, that led to the vulnerabilities will be discussed in detail, and also related to real life applications, to ensure the talk isn&apos;t just a geeky discussion of a cool-looking scf-fi AI.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/S7UNUC/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/S7UNUC/feedback/</feedback_url>
            </event>
            <event guid='e8b04e5a-2e56-533c-a799-d8c6f4545325' id='56940' code='BEZSKR'>
                <room>Track 3</room>
                <title>Healthcare&#8217;s Anatomy: dissection of Dicom, a protocol to Nmap your body!</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-14T10:55:00+00:00</date>
                <start>10:55</start>
                <duration>00:45</duration>
                <abstract>In recent years, healthcare institutions have become prime targets for cyber attackers. The sector, suffering from a lack of resources and limited knowledge of the specific protocols related to its operations, remains particularly vulnerable despite advancements in detection systems. This reality raises crucial challenges in a field where protecting data is as vital as patient care. 

This presentation focuses on the DICOM protocol, its functionality, and its use in medical imaging. We will explain why it has become a prime target for cyber attackers and reveal an offensive tool capable of extracting data from a DICOM server. 

Finally, we will discuss current protection methods, their limitations, and present concrete measures to strengthen the security of these critical infrastructures. 

By attending this conference, you will gain a deep understanding of the DICOM protocol, its vulnerabilities, and the best ways to prepare for emerging threats and future risks.</abstract>
                <slug>bsides-london-2024-56940-healthcare-s-anatomy-dissection-of-dicom-a-protocol-to-nmap-your-body</slug>
                <track>Main talk track</track>
                
                <persons>
                    <person id='58719'>0xSeeker</person>
                </persons>
                <language>en</language>
                <description>By the end of this presentation, you will have acquired in-depth knowledge of the DICOM protocol, its use in the medical field, and its technical format. You will understand the dangers of exposing DICOM servers on the web, as well as the risks to the security of medical data within healthcare infrastructures. Additionally, you will discover an offensive tool illustrating methods for extracting sensitive data from a medical server and learn how to identify signs of malicious activity to better prevent and counter these threats.</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links>
                    <link href="https://www.gatewatcher.com/en/lab/healthcares-anatomy-attacking-dicom/">Article about Dicom attack</link>
                
                    <link href="https://www.gatewatcher.com/en/lab/healthcares-anatomy-le-protocole-dicom/">Article about Dicom protocol</link>
                </links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/BEZSKR/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/BEZSKR/feedback/</feedback_url>
            </event>
            <event guid='ec6597b7-0741-5010-ade5-a7abcc4aee5b' id='54674' code='KGLYRE'>
                <room>Track 3</room>
                <title>Explaining ICS to a fool of a Took</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-14T11:50:00+00:00</date>
                <start>11:50</start>
                <duration>00:45</duration>
                <abstract>There are thirteen pillars upholding the critical national infrastructure (CNI) that allows for the every day running of our society. These pillars are sectors that rely on four generations of operational technology (OT) systems with the oldest generation being pre-Internet. What are these industrial control systems (ICS) that we rely on, and how are they vulnerable? This talk will outline a generic ICS from the hardware to the protocols that allow the complex systems to speak with one another. Research into these systems is often done on physical testbeds and digital twins (I don&apos;t know about you, but I wouldn&apos;t want to try hack an actual nuclear reactor). The talk will discuss the testbeds that I&apos;m lucky enough to play with day-to-day. How are these industrial control systems vulnerable, and what can we do to protect these systems from malicious actors? Finally, how are these thirteen pillars connected? If we knock one down, will the others fall like dominos?</abstract>
                <slug>bsides-london-2024-54674-explaining-ics-to-a-fool-of-a-took</slug>
                <track>Main talk track</track>
                
                <persons>
                    <person id='56682'>halfling</person>
                </persons>
                <language>en</language>
                <description>What will be covered:

Intro to CNI &amp; OT security 
Industrial control systems
Control loops &amp; ladder logic
Testbeds including digital twins
OT Protocols such as Modbus
Known technical vulnerabilities
Security concepts and solutions
Interconnectivity of CNI sectors</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/KGLYRE/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/KGLYRE/feedback/</feedback_url>
            </event>
            <event guid='59729a9e-15cd-5d9e-8d24-3c034d10d9f8' id='56953' code='STGFHH'>
                <room>Track 3</room>
                <title>CV workshop</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-14T12:55:00+00:00</date>
                <start>12:55</start>
                <duration>00:45</duration>
                <abstract>A* CV</abstract>
                <slug>bsides-london-2024-56953-cv-workshop</slug>
                <track>Main talk track</track>
                
                <persons>
                    <person id='58730'>Samira Ali</person>
                </persons>
                <language>en</language>
                <description>I would like to offer an engaging fun session for  45 minute about how to make your CV an A* CV in order to get job interview. I have over 14 years experience in HR &amp; Training so I would like to share tips on how to get your foot in the door with a great CV. I will leave 10 to 15 minutes  for Q&amp;A</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/STGFHH/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/STGFHH/feedback/</feedback_url>
            </event>
            <event guid='aba7e752-c9ae-5194-a220-4c72da1dcb93' id='55948' code='MDR3YL'>
                <room>Track 3</room>
                <title>Post-Quantum Cryptography for 2025</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-14T13:50:00+00:00</date>
                <start>13:50</start>
                <duration>00:45</duration>
                <abstract>In this talk, Andy Smith will demystify the real threat that quantum computers pose to our current cryptography, what you can do about it, and what specific actions you should look to take in 2025.</abstract>
                <slug>bsides-london-2024-55948-post-quantum-cryptography-for-2025</slug>
                <track>Main talk track</track>
                
                <persons>
                    <person id='57833'>Andy Smith</person>
                </persons>
                <language>en</language>
                <description>With the first three quantum-resistant cryptographic algorithms standardised by NIST in August 2024, the starting gun has been fired on the Y2K-style problem of upgrading the crypto used in almost all of our modern electronic devices. In this session you&apos;ll learn:
* What&apos;s the real threat that quantum computers pose
* An overview of the options to safeguard against that threat
* How techniques such as a cryptographic inventory, hybrid crypto and crypoagility can help ease the transition
* How to get started with quantum-resistant cryptography today!</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/MDR3YL/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/MDR3YL/feedback/</feedback_url>
            </event>
            <event guid='70670834-4770-5b44-a64e-903eae492778' id='56169' code='V8QCKM'>
                <room>Track 3</room>
                <title>When the Hunter Becomes the Hunted: Using Minifilters to Disable EDRs</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-14T14:45:00+00:00</date>
                <start>14:45</start>
                <duration>00:45</duration>
                <abstract>This presentation explores the advanced use of minifilters in offensive security operations, focusing on their application in bypassing and disabling EDRs. We will delve into the architecture of EDR systems and common offensive uses of mini filters, such as bypassing file system monitoring.

We will then introduce a novel technique to entirely disable EDRs via the abuse of minifilters.

The talk will also cover the implications for defensive security and potential countermeasures, aiming to provide valuable insights for both offensive and defensive security professionals.</abstract>
                <slug>bsides-london-2024-56169-when-the-hunter-becomes-the-hunted-using-minifilters-to-disable-edrs</slug>
                <track>Main talk track</track>
                
                <persons>
                    <person id='58001'>Tom Philippe</person>
                </persons>
                <language>en</language>
                <description>## 1. Introduction

This presentation will explore the use of minifilters, an essential components of EDRs, in offensive security operations, with a focus on their application in bypassing and disabling EDR systems.

## 2. EDR Architecture Overview

We will first provide a high level description of EDR systems, their components and architecture. This is essential to understand how minifilters contribute to EDR systems and the capabilities they provide. It sets the stage to understand how such capabilities could be abused.

## 3. Common Minifilters Abuse Techniques

We then rapidly go through common known techniques involving minifilters used during offensive security operations, especially around file system monitoring bypass to hide suspicious file activity.

## 4. A New Minifilter Abuse Technique to Disable EDRs

In this section, we present a novel technique which allows to entirely disable EDR agents and prevent them from running on endpoints. This technique relies on the registration of a PreOperation callback to prevent EDR agents from accessing critical resources, effectively crippling them.

We dive into the Kernel concepts involved and provide a step-by-step breakdown of the whole process.

We compare this new technique to other minifilter abuse techniques in terms of effectiveness in hiding malicious activities and IoCs.

## 5. Detecting Minifilter Abuse

In this final section, we explore the defensive side of things:
- Potential countermeasures and their limitations
- Potential strategies for detecting and mitigating minifilter-based attacks

## 6. Conclusion and Q&amp;A
Finally, we will summarise the key takeaways and open the floor for questions and discussion.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/V8QCKM/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/V8QCKM/feedback/</feedback_url>
            </event>
            <event guid='e6cf4040-f6b3-5171-9286-981e5e790537' id='54869' code='9PXYXH'>
                <room>Track 3</room>
                <title>Let&#8217;s Phish: How to Scam Everyone, Everywhere, All at Once</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-14T15:40:00+00:00</date>
                <start>15:40</start>
                <duration>00:45</duration>
                <abstract>There are thousands of scamming and phishing attacks performed every day. It is one of the most lucrative and profitable forms of hacking, involving the manipulation of humans. But how do criminals reach their victims? What are their techniques? And can anyone be hacked? The answer is yes, and I will show you the process of how to achieve that.</abstract>
                <slug>bsides-london-2024-54869-let-s-phish-how-to-scam-everyone-everywhere-all-at-once</slug>
                <track>Main talk track</track>
                
                <persons>
                    <person id='56856'>Dita Pesek</person>
                </persons>
                <language>en</language>
                <description>You will hear two stories of crime: the story of a kidnapped daughter and the story of a fake DJ. In these stories, we will explore key techniques that, when implemented correctly, can provide a blueprint for hacking anyone.

Preparation of a Hack: Identifying the right victim and their weaknesses. This section of the talk outlines simple steps for uncovering a target&apos;s vulnerabilities that can be exploited. We will dive into how to evaluate time, effort, and reward like a true criminal.

The Attack: The process and closure. What techniques work and how to keep the victim engaged. As we will see, these techniques are straightforward and can be applied to any victim profile.

The Reward: What is the reward, and what happens if a financial transaction is involved? This section will emphasize that the hack is often the easier part. Cleaning the money requires seasoned criminals.

The talk will address a broader question: What can we, as cybersecurity professionals, do, and has our approach been wrong? The talk will conclude by analyzing different types of attackers because if we do not understand the psychology of the criminal, the techniques we employ to protect targets will continue to be insufficient.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/9PXYXH/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/9PXYXH/feedback/</feedback_url>
            </event>
            <event guid='e63f3c83-f7b5-56d1-bc30-e4b46d67ab55' id='56742' code='LZ7Z9Z'>
                <room>Track 3</room>
                <title>SIEM: Escape and Evade</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-14T16:35:00+00:00</date>
                <start>16:35</start>
                <duration>00:45</duration>
                <abstract>For nearly three decades, SIEM tools have been the cornerstone of the SOC, centralising threat detection, alerting, and commonly used for ticketing, case management, and SOC metrics. But what if this essential tool could be bypassed, evaded, or even directly attacked? 
Having both several years experience working directly for various SIEM vendors, we shall discuss and explore these possibilities in more depth, as well as emphasise the importance of continuous control testing. 
We will aim to give some ideas to offensive teams, and also give defenders some things to think about!</abstract>
                <slug>bsides-london-2024-56742-siem-escape-and-evade</slug>
                <track>Main talk track</track>
                
                <persons>
                    <person id='58596'>Daniel Crossley</person>
                </persons>
                <language>en</language>
                <description>SOC teams commonly rely on Security Information and Event Management (SIEM) tools to detect, analyse, and respond to security threats. In this presentation, we will introduce key SIEM concepts and the role of the SIEM in the SOC, as well as discuss shortfalls of SIEM tools. Then we shall explore the possibility of attacks and evasion techniques in SIEMs. We will also discuss the general challenges of managing SIEMs in enterprise environments. 

Not only will we cover the technical aspects, but also highlight processes, organisation dependencies and discuss non-technical mitigations.

Attacking a SIEM involves exploiting vulnerabilities in data ingestion, correlation rules, and alert mechanisms to manipulate the very systems designed to detect malicious activities. Specifically, we will cover:
- Introduction to Security Information and Event Management (SIEM) tools, architectures, and their role in the SOC
- Common log sources and ingest methods
- Custom apps and add-ons
- Cloud-native SIEMs
- Key vulnerabilities and attack vectors in SIEM systems: Data ingestion manipulation, Correlation rules exploitation, Alert bypass techniques
- How organisational structures and supporting processes can be exploited

We are hoping to help defenders and offensive teams better understand the risks involved with SIEM deployments, whilst emphasising the importance of simulating real-world attack scenarios.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/LZ7Z9Z/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/LZ7Z9Z/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Rookie track 1' guid='4fa04221-b4af-5974-9c83-fbd84d74e1b8'>
            <event guid='8974dd46-c766-5fb9-bd33-45bb83a951a7' id='56755' code='AG8NTC'>
                <room>Rookie track 1</room>
                <title>MITRE ATLAS - exploring AI vulnerabilities</title>
                <subtitle></subtitle>
                <type>Rookies track</type>
                <date>2024-12-14T10:00:00+00:00</date>
                <start>10:00</start>
                <duration>00:15</duration>
                <abstract>Just how vulnerable are the AI models we are coming to see pop up every other week? We&apos;ve all heard of &quot;jailbreaking&quot; LLMs, but that&apos;s just the tip of the iceberg.  
With the rapid adoption of AI technologies, it opens the door for a myriad of attacks. 
In this talk, we go over a the MITRE Adversarial Threat Landscape for AI Systems (short for ATLAS) framework, and delve into some case studies exposing some of the most worrying AI attacks in recent years.</abstract>
                <slug>bsides-london-2024-56755-mitre-atlas-exploring-ai-vulnerabilities</slug>
                <track>Rookies</track>
                
                <persons>
                    <person id='58610'>Arthur Frost</person>
                </persons>
                <language>en</language>
                <description>This is a talk about the MITRE ATLAS framework.
I&apos;ll first discuss how the ATLAS framework is built on top of the ATT&amp;CK framework, before delving into some key differences with respect to vulnerabilities and attack vectors specific to what MITRE calls &quot;AI-Enabled Systems&quot;. 
I&apos;ll walk you through two case studies, one with a &apos;good&apos; actor, the other a &apos;bad&apos; one, and how investigation is made easier by using the ATLAS framework.
Finally, I&apos;ll show you how you can protect your organization against AI attacks by utilizing various mitigations, of which 25 are documented in this framework, covering various vulnerabilities.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/AG8NTC/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/AG8NTC/feedback/</feedback_url>
            </event>
            <event guid='dbb61811-23b2-530b-b9dd-53d9f6985195' id='55829' code='FEEDHA'>
                <room>Rookie track 1</room>
                <title>Adopt or Risk: Why Zero Trust is Key to Modern Cyber Defence</title>
                <subtitle></subtitle>
                <type>Rookies track</type>
                <date>2024-12-14T10:25:00+00:00</date>
                <start>10:25</start>
                <duration>00:15</duration>
                <abstract>In an era where cyber threats are increasingly sophisticated and network perimeters are becoming obsolete, traditional security approaches are falling short. This presentation will highlight why embracing a Zero Trust approach is crucial for modern cyber defense. By adhering to the principle of &quot;never trust, always verify,&quot; Zero Trust revolutionizes security by continuously validating every user, device, and access request, rather than assuming trust based on network location.</abstract>
                <slug>bsides-london-2024-55829-adopt-or-risk-why-zero-trust-is-key-to-modern-cyber-defence</slug>
                <track>Rookies</track>
                
                <persons>
                    <person id='57714'>Meletius Igbokwe</person>
                </persons>
                <language>en</language>
                <description>As the digital landscape evolves and cyber threats become more sophisticated, organizations can no longer rely on traditional perimeter-based security. The rise of remote work, cloud adoption, and interconnected systems has expanded the attack surface, leaving organizations vulnerable to breaches and insider threats. &quot;Adopt or Risk: Why Zero Trust is Key to Modern Cyber Defence&quot; offers a critical look at why organisations must shift to a Zero Trust model to effectively safeguard their networks.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/FEEDHA/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/FEEDHA/feedback/</feedback_url>
            </event>
            <event guid='d0d1c894-099c-5763-8598-55e21a76cc09' id='55625' code='N3ZG7S'>
                <room>Rookie track 1</room>
                <title>Commanding Heights: Unmasking COM-Based UAC Bypass Techniques.</title>
                <subtitle></subtitle>
                <type>Rookies track</type>
                <date>2024-12-14T10:55:00+00:00</date>
                <start>10:55</start>
                <duration>00:15</duration>
                <abstract>Abstract:
What if the technology designed to protect your Windows System could be used against it? 
In this session, we will dwell deep into the journey of a hidden world of Use Access Control (UAC) and Component Object Model (COM), uncovering how attackers can turn these essential security features into weaponization for privilege escalation.
Join me as we pull back the curtain on the often-overlooked vulnerabilities within UAC and COM, revealing how crafty an adversary exploits elevated COM interfaces to bypass UAC consent prompts without user interaction through live demonstration and real-world examples from prolific Ransomware (BlackCat).
This is not all about bad news. It also equips you with the knowledge and tools to detect, prevent, and defend against these sophisticated techniques.
Whether you&#8217;re a cybersecurity veteran or a curious newcomer, this talk promises to deepen your understanding of Windows Internal and elevate your defense strategies against UAC Elevated COM-Bypass exploits.

Key Takeaways:
1.	Intersection of COM and UAC: COM objects are used by various applications in Windows to perform tasks. Some of these objects run with elevated privileges. UAC is designed to prevent unauthorized elevation, but if a COM object is improperly configured, it can be exploited to bypass UAC.
2.	Exploitation Method: This bypass typically involves identifying a vulnerable COM object that does not trigger a UAC prompt when instantiated. An attacker can execute their payload through this object, gaining elevated privileges without user consent.
3.	Live Demo: Examples from prolific Ransomware, BlackCat, and skeleton code.
4.	Threat Hunt Use Case: Detection Logic/Tools and actionable IOCs for UAC Bypass.</abstract>
                <slug>bsides-london-2024-55625-commanding-heights-unmasking-com-based-uac-bypass-techniques</slug>
                <track>Rookies</track>
                
                <persons>
                    <person id='57570'>Amankumar Badhel</person>
                </persons>
                <language>en</language>
                <description>Description:
The Elevated COM (Component Object Model) UAC (User Account Control) bypass is a technique used by attackers to escalate privileges on a Windows system without triggering a UAC prompt. UAC is a security feature in Windows that helps prevent unauthorized changes to the operating system by requiring user consent or administrator-level approval for certain actions. The bypass demonstrated in this talk leverages elevated COM objects identified by the CLSID {3E5FC7F9-9A51-4367-9063-A120244FBEC7} that run with higher privileges to execute malicious code, thereby circumventing UAC protections.
Key Points
1.	Overview of UAC
2.	Overview of COM
3.	UAC and COM: Security Intersection
4.	Abusing UAC Elevate COM Interfaces
5.	Case Study 
&#8226;	BlackCat - Ransomware
6.	Live Demo 
7.	Monitoring and Detection
&#8226;	Threat Hunt, Detection Logic\Tool
8.	Q&amp;A</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/N3ZG7S/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/N3ZG7S/feedback/</feedback_url>
            </event>
            <event guid='5a304a04-f1d6-59a7-bfec-b6f155b0d613' id='56783' code='P3JVM8'>
                <room>Rookie track 1</room>
                <title>From Zero to Cyber Hero: A Non-Techie&apos;s Guide to Breaking into Cybersecurity</title>
                <subtitle></subtitle>
                <type>Rookies track</type>
                <date>2024-12-14T11:20:00+00:00</date>
                <start>11:20</start>
                <duration>00:15</duration>
                <abstract>This engaging presentation highlights the unique journey of a non-technical professional &#8211; a lawyer turned cybersecurity enthusiast &#8211; breaking into the field. Drawing from personal experiences including founding the Women in Cybersecurity (WiCyS) Surrey Chapter, winning a social engineering competition sponsored by the Cybersecurity Infrastructure Security Agency (CISA), and gaining hands-on experience in Cyber Threat Intelligence (CTI) as an MSc student, she offers actionable insights for those looking to transition into cybersecurity. This session aims to simplify the path to cybersecurity for individuals without a traditional tech background, emphasising the importance of networking, community organisations, and hands-on experience in facilitating this transition while highlighting the common challenges faced and strategic approaches to overcome them. Whether you&apos;re contemplating a career change or looking to diversify your security team, this session offers valuable insights into the power of non-traditional backgrounds in strengthening the cybersecurity workforce.</abstract>
                <slug>bsides-london-2024-56783-from-zero-to-cyber-hero-a-non-techie-s-guide-to-breaking-into-cybersecurity</slug>
                <track>Rookies</track>
                
                <persons>
                    <person id='58629'>Egonna Anaesiuba-Bristol</person>
                </persons>
                <language>en</language>
                <description>This 15-minute presentation aims to inspire and guide non-technical individuals who want to pursue a career in cybersecurity. With the cybersecurity industry facing a significant skills gap, there is a need for diverse perspectives in addressing growing security challenges.

Key points to be covered include:
1) The speaker&apos;s journey from a non-technical background to cybersecurity, including overcoming common challenges faced by career-changers.
2) The value of diverse perspectives in cybersecurity and how non-technical backgrounds can be an asset in the field.
3) The role of communities in skill development and networking, highlighting experiences as a WiCyS (Women in CyberSecurity) Surrey chapter leader.
4) The importance of participating in cybersecurity competitions and how they contribute to practical skill-building. 
5) Strategies for utilising conferences and networking events to secure work experiences, such as the speaker&apos;s CTI opportunity.
6) Practical advice for building a foundation in cybersecurity, including resources, learning paths, and key focus areas for beginners.

The presentation will be particularly valuable for:

Professionals considering a career change into cybersecurity
Hiring managers looking to diversify their security teams
Current cybersecurity professionals interested in mentoring newcomers

By highlighting the speaker&apos;s experiences with the Women in Cybersecurity (WiCyS) Surrey Chapter, success in a CISA-hosted competition, and work in Cyber Threat Intelligence, this talk demonstrates how non-traditional paths can lead to meaningful contributions in cybersecurity.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/P3JVM8/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/P3JVM8/feedback/</feedback_url>
            </event>
            <event guid='dc2864fa-193a-5120-ab1f-564da5a74677' id='56588' code='AWDYG7'>
                <room>Rookie track 1</room>
                <title>Robert Redford Made Me Do It: Physical Security Stories and Tips</title>
                <subtitle></subtitle>
                <type>Rookies track</type>
                <date>2024-12-14T11:50:00+00:00</date>
                <start>11:50</start>
                <duration>00:15</duration>
                <abstract>Exploring real world stories of physical security tests and the relationship between my obsession with the 1992 film sneakers and my chosen line of work.</abstract>
                <slug>bsides-london-2024-56588-robert-redford-made-me-do-it-physical-security-stories-and-tips</slug>
                <track>Rookies</track>
                
                <persons>
                    <person id='58450'>Matthew Steed</person>
                </persons>
                <language>en</language>
                <description>Sneakers, the best hacker film&#8230;period. 

This talk aims to share my enthusiasm for the adrenaline rush of bypassing physical security measures through personal stories and engagement tales while sharing tips and tricks that I have learned along the way.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/AWDYG7/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/AWDYG7/feedback/</feedback_url>
            </event>
            <event guid='4295c4ef-ed8a-5cb2-914c-7ec323af4128' id='56285' code='7RVA7Z'>
                <room>Rookie track 1</room>
                <title>It&apos;s been a good run: why I stopped doing OSINT CTFs</title>
                <subtitle></subtitle>
                <type>Rookies track</type>
                <date>2024-12-14T12:10:00+00:00</date>
                <start>12:10</start>
                <duration>00:15</duration>
                <abstract>Alan used to participate in global OSINT CTFs until they suddenly stopped.  Now they speak about their experience to help people make an informed decision when it comes to participating in future event</abstract>
                <slug>bsides-london-2024-56285-it-s-been-a-good-run-why-i-stopped-doing-osint-ctfs</slug>
                <track>Rookies</track>
                
                <persons>
                    <person id='58132'>Alan O&apos;Reilly</person>
                </persons>
                <language>en</language>
                <description>Alan is a holder of a TraceLabs black badge, an honour they still hold dear despite not having any interest in competing for nearly 4 years.  Finally, after all these years they&apos;re ready to give their reasons so that others may learn about some small issues that were present in the early days so that they may make informed decisions when it come to participation.

NOTICE:
Whilst anonymised, this talk will be discussing missing people and as such the talk may not be suitable for younger audiences</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/7RVA7Z/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/7RVA7Z/feedback/</feedback_url>
            </event>
            <event guid='d736e138-ddd4-5db5-94d5-20d8e4d9ada0' id='56981' code='PGDUDM'>
                <room>Rookie track 1</room>
                <title>Password Hell - accessibility challenges in Cyber Security</title>
                <subtitle></subtitle>
                <type>Rookies track</type>
                <date>2024-12-14T12:35:00+00:00</date>
                <start>12:35</start>
                <duration>00:15</duration>
                <abstract>In the cyber security world there are many challenges faced by numerous different people. One of those groups are those who are disabled, there is 16.1 million people (24% of the population) in the UK who are considered disabled and yet they are rarely taken into account when new policies are being made. 
I want to bring to light this issue specifically when it comes to passwords, for able bodied people they are already a pain but for those of us who are disabled they are a nightmare and even new technologies like MFA can be more of a burden than they set out to be. 
I&apos;m proposing some solutions to this like the wonderful world of password managers and even physical storage for passwords and shining light on some outdated views like the dreaded password expiry that in fact only makes accounts less secure. 
Now, you may wonder who am I to be speaking on such a sensitive topic, I am a Cyber Security student from Manchester Metropolitan University and I have been disabled since the age of 4. I have seen first hand the struggles that those with different disabilities to me face and  I also have first hand experience with some of those struggles.
My intention is to hopefully get you all thinking about how you can make your workplace more accessible and implementing some ideas to make everyone&apos;s life easier but especially for those who already struggle.</abstract>
                <slug>bsides-london-2024-56981-password-hell-accessibility-challenges-in-cyber-security</slug>
                <track>Rookies</track>
                
                <persons>
                    <person id='58750'>Ana Maia</person>
                </persons>
                <language>en</language>
                <description>Slide order
1 - What is the issue?
2 - Why is this an issue?
3 - Why am I talking about it?
4 - What are the challenges that people face?
5 - What are some outdated protocols and why you shouldn&apos;t use them
6 - What are some solutions to this problem? 
7 - Conclusion</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/PGDUDM/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/PGDUDM/feedback/</feedback_url>
            </event>
            <event guid='48f4915e-585b-5c72-8f19-db59df3f8a79' id='54604' code='L3KZC7'>
                <room>Rookie track 1</room>
                <title>Continuous threat modelling using Large Language Models</title>
                <subtitle></subtitle>
                <type>Rookies track</type>
                <date>2024-12-14T13:00:00+00:00</date>
                <start>13:00</start>
                <duration>00:15</duration>
                <abstract>In the evolving landscape of cybersecurity, maintaining up-to-date threat models is a critical yet challenging task for security teams. Traditionally, architecture diagrams have served as the basis for initial threat modelling. However, as application features rapidly evolve, these static models often become outdated, leaving organisations vulnerable to emerging threats.</abstract>
                <slug>bsides-london-2024-54604-continuous-threat-modelling-using-large-language-models</slug>
                <track>Rookies</track>
                
                <persons>
                    <person id='56607'>Gurunatha Reddy G</person><person id='59392'>Pranay Sahith Bejgum</person>
                </persons>
                <language>en</language>
                <description>This talk introduces an innovative approach to continuous threat modelling by leveraging Large Language Models (LLMs). It covers how LLMs can help automating the analysis of rapid application changes, identify potential security vulnerabilities, and suggest mitigations in real time.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/L3KZC7/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/L3KZC7/feedback/</feedback_url>
            </event>
            <event guid='be8bc752-4ada-5e97-99aa-9bcfd5743ab1' id='57016' code='SYLV3X'>
                <room>Rookie track 1</room>
                <title>Storytelling for SOC Analysts: Effective Investigation Notetaking and Report Writing (without ChatGPT!)</title>
                <subtitle></subtitle>
                <type>Rookies track</type>
                <date>2024-12-14T13:20:00+00:00</date>
                <start>13:20</start>
                <duration>00:15</duration>
                <abstract>Everybody loves a good story and within our industry we encounter some fascinating stories! However, the ability to convey often complex and technical details to a varied and multi-disciplinary audience can be an overlooked - but incredibly valuable - skill for cybersecurity professionals, especially in technical roles. Storytelling can be a critical part of effective cybersecurity incident and threat intelligence reporting; it provides necessary context to the threats we face, as well as the mitigations, remediation steps and other actions we need to take to protect our data, environments, and organisations.&#160;This presentation outlines key tips and tricks for leveraging technical writing skills to produce effective, impactful and actionable investigation notes and reports. By mastering the power of storytelling and effective technical writing, security professionals have the opportunity to make the threats we face and incidents we encounter more relatable to non-technical readers, therefore improving the accessibility, understanding and impact of our work.</abstract>
                <slug>bsides-london-2024-57016-storytelling-for-soc-analysts-effective-investigation-notetaking-and-report-writing-without-chatgpt</slug>
                <track>Rookies</track>
                
                <persons>
                    <person id='58778'>Han O&#8217;Connor</person>
                </persons>
                <language>en</language>
                <description>Want to be able to write high quality reports without AI chatbots?

This talk outlines top tips for leveraging technical writing skills to produce effective, impactful and actionable investigation notes and reports. The talk will also highlight quick wins to improve your technical writing skills, exploring key areas including:

- Knowing your audience
- Adopting an Incidents/Threats for Dummies approach
- Why Context is your friend, and
- Why AI most certainly is not!</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/SYLV3X/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/SYLV3X/feedback/</feedback_url>
            </event>
            <event guid='03330f2b-b8fa-544f-816c-bbc0521179fc' id='56942' code='7SJJBW'>
                <room>Rookie track 1</room>
                <title>The Psychology of Cyber: Navigating a Crisis Like a Pilot</title>
                <subtitle></subtitle>
                <type>Rookies track</type>
                <date>2024-12-14T13:50:00+00:00</date>
                <start>13:50</start>
                <duration>00:15</duration>
                <abstract>This talk examines how the crisis management principles of aviation &quot;Aviate, Navigate, Communicate&quot; can be effectively applied to cybersecurity. It highlights promoting a no-blame culture, empowering security culture across an organisation and preparing for unforeseen events, drawing on aviation&#8217;s century of safety advancements.</abstract>
                <slug>bsides-london-2024-56942-the-psychology-of-cyber-navigating-a-crisis-like-a-pilot</slug>
                <track>Rookies</track>
                
                <persons>
                    <person id='58721'>George Chapman</person>
                </persons>
                <language>en</language>
                <description>Explore how aviation&#8217;s crisis management strategies can inform cybersecurity practices. This session addresses the psychological impact of crises, the importance of open communication, and practical approaches to managing unpredictable situations with confidence and composure.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/7SJJBW/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/7SJJBW/feedback/</feedback_url>
            </event>
            <event guid='13dd2545-19b2-53fa-b8b4-2a466136aed2' id='54555' code='HV7REQ'>
                <room>Rookie track 1</room>
                <title>BrakRPi: Crashing Bluetooth communications on Raspberry Pi with Braktooth</title>
                <subtitle></subtitle>
                <type>Rookies track</type>
                <date>2024-12-14T14:15:00+00:00</date>
                <start>14:15</start>
                <duration>00:15</duration>
                <abstract>Do you use Raspberry Pi as a Home Assistant to manage remote devices via Bluetooth? Or your phone with wireless devices?

That&apos;s extremely convenient, but did you know that it can be easily compromised - and that some devices may still be unpatched?</abstract>
                <slug>bsides-london-2024-54555-brakrpi-crashing-bluetooth-communications-on-raspberry-pi-with-braktooth</slug>
                <track>Rookies</track>
                
                <persons>
                    <person id='56572'>Ilias</person>
                </persons>
                <language>en</language>
                <description>In August 2021, a group of researchers from Singapore called ASSET disclosed the series of vulnerabilities in commercial Bluetooth stacks ranging from DDoS to Arbitrary Code Execution - which was called Braktooth. It affected major vendors such as Intel, Cypress, Qualcomm and Espressif. 

While researchers&apos; main focus was to test laptops, smartphones and audio devices, one class of devices that went untested were Raspberry Pis. In this talk, I will describe how I was able to add small contribution to this research by proving that Raspberry Pi was also vulnerable to Braktooth due to the usage of Cypress System-on-Chip (SoC).

This presentation is beginner-friendly and no prior knowledge is required. It will cover the brief explanation of Braktooth series and more detailed explanation of documented process of crashing Bluetooth communications between Raspberry Pi and a remote speaker, why fixing this won&apos;t be enough with a simple code patch, and suggestions to mitigate the risks.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/HV7REQ/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/HV7REQ/feedback/</feedback_url>
            </event>
            <event guid='af26dc7d-d1de-592f-a689-4d28687446a7' id='56739' code='RFGTEW'>
                <room>Rookie track 1</room>
                <title>Unmasking the Deepfake Threat: Detection, Prevention, and Navigating the Future</title>
                <subtitle></subtitle>
                <type>Rookies track</type>
                <date>2024-12-14T14:45:00+00:00</date>
                <start>14:45</start>
                <duration>00:15</duration>
                <abstract>Deepfakes have become an increasing source of concern as AI advances. These extremely lifelike, digitally made videos can be used to propagate falsehoods, harm reputations, and even commit financial crimes. This talk would go into the complexities of deepfake technology, discussing how it is made and the potential repercussions. We will talk about effective detection techniques, preventive measures, and the role of legislation in tackling this increasing problem. 
Understanding the issues offered by deepfakes allows us to better navigate the digital realm and protect ourselves from their negative consequences.</abstract>
                <slug>bsides-london-2024-56739-unmasking-the-deepfake-threat-detection-prevention-and-navigating-the-future</slug>
                <track>Rookies</track>
                
                <persons>
                    <person id='58589'>Onyedikachi Ugwu</person>
                </persons>
                <language>en</language>
                <description>This talk will provide a comprehensive overview of deepfakes, exploring how they are been created, to the detection, and prevention of it. Participants will gain a deeper understanding of the risks posed by deepfakes, learn about effective countermeasures, and discover the latest advancements in deepfake detection technology. 
Participants will leave this workshop with the information and skills needed to navigate the ever-changing environment of deepfake threats and defend themselves and their organisations.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links>
                    <link href="https://spectrum.ieee.org/what-is-deepfake">What Are Deepfakes and How Are They Created?</link>
                
                    <link href="https://www.businessinsider.com/guides/tech/what-is-deepfake">What are deepfakes? How fake AI-powered audio and video warps our perception of reality</link>
                
                    <link href="https://www.researchgate.net/publication/337644519_The_Emergence_of_Deepfake_Technology_A_Review">The Emergence of Deepfake Technology: A Review</link>
                
                    <link href="https://www.techtarget.com/searchEnterpriseAI/news/366581274/Lawmakers-concerned-about-deepfake-AIs-election-impact">Lawmakers concerned about deepfake AI&#x27;s election impact</link>
                </links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/RFGTEW/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/RFGTEW/feedback/</feedback_url>
            </event>
            <event guid='16e9d0c4-5f6d-5ea9-b50b-13c68e6181b7' id='56437' code='URK98E'>
                <room>Rookie track 1</room>
                <title>Threat analysis in minutes and other AI super powers</title>
                <subtitle></subtitle>
                <type>Rookies track</type>
                <date>2024-12-14T15:05:00+00:00</date>
                <start>15:05</start>
                <duration>00:15</duration>
                <abstract>AI models trained specifically for security are here, why should devs have all the fun? Pair hacking with tools like WhiteRabbitNeo speeds up your process and reduces tedium inherent in most security roles. WhiteRabbitNeo is an uncensored, open-source LLM that has been trained on red team data. Learn how WhiteRabbitNeo can help you harden your source code and improve configuration security while reducing hours of DevSecOps tedium to minutes. WhiteRabbitNeo will research vulnerabilities, propose exploits, and help package malware payloads while you focus on the creative side of cybersecurity: crafting the perfect delivery method for the exploit.</abstract>
                <slug>bsides-london-2024-56437-threat-analysis-in-minutes-and-other-ai-super-powers</slug>
                <track>Rookies</track>
                
                <persons>
                    <person id='58284'>Bailey Williams</person>
                </persons>
                <language>en</language>
                <description>Using AI models often means sharing information with AI companies and running into guardrails that keep you from accomplishing cybersecurity tasks. I contribute to WhiteRabbitNeo to help build a community-driven, open source alternative.  During this talk I will teach attendees from the beginner cybersecurity enthusiast to the senior cyber analyst how to use AI how to learn new concepts, create custom hacking tools in any language, analyze code, and complete threat analysis tasks in seconds rather than hours.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/URK98E/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/URK98E/feedback/</feedback_url>
            </event>
            <event guid='41154342-2140-5775-a3e2-12a8259913fe' id='57014' code='EWZVMW'>
                <room>Rookie track 1</room>
                <title>VEXatious vulnerabilities: CVE management for the overwhelmed security engineer</title>
                <subtitle></subtitle>
                <type>Rookies track</type>
                <date>2024-12-14T15:40:00+00:00</date>
                <start>15:40</start>
                <duration>00:15</duration>
                <abstract>For application security engineers, managing CVEs has become an overwhelming task due to the rising number of CVEs, inaccurate vulnerability scanners, and user demands for zero CVEs in dependencies. My talk aims to demonstrate how VEX documents can eliminate the time-consuming spreadsheet back-and-forths by programmatically expressing vulnerability applicability information. By showcasing a workflow and tools introduced for Cilium, I will illustrate how VEX documents enable automatic exclusion of non-applicable CVEs from scanners, distribute triage workload to knowledgeable teams, and generate documentation on vulnerability applicability. Real examples from Isovalent&apos;s use of VEX documents in our security workflow will support these points. I hope attendees will leave convinced of the benefits of generating and using VEX documentation to focus more on addressing real vulnerabilities.</abstract>
                <slug>bsides-london-2024-57014-vexatious-vulnerabilities-cve-management-for-the-overwhelmed-security-engineer</slug>
                <track>Rookies</track>
                
                <persons>
                    <person id='58776'>Feroz Salam</person>
                </persons>
                <language>en</language>
                <description>For application security engineers, CVE management has become a huge burden in recent years. Caught between the accelerating number of CVEs granted each year, vulnerability scanners that are unable to accurately identify applicability, and users who demand zero CVEs in dependencies, security engineers become spreadsheet engineers, devoting large amounts of time to explaining why the latest set of CVEs identified by a vulnerability scanner do not matter.

The aim of my talk is to highlight the potential of VEX documents to render these spreadsheet back-and-forths obsolete. At their core, VEX documents allow for the expression of vulnerability applicability information in a programmatic manner. By highlighting a workflow and related tooling that I have introduced for Cilium (the CNCF-graduated CNI for Kubernetes), I will show how using VEX documents gives security engineers:
- The ability to automatically exclude triaged results from vulnerability scanners (including popular scanners such as Grype and Trivy), reducing customer friction and allowing customer security teams to &#8216;self-service&#8217; vulnerability applicability.
- The ability to spread the load of CVE triage onto the teams that know the most about the products that may be affected.
- The ability to automatically generate documentation regarding vulnerability applicability.

All of these points will be accompanied by real examples of how Isovalent, the company I work for and the creators of Cilium, use VEX documents in our daily security workflow.

By the end of my talk, I hope that attendees will leave convinced that they should be generating and consuming VEX documentation too, in order to minimise the amount of time we spend in spreadsheets, and maximise the amount of time that we spend hunting and fixing real vulnerabilities.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/EWZVMW/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/EWZVMW/feedback/</feedback_url>
            </event>
            <event guid='e632962a-a2f4-554e-8abc-c667c5ab438d' id='56324' code='EMHSZC'>
                <room>Rookie track 1</room>
                <title>Securing Embedded Devices in Robotics and IoT: Bridging the Gap Between Innovation and Security</title>
                <subtitle></subtitle>
                <type>Rookies track</type>
                <date>2024-12-14T16:00:00+00:00</date>
                <start>16:00</start>
                <duration>00:15</duration>
                <abstract>With the growth of robotics and IoT, embedded devices are vital but often vulnerable. This talk explores security challenges in embedded systems, highlights real-world attacks, and provides practical defense strategies. Engineers and cybersecurity professionals will gain insights into protecting devices in robotics and IoT from design to deployment.</abstract>
                <slug>bsides-london-2024-56324-securing-embedded-devices-in-robotics-and-iot-bridging-the-gap-between-innovation-and-security</slug>
                <track>Rookies</track>
                
                <persons>
                    <person id='58169'>Victor Oriakhi Nosakhare</person>
                </persons>
                <language>en</language>
                <description>Embedded devices are the backbone of modern robotics and IoT, but their widespread use has introduced unique security risks. This session delves into hardware, firmware, and communication vulnerabilities that leave embedded systems open to cyberattacks. Attendees will explore real-world attack scenarios and learn effective defense strategies to secure embedded devices from design to deployment. Additionally, we&#8217;ll discuss future trends like AI-driven anomaly detection and hardware root-of-trust, offering a forward-looking view of embedded device security. This talk is designed for engineers, developers, and security professionals looking to strengthen the security of robotics and IoT infrastructures.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/EMHSZC/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/EMHSZC/feedback/</feedback_url>
            </event>
            <event guid='bffbc00a-d39c-5522-b7bf-49d9851919f4' id='56402' code='QADXSB'>
                <room>Rookie track 1</room>
                <title>OWASP Honeypot threat intelligence project</title>
                <subtitle></subtitle>
                <type>Rookies track</type>
                <date>2024-12-14T16:35:00+00:00</date>
                <start>16:35</start>
                <duration>00:15</duration>
                <abstract>Due to the technological advancements in the world, using web applications to securely access shared data has become a popular choice. However, the downside to that is personal sensitive data is exposed. Around 74 % of personal data all over the internet is vulnerable to known web application attacks. Moreover, 90% of global cyberattacks happen through web applications. Keeping up with the attack vectors has become a challenge because of the ever-changing security landscape. This increase in attack surge for web applications needs a proactive and extensive solution. Cyber defenders are constantly facing new challenges in the identification of threats as cyberattacks are becoming more sophisticated hence there is a need to monitor, analyse, and mitigate these threats with priority. To address this gap, research is needed to enhance the security of web applications using honeypots, threat intelligence, and automation. This research aims to provide web developers with a solid foundation to protect against the growing range of cyber risks.</abstract>
                <slug>bsides-london-2024-56402-owasp-honeypot-threat-intelligence-project</slug>
                <track>Rookies</track>
                
                <persons>
                    <person id='58231'>Kartik Adak</person>
                </persons>
                <language>en</language>
                <description>This project involves enhancing the security posture of the web applications by deploying ModSecurity based honeypots over Amazon EC2 instances to lure the attacker to use various tools and attack techniques to compromise the application and logging the attack vectors for threat analysis. These Amazon EC2 instances are spread across different regions of the world to cover the global landscape. The output of these honeypots is logged in a S3 bucket in JSON format which can be used as a threat intelligence dataset for finding web traffic anomalies. Furthermore, we can use a JSON visualisation tool such as JSON crack for pattern matching and detect the anomaly in the dataset which could be useful for patching the application as well as creating a baseline for the web developers for future development.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/QADXSB/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/QADXSB/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Rookie track 2' guid='3e1fa274-9b9d-5e3d-bbf0-de3ca982d657'>
            <event guid='d00c154e-6385-52d2-b92b-a034e73c3ffc' id='56797' code='QEEQCS'>
                <room>Rookie track 2</room>
                <title>An introduction to Patient Medication Records</title>
                <subtitle></subtitle>
                <type>Rookies track</type>
                <date>2024-12-14T10:00:00+00:00</date>
                <start>10:00</start>
                <duration>00:15</duration>
                <abstract>Ever wondered what the structure of a vendors Patient Medication Record software looks like? A lighthearted look at fun and games had over a 20 year period &apos;testing&apos; the system....</abstract>
                <slug>bsides-london-2024-56797-an-introduction-to-patient-medication-records</slug>
                <track>Rookies</track>
                
                <persons>
                    <person id='58646'>Darren</person>
                </persons>
                <language>en</language>
                <description>This talk will highlight issues with current Patient Medication Record software, some solutions and what I found whilst working as a retail Pharmacist.

The aim is to reveal the results in a lighthearted way, there&apos;ll be thrills and spills on the journey and some results may astound. But remember all your records are still safe with me!!</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/QEEQCS/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/QEEQCS/feedback/</feedback_url>
            </event>
            <event guid='b9adfc9c-ded9-5183-8179-4a8d8217a236' id='57005' code='FFZ3P3'>
                <room>Rookie track 2</room>
                <title>Can you SEE!! A risk approach to SIEM</title>
                <subtitle></subtitle>
                <type>Rookies track</type>
                <date>2024-12-14T10:25:00+00:00</date>
                <start>10:25</start>
                <duration>00:15</duration>
                <abstract>Do you actually know if you have been breached?  Do you know your critical assets, what you can&apos;t see?   Monitoring and logging is a simple construct, however most companies see it as a tick-box exercise.   This presentation looks into the following, eyes on the ground approach.
- answers the why, how , what
- looks in to basics around asset management, critical data, users, end points, networks, etc
- key missed areas, like policy, people, and physical.
- summaries an approach based on a risk based approach.

this will cover examples and be lighted hearted and funny at times.

- questions
- end</abstract>
                <slug>bsides-london-2024-57005-can-you-see-a-risk-approach-to-siem</slug>
                <track>Rookies</track>
                
                <persons>
                    <person id='56873'>Richard Kirk</person>
                </persons>
                <language>en</language>
                <description>Do you actually know if you have been breached?  Do you know your critical assets, what you can&apos;t see?   Monitoring and logging is a simple construct, however most companies see it as a tick-box exercise.   This presentation looks into the following, eyes on the ground approach.
- answers the why, how , what
- looks in to basics around asset management, critical data, users, end points, networks, etc
- key missed areas, like policy, people, and physical.
- summaries an approach based on a risk based approach.

this will cover examples and be lighted hearted and funny at times.

- questions
- end</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/FFZ3P3/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/FFZ3P3/feedback/</feedback_url>
            </event>
            <event guid='09be7f49-0fc4-5bac-8ee0-03ca6caac243' id='56417' code='BUZ9ST'>
                <room>Rookie track 2</room>
                <title>Is AI the new big brother?</title>
                <subtitle></subtitle>
                <type>Rookies track</type>
                <date>2024-12-14T10:55:00+00:00</date>
                <start>10:55</start>
                <duration>00:15</duration>
                <abstract>This talk examines the expanding role of artificial intelligence (AI) in social engineering, focusing on how AI-driven tools are used to shape public opinion and influence group behaviour on a large scale.</abstract>
                <slug>bsides-london-2024-56417-is-ai-the-new-big-brother</slug>
                <track>Rookies</track>
                
                <persons>
                    <person id='58253'>Tom</person>
                </persons>
                <language>en</language>
                <description>This talk explores the potential of artificial intelligence (AI) to be using in social engineering. It also discusses the concept of mass social engineering, where individuals or groups are manipulated to behave or think in a predefined manner, and how AI can facilitate this process. The talk highlights the concern over AI&apos;s role in mass social engineering, including its impact on  war, political opinions, privacy, and social inequality.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/BUZ9ST/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/BUZ9ST/feedback/</feedback_url>
            </event>
            <event guid='023a5e77-9854-54c0-b717-dd8de23631f0' id='56965' code='MSPTC8'>
                <room>Rookie track 2</room>
                <title>LLM Security: Attacks and Controls</title>
                <subtitle></subtitle>
                <type>Rookies track</type>
                <date>2024-12-14T11:20:00+00:00</date>
                <start>11:20</start>
                <duration>00:15</duration>
                <abstract>The use of Generative Artificial Intelligence (AI), particularly Large Language Models (LLMs), is rapidly increasing across various sectors, bringing significant advancements in automating tasks, enhancing decision-making, and improving user interactions. However, this growing reliance on LLMs also introduces substantial security challenges, as these models are vulnerable to various cyber threats, including adversarial attacks, data breaches, and misinformation propagation. Ensuring the security of LLMs is essential to maintain the integrity of their outputs, protect sensitive information, and build trust in AI technologies.

This talk will examine the security vulnerabilities that are inherent in Large Language Models (LLMs), with a particular focus on injection techniques, client-side attacks such as Cross-Site Scripting (XSS) and HTML injection, and Denial of Service (DoS) attacks. Through the simulation of these attack vectors, the study assesses the responses of various pre-trained models like GPT-3.5 Turbo and GPT-4, revealing their susceptibility to different forms of manipulation.

The talk will also underscore the critical risk of these vulnerabilities, especially when exploited in a real-time corporate environment, where they can lead to significant disruptions, unauthorized access, data theft, and compromised system integrity.</abstract>
                <slug>bsides-london-2024-56965-llm-security-attacks-and-controls</slug>
                <track>Rookies</track>
                
                <persons>
                    <person id='58744'>Nazeef Khan</person>
                </persons>
                <language>en</language>
                <description>The talk is structured to fulfil the following objectives:
1. Evaluate approaches for identifying exploitation of security vulnerabilities in large language models (LLMs).
2. Investigate the response of various pre-trained models to attacks on LLMs.
3. Develop and assess security controls to mitigate cyber risks associated with LLM attacks.

The 15-minute talk will focus on Large Language Models (LLMs) will extensively explore the vulnerabilities, particularly in the context of adversarial attacks, types of prompt injection attacks on LLMs, Insecure output handling, Client side Injection attacks and denial-of-service (DoS) attacks. However, there remains a research gap in the systematic simulation and comparative analysis of these attacks across different LLM architectures and configurations. Current studies predominantly focus on individual attack vectors or specific LLMs, lacking a holistic approach that examines the interplay between multiple attack types and their cumulative impact on LLM performance and security.

Most weaknesses in AI models stem from injection techniques, which can be particularly harmful when the model or the API used to access the model makes incorrect calls to the database, inadvertently retrieving sensitive content that does not align with established guidelines. These vulnerabilities underscore the critical need to thoroughly understand how AI models interact with third parties and the potential risks associated with these interactions.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/MSPTC8/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/MSPTC8/feedback/</feedback_url>
            </event>
            <event guid='8a9d3b03-0044-560c-93d1-4f6d1631d79d' id='56948' code='RA9DK8'>
                <room>Rookie track 2</room>
                <title>From Molecules to Malware: Visualising TLS Fingerprints with TMAP to Hunt Malicious Domains.</title>
                <subtitle></subtitle>
                <type>Rookies track</type>
                <date>2024-12-14T11:50:00+00:00</date>
                <start>11:50</start>
                <duration>00:15</duration>
                <abstract>Malicious domains are part of the landscape of the internet but are becoming more prevalent and more dangerous to both companies and individuals. Tracking, blocking and detecting such domains is complex, and very often involves complex allow or deny list management or SIEM integration with open-source TLS fingerprinting techniques. Many fingerprint techniques such as JARM and JA3 are used by threat hunters to determine domain classification, but with the increase in TLS similarity, particularly in CDNs, they are becoming less useful. This presentation demonstrates how we can adapt and evolve open-source TLS fingerprinting techniques with increased features to enhance granularity, and to produce a similarity mapping system that enables the tracking and detection of previously unknown malicious domains. This is done by enriching TLS fingerprints with HTTP header data and producing a fine grain similarity visualisation that represented high dimensional data using MinHash and local sensitivity hashing. Influence was taken from the Chemistry domain, where the problem of high dimensional similarity in chemical fingerprints is often encountered.</abstract>
                <slug>bsides-london-2024-56948-from-molecules-to-malware-visualising-tls-fingerprints-with-tmap-to-hunt-malicious-domains</slug>
                <track>Rookies</track>
                
                <persons>
                    <person id='58726'>Amanda Thomson</person>
                </persons>
                <language>en</language>
                <description>The presentation focuses on a more resilient approach to TLS fingerprinting - particularly one that handles the encrypted client hello and the granularity loss encountered when fingerprinting CDNs. The method of visualising similarities is used effectively in the chemical arena and can be used as a method for early detection of malicious domains and websites.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/RA9DK8/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/RA9DK8/feedback/</feedback_url>
            </event>
            <event guid='c49b581e-a733-552c-86d3-4fa82ae1d5d1' id='57024' code='MEBCGT'>
                <room>Rookie track 2</room>
                <title>A Minimal Talk on Distroless Containers</title>
                <subtitle></subtitle>
                <type>Rookies track</type>
                <date>2024-12-14T12:10:00+00:00</date>
                <start>12:10</start>
                <duration>00:15</duration>
                <abstract>Distroless containers only contain your application and its dependencies. In theory, they&#8217;re a great security best-practice.</abstract>
                <slug>bsides-london-2024-57024-a-minimal-talk-on-distroless-containers</slug>
                <track>Rookies</track>
                
                <persons>
                    <person id='58785'>Will Dollman</person>
                </persons>
                <language>en</language>
                <description>But in practice, it&#8217;s really hard to find examples of companies outside of the tech giants that have successfully adopted distroless containers.

Minimal, hardened containers have huge benefits for security teams: reduced attack surface, cleaner vulnerability scans, improved isolation, and simpler supply chains. But how can a security engineer achieve them without the resources of a tech giant?

At Sourcegraph, we faced a lot of pain with vulnerability management in containers, prompting our switch to distroless. In this talk I&#8217;ll cover:

- Distroless containers from scratch
- The tooling that&#8217;s available
- Real-world experience from migrating a complex SaaS application to distroless - what went well, and what was unexpectedly hard</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/MEBCGT/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/MEBCGT/feedback/</feedback_url>
            </event>
            <event guid='96105a6c-dbc8-5a31-94c1-2a81f346ae83' id='55109' code='P8MKRR'>
                <room>Rookie track 2</room>
                <title>Quantum Safe Cryptography - A Buzzword or Something More Serious?</title>
                <subtitle></subtitle>
                <type>Rookies track</type>
                <date>2024-12-14T12:35:00+00:00</date>
                <start>12:35</start>
                <duration>00:15</duration>
                <abstract>Quantum Computing and Quantum Safe Cryptography seem to be buzzing up hype on all platforms. While no one is seemingly refuting the potential for Quantum Computers, the general sentiment seems to be that Quantum Computers won&apos;t be available for some time. 

If we stop thinking about Quantum Computers for a minute and just focus on Cryptography it self and how deeply it is embedded into our every day lives, perhaps the problem will become more evident.</abstract>
                <slug>bsides-london-2024-55109-quantum-safe-cryptography-a-buzzword-or-something-more-serious</slug>
                <track>Rookies</track>
                
                <persons>
                    <person id='57533'>Suketu</person>
                </persons>
                <language>en</language>
                <description>The industry is abuzz with the words Quantum Computers and Quantum Safe Cryptography being plastered everywhere. What actually is going on here? Are Quantum Computers really going to cause havoc? 

Will Quantum Computers be a real threat some day? Algorithms that make use of Quantum Physics have already been developed that will have real world repercussions on cryptography we use today. 

NIST (the National Institute of Standards and Technology), a well known body within cyber security has just released a set of standardised Quantum Safe Cryptographic algorithms. Something that has taken them years of study (8 years infact) to ensure that the algorithms cannot be easily broken or private data and keys decrypted easily.

Well, what does that mean in general, and what does it mean for you? The word Quantum might be used to generate the hype, but the real underlying issue is the integration of cryptography just about everywhere. Cryptography is embedded in our devices, in our routers and networking, in servers, in hardware, in containers, in firewalls, in file-transfer software, and anywhere else you can think of. Digital Certificates help lay the foundations of secure communications everywhere. 

Cryptography is a fundamental control used to protect confidentiality and integrity. The real issue lies in the effective migration of cryptography, and in a timescale that ensures protection against an ever-looming threat.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/P8MKRR/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/P8MKRR/feedback/</feedback_url>
            </event>
            <event guid='b157f4b0-fa65-59ef-99cb-60bf69372c3d' id='56397' code='MZFXGP'>
                <room>Rookie track 2</room>
                <title>Disabling Drones: Disruption and Forensic Data Analysis</title>
                <subtitle></subtitle>
                <type>Rookies track</type>
                <date>2024-12-14T13:00:00+00:00</date>
                <start>13:00</start>
                <duration>00:15</duration>
                <abstract>In this session, I will present my research on disrupting drone operations by targeting their command-and-control (C2) channels and analyzing the forensic evidence left behind. My work explores various disruption techniques, such as Wi-Fi de-authentication, man-in-the-middle (MITM) attacks, video stealing, and drone disabling using tools like Flipper Zero, ESP32 microcontrollers, and Linux command-line utilities. I will also delve into the forensic analysis conducted post-attack to identify digital footprints and network anomalies left by these disruptions. If live demonstrations are not feasible at the conference, I have recorded videos of all the attacks on the drone to showcase them, and some of the attacks can be performed without flying the drone. Alternatively, I can use simulations to demonstrate the techniques. This research provides a framework for detecting and documenting evidence of drone attacks, significantly contributing to the field of drone forensics and cyber-physical security.</abstract>
                <slug>bsides-london-2024-56397-disabling-drones-disruption-and-forensic-data-analysis</slug>
                <track>Rookies</track>
                
                <persons>
                    <person id='58224'>Paavai Aram</person>
                </persons>
                <language>en</language>
                <description>Drones have become a crucial part of modern technology, playing vital roles in both civilian and military operations. However, their increasing use also exposes them to various cyber threats, particularly those targeting their command-and-control (C2) channels. In my talk, I will demonstrate practical methodologies developed to disrupt drone systems, using tools such as Flipper Zero, ESP32 microcontrollers, and Aircrack-ng to simulate real-world attacks. I will detail various attack scenarios, including a video stealing attack that intercepts and records drone video feeds, and a drone disabling attack that remotely powers off the drone, rendering it inoperable. Post-attack, I conducted comprehensive forensic analyses to capture network traffic and digital footprints, revealing critical evidence of the disruptions. This talk aims to raise awareness of drone vulnerabilities, present forensic strategies for evidence gathering, and foster the development of effective countermeasures against these threats.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/MZFXGP/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/MZFXGP/feedback/</feedback_url>
            </event>
            <event guid='f8e03f78-c8e8-5d88-bfc4-98520f69884d' id='56716' code='FEY9FR'>
                <room>Rookie track 2</room>
                <title>Do loop back in anger</title>
                <subtitle></subtitle>
                <type>Rookies track</type>
                <date>2024-12-14T13:50:00+00:00</date>
                <start>13:50</start>
                <duration>00:15</duration>
                <abstract>The tale of stumbling across the registry key which reverts MS08-068, permitting SMB reflection attacks.</abstract>
                <slug>bsides-london-2024-56716-do-loop-back-in-anger</slug>
                <track>Rookies</track>
                
                <persons>
                    <person id='58577'>Shane Bourne</person>
                </persons>
                <language>en</language>
                <description>In this session, I&apos;ll walk through the lesser-known MS08-068 vulnerability and explore the potential for SMB reflection attacks in 2024, uncovering a root cause hidden in plain sight within Microsoft&apos;s documentation. The talk will include a demonstration of the attack, and you&apos;ll receive a script to set up your own lab environment for hands-on practice at home!</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/FEY9FR/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/FEY9FR/feedback/</feedback_url>
            </event>
            <event guid='d039de81-71d4-52fb-877b-8ea968b691ba' id='56920' code='9FVVGB'>
                <room>Rookie track 2</room>
                <title>The Trustworthiness of Generative AI in Real-Time Decision-Making for IoT Devices</title>
                <subtitle></subtitle>
                <type>Rookies track</type>
                <date>2024-12-14T14:45:00+00:00</date>
                <start>14:45</start>
                <duration>00:15</duration>
                <abstract>As IoT devices increasingly rely on real-time decision-making, generative AI offers immense potential to enhance these processes by predicting complex data patterns. However, this raises important questions about trust: Can AI be relied upon to make autonomous decisions, and how can we ensure its transparency and ethical integrity? This talk will explore the trustworthiness of generative AI in real-time IoT, covering technical challenges, best practices for ensuring accuracy and reliability, and the role of explainable AI (XAI). We will also address ethical and privacy concerns, providing insights on balancing innovation with responsible AI development.</abstract>
                <slug>bsides-london-2024-56920-the-trustworthiness-of-generative-ai-in-real-time-decision-making-for-iot-devices</slug>
                <track>Rookies</track>
                
                <persons>
                    <person id='58705'>Meet Bhorania</person><person id='58706'>Yash Akbari</person>
                </persons>
                <language>en</language>
                <description>As IoT devices become increasingly autonomous, the need for reliable, real-time decision-making is more critical than ever. Generative AI has the potential to transform these systems by analyzing complex data and enabling smart devices to predict outcomes and respond efficiently. However, with greater AI autonomy comes the pressing question of trust. Can we trust AI to make decisions accurately and responsibly in real-time? This talk will address the technical challenges in ensuring the reliability of AI-driven IoT devices and explore the role of explainable AI (XAI) in fostering transparency and user confidence.

We will also dive into the ethical and privacy concerns surrounding AI decision-making in IoT, particularly in sensitive or high-risk environments. Through practical examples and best practices, this session will offer insights on how to design AI-powered IoT systems that are not only innovative but also trustworthy, transparent, and ethically sound. Attendees will leave with a deeper understanding of the critical balance between leveraging generative AI for real-time decision-making and maintaining trust in these technologies.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/9FVVGB/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/9FVVGB/feedback/</feedback_url>
            </event>
            <event guid='b8545e3c-3f64-59a4-93d1-8cedfe4757fb' id='56982' code='HYJP7A'>
                <room>Rookie track 2</room>
                <title>Memoryless Peripherals and Secure Notebooks</title>
                <subtitle></subtitle>
                <type>Rookies track</type>
                <date>2024-12-14T15:05:00+00:00</date>
                <start>15:05</start>
                <duration>00:15</duration>
                <abstract>As a paranoid tech-head, I find cache extremely suspicious. Specifically, cache on modern CPUs. 

In this talk, I will explain why!

In this process, we can explore the idea that we need more systems that are as memoryless as possible, and where there is memory, the data is always well encrypted.

I have been, in my own time now for a few months, working with digital logic design to realise some hardware proof of concepts while building in this philosophy.</abstract>
                <slug>bsides-london-2024-56982-memoryless-peripherals-and-secure-notebooks</slug>
                <track>Rookies</track>
                
                <persons>
                    <person id='58752'>Kai Harris</person>
                </persons>
                <language>en</language>
                <description>I am not completely insane (yet) - I do leverage a modern smart phones (and their CPU&apos;s) like everyone else does to do things like sending dog pictures to the old man.

I have to admit, I am someone new to the security space. As such, the first I heard about side-channel vulnerabilities on CPU cache such Meltdown and Spectre was this year. From what I understand (but please do correct me if I am wrong!) - these are only the first iterations in a new genus of exploit.

So we can explore a potential approach to designing improved technology for this specific problem set, building at the electronic engineering level all the way to userland.

I will also discuss the benefits, challenges, and drawbacks I&apos;ve encountered, as well as the key insights gained from the exploration thus far.

Connect: https://uk.linkedin.com/in/kaiharris606</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/HYJP7A/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/HYJP7A/feedback/</feedback_url>
            </event>
            <event guid='447fa60c-1bf4-5e22-afef-56dc87a7f8ca' id='56400' code='LH9ZKL'>
                <room>Rookie track 2</room>
                <title>Turning to the dark side &#8211; Utilizing offensive techniques in incident response</title>
                <subtitle></subtitle>
                <type>Rookies track</type>
                <date>2024-12-14T15:40:00+00:00</date>
                <start>15:40</start>
                <duration>00:15</duration>
                <abstract>As incident responders in the insurance space, we often respond to incidents where critical evidence is no longer available for analysis. This presentation will demonstrate how incident responders can use offensive security techniques to determine likely root causes and inform effective containment strategies.</abstract>
                <slug>bsides-london-2024-56400-turning-to-the-dark-side-utilizing-offensive-techniques-in-incident-response</slug>
                <track>Rookies</track>
                
                <persons>
                    <person id='58229'>Archie Essien</person>
                </persons>
                <language>en</language>
                <description>As incident responders in the insurance space, we often respond to incidents where critical evidence is no longer available for analysis either due to hardware failure, complete encryption or eager recovery efforts. This leads to our incident responders taking a step back and using offensive techniques to determine what the most likely method of entry was.  This presentation will demonstrate a few of the techniques we have utilized including: 

Open source intelligence: Identifying network information from open source intelligence. 

Leaked data: Identifying victim data such as leaked usernames and passwords from data leaks. 

Active Directory attacks: Identifying common weaknesses in Active Directory configuration and performing attacks against Active Directory accounts and services to identify weak links.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/LH9ZKL/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/LH9ZKL/feedback/</feedback_url>
            </event>
            <event guid='5e03055b-7602-5425-b015-e41adabf6f12' id='56931' code='83QAGY'>
                <room>Rookie track 2</room>
                <title>MSSP, MDR, MFA - So Why isn&apos;t Incident Response Solved?</title>
                <subtitle></subtitle>
                <type>Rookies track</type>
                <date>2024-12-14T16:00:00+00:00</date>
                <start>16:00</start>
                <duration>00:15</duration>
                <abstract>We&apos;ve been in the wrong place at the right time between us for between 30-40 years, in just about every sector imaginable. 

We&apos;re seeing both mid-sized organisations and enterprises in the situation where they have all the consultancy recommendations - Managed Security Service Provider, Endpoint Detection And Response, Network Detection &amp; Response, extended Detection &amp; Response, Managed Detection &amp; Response, but IR still isn&apos;t solved. 

There&apos;s  frustration from both the MSSPs and Detection &amp; Response providers, and from customers.
This talk explores:
The difference between Incident Management and Incident Response
The history of how people get into Security, and Incident Response
Enterprise Architecture View of these
The changes that have introduced a wicked problem: 
  Non-Technical or Non-Security Incident Managers attempting Incident Response
  Technical Incident Responders attempting IR without the business link of Incident management
The frustrations from MSSPs and Detection &amp; Response Providers
Customer Frustrations
Potential ways of solving this within the security community</abstract>
                <slug>bsides-london-2024-56931-mssp-mdr-mfa-so-why-isn-t-incident-response-solved</slug>
                <track>Rookies</track>
                
                <persons>
                    <person id='58716'>Tim Haynes</person>
                </persons>
                <language>en</language>
                <description>We&apos;ve seen many mid sized and enterprise organisations that have a Managed Security Service Provider,  Managed Detection &amp; Response and Multifactor Authentication -  &quot;So why isn&apos;t IR solved?&quot; in the words of one CTO.

This talk picks up on frustrations and gaps from both the technical MSSP and MDR side, and from the customer side, and explains why &quot;Just pick a different SOC&quot; isn&apos;t necessarily a good answer.

We go into some of the enterprise architecture, organisational and human factors from the 90&apos;s to today  that have caused gaps on both sides, why this matters, and what we think security people can do about it.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/83QAGY/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/83QAGY/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Workshop Room 1' guid='21f52df1-30c8-5b49-9e09-5599f3216a3d'>
            <event guid='7ff8ae62-4484-53bf-97e4-090a3bbae29f' id='54502' code='Y8ZSCJ'>
                <room>Workshop Room 1</room>
                <title>Bypassing BitLocker by Sniffing the SPI Bus</title>
                <subtitle></subtitle>
                <type>Workshop - Short</type>
                <date>2024-12-14T10:00:00+00:00</date>
                <start>10:00</start>
                <duration>02:00</duration>
                <abstract>In this workshop, participants will delve into the intricacies of bypassing BitLocker encryption in TPM Only mode. Through hands-on exercises, attendees will gain practical knowledge on monitoring SPI buses with digital logic analysers, extracting TPM data, and mounting and decrypting disks. This session is tailored for penetration testers performing stolen device assessments, red team professionals, security enthusiasts seeking to secure their devices, and forensic analysts involved in data recovery.</abstract>
                <slug>bsides-london-2024-54502-bypassing-bitlocker-by-sniffing-the-spi-bus</slug>
                <track>Workshops</track>
                
                <persons>
                    <person id='56533'>Darren McDonald</person><person id='56537'>Craig S. Blackie</person>
                </persons>
                <language>en</language>
                <description>We are inviting you to a comprehensive workshop designed to provide an introduction into bypassing BitLocker encryption. This session will focus on Bypassing BitLocker in TPM Only Mode on laptop with an SPI bus.

Participants will explore and engage in the following:
* Monitoring SPI Buses with Digital Logic Analysers: Learn how to use digital logic analysers to monitor and interpret SPI bus communications. 
* Extracting TPM Data: Gain hands-on experience in extracting data from buses for TPM chips.
* Mounting and Decrypting Disks: Discover how to mount and decrypt disks protected by BitLocker. This practical exercise will illustrate the step-by-step process of bypassing encryption and gaining access to secured data.
* Discussion of other bypass techniques

Who Should Attend:

* Penetration Testers: Enhance your toolkit for stolen device assessments and red team engagements by mastering techniques to bypass BitLocker encryption.
* Security Enthusiasts: Understand the vulnerabilities of your own devices and learn how to better protect them against sophisticated attacks.
* Forensic Analysts: Acquire essential skills for data recovery and forensic investigations involving BitLocker-protected devices.

This workshop is structured to provide both theoretical knowledge and practical experience, ensuring that participants leave with a basic understanding of BitLocker bypass techniques and the confidence to apply them in real-world scenarios.

Knowledge Prerequisites:

* Basic Windows familiarity
* Basic Linux familiarity
* Awareness of BitLocker

Attendees will need to bring own laptop with Kali Linux and the dislocker package installed. All other materials will be provided.</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/Y8ZSCJ/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/Y8ZSCJ/feedback/</feedback_url>
            </event>
            <event guid='4b139a24-c5ce-5376-9689-31697ae0152c' id='56218' code='M8GTGY'>
                <room>Workshop Room 1</room>
                <title>Container Security and Hacking with Docker and Kubernetes</title>
                <subtitle></subtitle>
                <type>Workshop - Long</type>
                <date>2024-12-14T12:45:00+00:00</date>
                <start>12:45</start>
                <duration>04:00</duration>
                <abstract>This hands-on workshop aims to give you an understanding of the security features and pitfalls of modern containerization tools like Docker and Kubernetes. We&#8217;ll cover a range of topics to build up a picture of the security options available and show practical examples of attack and defence on containerized systems.

There will be hands-on labs covering common attacks on Docker, Docker containers and Kubernetes clusters.

Prerequisites &#8211; Familiarity with basic Docker commands and Linux command line use will be helpful, but we&#8217;ll provide step-by-step instructions for people who are less familiar with them.

Workshop requirements:
- A laptop with a web browser that does not have strict filtering in place (e.g. no white-list only corporate proxies) and an SSH client.</abstract>
                <slug>bsides-london-2024-56218-container-security-and-hacking-with-docker-and-kubernetes</slug>
                <track>Workshops</track>
                
                <persons>
                    <person id='58062'>Rory McCune</person><person id='58124'>Iain Smart</person><person id='58063'>Marion McCune</person>
                </persons>
                <language>en</language>
                <description>This hands-on workshop aims to give you an understanding of the security features and pitfalls of modern containerization tools like Docker and Kubernetes. We&#8217;ll cover a range of topics to build up a picture of the security options available and show practical examples of attack and defence on containerized systems.

There will be hands-on labs covering common attacks on Docker, Docker containers and Kubernetes clusters.

Prerequisites &#8211; Familiarity with basic Docker commands and Linux command line use will be helpful, but we&#8217;ll provide step-by-step instructions for people who are less familiar with them.

Workshop requirements:
- A laptop with a web browser that does not have strict filtering in place (e.g. no white-list only corporate proxies) and an SSH client.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/M8GTGY/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/M8GTGY/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Workshop Room 2' guid='32d7bd4c-881c-5b76-8013-bac8cea972bf'>
            <event guid='586ed6fa-1fbd-5f59-aeb2-1d9709239090' id='57021' code='P7KJ9A'>
                <room>Workshop Room 2</room>
                <title>Taking the garbage out!</title>
                <subtitle></subtitle>
                <type>Workshop - Short</type>
                <date>2024-12-14T10:15:00+00:00</date>
                <start>10:15</start>
                <duration>02:00</duration>
                <abstract>Log collection is the foundation of Security Operations. It is critical to have the correct host/application and a collection mechanism for events to facilitate correlation into SIEM/SOAR/XDR. Ineffective security events not only waste platform resources but also increase false-positive detections within a SOC; which then impacts moral and how long it take to triage an alert. 

Led by SIEM engineering specialists who boast a combined +20yrs experience with clients across government and industry, learn and try some of the best practices and tips that help some of the UKs most critical SOCs run smoothly. 

If you are playing with Security Onion, or building content and correlation rules, improve your effectiveness by only collecting the events you need&#8230;this is for you, take the trash out!</abstract>
                <slug>bsides-london-2024-57021-taking-the-garbage-out</slug>
                <track>Workshops</track>
                
                <persons>
                    <person id='58784'>Guy Kramer</person><person id='61442'>Kyle Pearson</person>
                </persons>
                <language>en</language>
                <description>The challenge to balance complete event coverage with efficient log onboarding is commonplace across Security Operations. Getting this balance wrong can lead to missing information in Events of Interest that would have provided context, even exclude some of the events being put in front of an analyst for triage. Conversely, excessive low value events can reduce the efficiency of the technology and overwhelm analysts.  

Greater awareness and understanding of the process and best practices for log source onboarding, parsing and correlation will lead to better transparency between engineering and operations. This increased cohesion can reduce false-positives, and positively impact MTTD and MTTR. 

In this workshop we will cover: 
Introduction to Security Information and Event Management (SIEM) tools, on-prem/cloud 
Common log sources and collection methods 
Best practices to identify 
- Use case definition 
- Log verbosity (inc scenario) 
- Log source documentation (inc scenario) 
RegEx Introduction (inc practical exercise) 
Review parsed example log source 
Log source collection (inc practical exercise) 

Tips / Tricks and lessons learned 
- CEF/Sigma 
- Mitre ATT&amp;CK 

By understanding the principals above the security operations function will be more effective from SIEM engineering through to SOC analysts.</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/P7KJ9A/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/P7KJ9A/feedback/</feedback_url>
            </event>
            <event guid='9619a685-fe70-50cb-bdfd-87e370bef28f' id='54516' code='9NSRLS'>
                <room>Workshop Room 2</room>
                <title>Defeating Encryption By Using Unicorn Engine</title>
                <subtitle></subtitle>
                <type>Workshop - Long</type>
                <date>2024-12-14T13:00:00+00:00</date>
                <start>13:00</start>
                <duration>04:00</duration>
                <abstract>Software Reverse-Engineering (SRE) is often considered black magic, but with the right tools and knowledge, its processes can be significantly accelerated. Unicorn Engine is a powerful framework that allows you to execute code platform-independently, which can greatly enhance your SRE skills.

Applications, binaries, and frameworks often contain complex functionalities like encryption and decryption methods that are hidden from the user. Reverse-engineering these can be difficult and time-consuming, especially when they involve non-standard, proprietary or non-documented cryptographic functions. This is where Unicorn Engine comes in. It enables us to execute code dynamically without the need for the proper environment or hardware. By emulating the execution, we can analyse and understand the underlying operations, making the reverse-engineering process more effective.</abstract>
                <slug>bsides-london-2024-54516-defeating-encryption-by-using-unicorn-engine</slug>
                <track>Workshops</track>
                
                <persons>
                    <person id='56545'>Balazs Bucsay</person>
                </persons>
                <language>en</language>
                <description>With Unicorn Engine, you can dissect and manipulate code in a controlled environment. Whether you are dealing with malware analysis, software debugging, or vulnerability research, Unicorn Engine is an awesome tool in your reverse-engineering toolkit.

This training will focus on reverse-engineering one or more binaries with Ghidra. Participants will identify various encryption or obfuscation functions and write code for Unicorn Engine in Python to utilise these functions without ever executing the binary.

No special knowledge is required, but familiarity with Python, Ghidra, and x86/x64 assembly would be beneficial. The training will introduce Unicorn Engine to the audience and explain it in depth.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/9NSRLS/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/9NSRLS/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Workshop Room 3' guid='c7613976-de87-56af-9297-4d94a4dfab1f'>
            <event guid='faf569b9-8533-5128-bf75-2e824dddfc4c' id='56962' code='WLKFP3'>
                <room>Workshop Room 3</room>
                <title>Malware Unmasked: Supercharging Cyber Defense with Machine Learning Magic</title>
                <subtitle></subtitle>
                <type>Workshop - Short</type>
                <date>2024-12-14T10:15:00+00:00</date>
                <start>10:15</start>
                <duration>02:00</duration>
                <abstract>Come join RevEng as we discuss the role of machine learning in expediting the art of binary analysis culminating in a CTF designed to show case how these tools can be used. 
So whether you are new, or a pro, to malware analysis and machine learning, we invite you to pop along, have some fun, and ask us as many questions as you&apos;d like.</abstract>
                <slug>bsides-london-2024-56962-malware-unmasked-supercharging-cyber-defense-with-machine-learning-magic</slug>
                <track>Workshops</track>
                
                <persons>
                    <person id='58740'>David Rushmer</person><person id='58742'>James Patrick-Evans</person><person id='59515'>Lloyd Davies</person>
                </persons>
                <language>en</language>
                <description>For over a decade security companies have been using machine learning to detect and protect against malicious binaries. Some have moved away entirely from traditional detection methods whilst others opt for a hybrid approach. Either way, sometimes they&apos;re right, sometimes they&apos;re wrong, and sometimes they&apos;ve no idea what they&apos;ve detected; luckily for them they&apos;ve usually got security experts on hand.

Attribution, accuracy, similar samples? These questions often fall on the shoulders of security experts and all of which can be time consuming to answer. &quot;Your customer insists the file isn&apos;t malicious, let me take a look at that in more detail.&quot;, &quot;I might not find any other samples because there is nothing overly unique.&quot; or what about &quot;It might be group [x] because these two binaries share a few similar strings...&quot;.  

What if there was another way?

Join us as we explore leveraging machine learning to aide researchers in malware analysis, attribution and threat hunting before putting these skills into practice by completing a small CTF challenge aimed at show casing what we think the future of binary analysis will look like.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/WLKFP3/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/WLKFP3/feedback/</feedback_url>
            </event>
            <event guid='c23270a2-bef5-597a-8536-bbecb99f94be' id='56785' code='8EK7GF'>
                <room>Workshop Room 3</room>
                <title>From Code to Cloud: Securing the Stack with Open-Source Tools</title>
                <subtitle></subtitle>
                <type>Workshop - Short</type>
                <date>2024-12-14T13:00:00+00:00</date>
                <start>13:00</start>
                <duration>02:00</duration>
                <abstract>Open-source tools offer a powerful, cost-effective solution for securing modern applications from development through deployment. This workshop will walk through key tools that help protect your entire stack&#8212;from securing your codebase, to monitoring cloud environments, and automating vulnerability detection. We&#8217;ll also discuss the strengths and limitations of open-source security tools, showing when they can be the perfect fit for your needs, and when proprietary or custom solutions may be more appropriate.
Attendees will get habnds on with tools like OWASP ZAP, Trivy, Bandit, and Checkov to help them understand how to effectively incorporate these solutions. You&apos;ll leave with practical knowledge of the best tools for various security tasks and guidance on integrating them to protect your applications at every level.</abstract>
                <slug>bsides-london-2024-56785-from-code-to-cloud-securing-the-stack-with-open-source-tools</slug>
                <track>Workshops</track>
                
                <persons>
                    <person id='58521'>Mackenzie Jackson</person>
                </persons>
                <language>en</language>
                <description>Open-source tools have become essential in today&#8217;s cybersecurity landscape, offering comprehensive, low-cost solutions for securing modern applications. From securing codebases to protecting cloud environments, these tools can help organizations achieve full coverage without massive investments. However, while open-source tools offer significant advantages&#8212;such as flexibility, community support, and transparency&#8212;there are also scenarios where they fall short, such as scalability issues, lack of enterprise support, and specific feature gaps.
In this workshop, we&#8217;ll explore the full spectrum of how open-source tools can be leveraged to secure your applications from development to deployment&#8212;covering both the code and cloud layers. We&#8217;ll walk through specific tools like:
-OWASP ZAP for web application scanning,
-Trivy for container security,
-Checkov for threat detection in cloud assets
-SemGrep, Bandit and Brakerman for SAST 
Through hands-on experimentation you will see these tools in action and learn how they can be integrated into your development pipeline to enforce security at every stage. We&#8217;ll also dive into real-world examples where open-source tools excel&#8212;and where they may not always be the best fit. 
By the end of this session, you&#8217;ll walk away with practical strategies to secure your application&#8217;s entire stack with open-source tools, as well as an understanding of the limitations to be mindful of. This talk is ideal for security engineers, developers, and DevOps teams looking to improve their security posture using open-source solutions.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/8EK7GF/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/8EK7GF/feedback/</feedback_url>
            </event>
            <event guid='176fd9e7-5fc1-5e83-9f7c-a606d47c4968' id='55416' code='CUUGBR'>
                <room>Workshop Room 3</room>
                <title>Roll Your Own EDR/XDR/MDR</title>
                <subtitle></subtitle>
                <type>Workshop - Short</type>
                <date>2024-12-14T15:30:00+00:00</date>
                <start>15:30</start>
                <duration>02:00</duration>
                <abstract>In this two-hour hands-on workshop we will show attendees how to build their own EDR/XDR/MDR platform leveraging open-source tools. Attendees will learn to deploy  cross-platform EDR sensors, how to use sigma detection rules, write custom detection rules, and leverage open source adversary emulation tools ( Atomic Red Team) to test new them. We will then discuss how to extend these capabilities for investigations and threat hunting by integrating additional open source or free tools to gather additional telemetry such as Sysmon and Velociraptor.</abstract>
                <slug>bsides-london-2024-55416-roll-your-own-edr-xdr-mdr</slug>
                <track>Workshops</track>
                
                <persons>
                    <person id='57399'>Ken Westin</person><person id='59460'>Jessica Crytzer</person>
                </persons>
                <language>en</language>
                <description>In this two-hour hands-on workshop we will show attendees how to build their own EDR/XDR/MDR platform leveraging open-source and free tools. Attendees will learn to deploy  cross-platform EDR sensors, how to use sigma detection rules, write custom detection rules, and leverage open source adversary emulation tools ( Atomic Red Team) to test new them. We will then discuss how to extend these capabilities for investigations and threat hunting by integrating additional open source or free tools to gather additional telemetry such as Sysmon and Velociraptor.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/CUUGBR/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/CUUGBR/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Workshop Room 4' guid='9a6adb6a-1b85-5acf-a921-f944d7859a6c'>
            <event guid='8fa64d0e-f4d6-58fc-8ac5-2d80d3927eb2' id='56484' code='KA9T8N'>
                <room>Workshop Room 4</room>
                <title>The AppSec lessons from Iron Man</title>
                <subtitle></subtitle>
                <type>Workshop - Short</type>
                <date>2024-12-14T10:00:00+00:00</date>
                <start>10:00</start>
                <duration>02:00</duration>
                <abstract>In this 2-hour interactive workshop, we will dive into the world of Application Security with the perspective of one of the most iconic tech-savvy superheroes: Iron Man. Like Tony Stark, who continuously refines his armor to fend off evolving threats, we will explore how developers, security champions, and engineers can fortify their applications against vulnerabilities.

The session will cover the full spectrum of Application Security, from threat modeling and secure coding to incident response, framed within the tech innovation and constant iteration that Iron Man embodies. Attendees will learn practical approaches to building robust security mechanisms into their software development lifecycle (SDLC), while maintaining agility in the face of new threats&#8212;just as Iron Man does with his suits.

Through engaging analogies, real-world examples, and actionable takeaways, participants will leave with a superhero&#8217;s toolkit to defend their applications from vulnerabilities, automate their defenses, and respond swiftly to incidents.

Key Topics:

Threat Modeling: Understanding the foundational elements of secure software.
DevSecOps: How to protect core application components from critical threats.
Vulnerability Management: Proactive vulnerability management process.
Application Monitoring: Incident response tactics that mirror Iron Man&apos;s agility in combat.

Get ready to suit up and protect your applications with the same ingenuity and foresight as Iron Man!</abstract>
                <slug>bsides-london-2024-56484-the-appsec-lessons-from-iron-man</slug>
                <track>Workshops</track>
                
                <persons>
                    <person id='58365'>C&#225;ssio Pereira</person>
                </persons>
                <language>en</language>
                <description>Step into the shoes&#8212;or rather, the suit&#8212;of Iron Man as we explore the dynamic world of Application Security. In this 2-hour workshop, you&apos;ll learn how to protect your applications with the same innovative strategies Tony Stark uses to shield his tech from relentless attacks.

This workshop is designed for developers, security engineers, and security champions who want to understand and implement security practices that are both robust and agile. We&#8217;ll cover every aspect of Application Security, from the fundamentals of secure coding to the latest automated defenses, all framed through the lens of Iron Man&#8217;s constant innovation and real-time problem-solving.

You&#8217;ll uncover how to:

Develop &#8220;armor&#8221; for your applications by integrating security from the start.
Protect the &#8220;arc reactor&#8221; of your system&#8212;its most critical components&#8212;from the most dangerous threats.
Improve your &#8220;battlefield awareness&#8221; with threat modeling and continuous vulnerability scanning.
Automate and scale your defenses using cutting-edge security tools.
Respond swiftly and effectively to incidents, with agility and precision, just like Iron Man in the heat of battle.
This engaging, workshop will not only provide practical insights and strategies but also inspire you to approach Application Security with creativity and foresight. By the end, you&#8217;ll be equipped with the tools and mindset to defend your applications like a true tech superhero.

Prepare to suit up&#8212;your journey to becoming an Application Security hero starts here!</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/KA9T8N/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/KA9T8N/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Aerospace Village' guid='1d0fd27e-d137-5b38-b185-dc6434a33942'>
            <event guid='02806f57-45c2-57ef-861a-e5b289ba8282' id='58995' code='MKVAAJ'>
                <room>Aerospace Village</room>
                <title>Aerospace Village</title>
                <subtitle></subtitle>
                <type>Workshop - Long</type>
                <date>2024-12-14T08:30:00+00:00</date>
                <start>08:30</start>
                <duration>09:00</duration>
                <abstract>The Aerospace Village is a volunteer team of hackers, pilots, and policy advisors who come from the public and private sectors. 
We believe the flying public deserves safe, reliable, and trustworthy air travel which is highly dependent on secure aviation and space operations. Our mission is to Build, inspire, and promote an inclusive community of next-generation aerospace cybersecurity expertise and leaders. 
We invite you to play with Bricks-in-the-Air, an interactive activity that uses a Lego aircraft model to demonstrate aviation system fundamentals.</abstract>
                <slug>bsides-london-2024-58995-aerospace-village</slug>
                <track>Aerospace Village</track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                <description>The Aerospace Village is a volunteer team of hackers, pilots, and policy advisors who come from the public and private sectors. 
We believe the flying public deserves safe, reliable, and trustworthy air travel which is highly dependent on secure aviation and space operations. Our mission is to Build, inspire, and promote an inclusive community of next-generation aerospace cybersecurity expertise and leaders. 
We invite you to play with Bricks-in-the-Air, an interactive activity that uses a Lego aircraft model to demonstrate aviation system fundamentals.</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/MKVAAJ/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/MKVAAJ/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Car Hacking Village' guid='b29d1d7d-3dae-5ad6-96ab-8cb9835d6ef1'>
            <event guid='d2947c0f-4467-5524-9670-fa7b941ba5fb' id='58994' code='JK9H3M'>
                <room>Car Hacking Village</room>
                <title>Car Hacking Village</title>
                <subtitle></subtitle>
                <type>Workshop - Long</type>
                <date>2024-12-14T08:30:00+00:00</date>
                <start>08:30</start>
                <duration>09:00</duration>
                <abstract>Car Hacking Village</abstract>
                <slug>bsides-london-2024-58994-car-hacking-village</slug>
                <track>Car Hacking Village</track>
                
                <persons>
                    <person id='60539'>-</person>
                </persons>
                <language>en</language>
                <description>Car Hacking Village</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/JK9H3M/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/JK9H3M/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Lock Picking Village' guid='627ee121-77c3-5a20-875a-9a792e1b67b3'>
            <event guid='72c4e296-ef93-52d5-9059-341a8e1a9541' id='58989' code='K8BP7H'>
                <room>Lock Picking Village</room>
                <title>Lock Picking Village</title>
                <subtitle></subtitle>
                <type>Workshop - Long</type>
                <date>2024-12-14T08:30:00+00:00</date>
                <start>08:30</start>
                <duration>09:00</duration>
                <abstract>Ever wondered how a lock works inside? Already know, and want to up your picking game?  Come and meet the experts from  TOOOL UK at the lockpicking village. 
The Open Organisation Of Lockpickers are a multinational group dedicated to defeating locks for fun and games. 
Learn to beat a pin tumbler lock, see inside various locks, padlocks and, er, even more locks! Come and play with locks!</abstract>
                <slug>bsides-london-2024-58989-lock-picking-village</slug>
                <track>Lock Picking Village</track>
                
                <persons>
                    <person id='60534'>Moon On A Stick &amp; Bristol Locksport</person>
                </persons>
                <language>en</language>
                <description>Ever wondered how a lock works inside? Already know, and want to up your picking game?  Come and meet the experts from  TOOOL UK at the lockpicking village. 
The Open Organisation Of Lockpickers are a multinational group dedicated to defeating locks for fun and games. 
Learn to beat a pin tumbler lock, see inside various locks, padlocks and, er, even more locks! Come and play with locks!</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/K8BP7H/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/K8BP7H/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Malware Village' guid='46a77e21-b2c8-53d8-830a-8df91bbea506'>
            <event guid='330f4162-c635-5c73-8b9c-b7019ded42f9' id='57020' code='THJBVS'>
                <room>Malware Village</room>
                <title>Malware Village</title>
                <subtitle></subtitle>
                <type>Workshop - Long</type>
                <date>2024-12-14T12:30:00+00:00</date>
                <start>12:30</start>
                <duration>05:00</duration>
                <abstract>In Malware Village, we will host various contests and workshops focused on malware analysis. Participants can experiment with and analyze malware under the guidance of professionals.

The full Malware Village* currently features three contests:

MARC I (Malware Analysis Report Competition)
BOMBE (Battle of Malware Bypass EDR)
EMYAC (Efficient Malware YARA Analysis Competition)

*In BSides London, we only have 4 hours, so we will host a subset of Malware Village.</abstract>
                <slug>bsides-london-2024-57020-malware-village</slug>
                <track>Malware Village</track>
                
                <persons>
                    <person id='58781'>Lena Yu</person>
                </persons>
                <language>en</language>
                <description>Details are on the Malware Village website: https://malwarevillage.org
MARC I &amp; BOMBE Details on DEF CON forums: https://forum.defcon.org/node/249321</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/THJBVS/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/THJBVS/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Quantum Village' guid='20ea5eb5-181b-53c6-91e6-f2abba278475'>
            <event guid='708a7ffc-bc8d-5a88-a215-87a9e8828418' id='58990' code='3CE8QD'>
                <room>Quantum Village</room>
                <title>Quantum Village</title>
                <subtitle></subtitle>
                <type>Workshop - Long</type>
                <date>2024-12-14T08:30:00+00:00</date>
                <start>08:30</start>
                <duration>09:00</duration>
                <abstract>Quantum Village</abstract>
                <slug>bsides-london-2024-58990-quantum-village</slug>
                <track>Quantum Village</track>
                
                <persons>
                    <person id='60535'>-Quantum Village</person>
                </persons>
                <language>en</language>
                <description>Quantum Village</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/3CE8QD/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/3CE8QD/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Train Hacking Village' guid='51dc831e-fd4c-5e0f-9b8c-754986526b0f'>
            <event guid='981a9fd8-af2b-57db-aea7-6a84a697bf6d' id='58991' code='7PHCEH'>
                <room>Train Hacking Village</room>
                <title>Train Hacking Village</title>
                <subtitle></subtitle>
                <type>Workshop - Long</type>
                <date>2024-12-14T08:30:00+00:00</date>
                <start>08:30</start>
                <duration>09:00</duration>
                <abstract>Train Hacking Village</abstract>
                <slug>bsides-london-2024-58991-train-hacking-village</slug>
                <track>Train Hacking Village</track>
                
                <persons>
                    <person id='60536'>-Train Hacking Village</person>
                </persons>
                <language>en</language>
                <description>Train Hacking Village</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/7PHCEH/</url>
                <feedback_url>https://cfp.securitybsides.org.uk/bsides-london-2024/talk/7PHCEH/feedback/</feedback_url>
            </event>
            
        </room>
        
    </day>
    
</schedule>
