- Видео 280
- Просмотров 302 942
Security BSides London
Великобритания
Добавлен 30 дек 2013
The Official Security BSides London RUclips Channel
This is where you will find official videos from the events hosted in London.
About Security BSides London
Launched in mid-2009, Security B-Sides is a community-driven event built for and by information security community members. The goal is to expand the spectrum of conversation beyond the traditional confines of space and time. It creates opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration. It is where conversations for the next-big-thing are happening and the Security B-Sides London team is bringing this back to London.
This is where you will find official videos from the events hosted in London.
About Security BSides London
Launched in mid-2009, Security B-Sides is a community-driven event built for and by information security community members. The goal is to expand the spectrum of conversation beyond the traditional confines of space and time. It creates opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration. It is where conversations for the next-big-thing are happening and the Security B-Sides London team is bringing this back to London.
Malware Campaign Tracking Using Big Data Analytics And Machine Learning Clustering - Daniel Johnston
Our talk introduces an innovative framework for automating the identification and handling of malware samples targeting web servers, leveraging big data analytics and machine learning to cluster and track active malware campaigns. We will demonstrate an innovative and unique framework that employs heuristic analysis to autonomously identify and process web-delivered malware samples. This framework enhances the efficiency and accuracy of malware detection in large data sets, reducing the reliance on manual intervention, and enabling near real-time threat hunting, and campaign tracking.
Building upon the collected malware data, we utilize big data analytics techniques to track and monitor m...
Building upon the collected malware data, we utilize big data analytics techniques to track and monitor m...
Просмотров: 9
Видео
How To Attack A SIEM - Daniel Crossley
Просмотров 406 часов назад
SOC teams commonly rely on Security Information and Event Management (SIEM) tools to detect, analyse, and respond to security threats. In this presentation, we will introduce key SIEM concepts and the role of the SIEM in the SOC, as well as discuss shortfalls of SIEM tools. Then we shall explore the possibility of attacks and evasion techniques in SIEMs. We will also discuss the general challen...
Let’s Phish: How To Scam Everyone, Everywhere, All At Once - Dita Pesek
Просмотров 46 часов назад
You will hear two stories of crime: the story of a kidnapped daughter and the story of a fake DJ. In these stories, we will explore key techniques that, when implemented correctly, can provide a blueprint for hacking anyone. Preparation of a Hack: Identifying the right victim and their weaknesses. This section of the talk outlines simple steps for uncovering a target's vulnerabilities that can ...
When The Hunter Becomes The Hunted: Using Minifilters To Disable EDRs - Tom Philippe
Просмотров 36 часов назад
1. Introduction This presentation will explore the use of minifilters, an essential components of EDRs, in offensive security operations, with a focus on their application in bypassing and disabling EDR systems. 2. EDR Architecture Overview We will first provide a high level description of EDR systems, their components and architecture. This is essential to understand how minifilters contribute...
Post-Quantum Cryptography For 2025 - Andy Smith
Просмотров 86 часов назад
With the first three quantum-resistant cryptographic algorithms standardised by NIST in August 2024, the starting gun has been fired on the Y2K-style problem of upgrading the crypto used in almost all of our modern electronic devices. In this session you'll learn: * What's the real threat that quantum computers pose * An overview of the options to safeguard against that threat * How techniques ...
CV Workshop - Samira Ali
Просмотров 86 часов назад
I would like to offer an engaging fun session for 45 minute about how to make your CV an A* CV in order to get job interview. I have over 14 years experience in HR & Training so I would like to share tips on how to get your foot in the door with a great CV.
Explaining ICS To A Fool Of A Took - halfling
Просмотров 76 часов назад
There are thirteen pillars upholding the critical national infrastructure (CNI) that allows for the every day running of our society. These pillars are sectors that rely on four generations of operational technology (OT) systems with the oldest generation being pre-Internet. What are these industrial control systems (ICS) that we rely on, and how are they vulnerable? This talk will outline a ge...
Using The OWASP Top 10 To Save The Astronauts From HAL - Nick Dunn
Просмотров 206 часов назад
The talk will use the OWASP Top 10 for ML and OWASP Top 10 for LLMs to anyalze the nature of the flaws in HAL 9000, the AI in 2001: A Space Odyssey, and how this led to disastrous results for the mission. There will be a discussion of failures to consider different aspects of both the LLM and ML top 10 during HAL's design and training phases, and the subsequent attempts to implement fixes durin...
Software Security Issues For Small IoT SoCs - Stephen Cravey
Просмотров 46 часов назад
Ever wondered how your smart toothbrush or connected garden rock stays secure in our digital world? As the Internet of Things (IoT) brings connectivity to everyday objects-from cars to clothing-it's more important than ever to keep these devices safe from cyber threats. But here's the challenge: many IoT gadgets run on tiny chips called Systems on Chip (SoCs) that don't have the power of full-s...
What’s Inside The Open Directory From 96 Different Threat Actors? - Alana Witten
Просмотров 126 часов назад
Understanding the TTPs used by threat actors is often only done after an incident when the damage is done, made from inferences of what they allow us to see. What if analysts had full access to exactly how these actors operate: the commands they ran, their targets, accurate geolocations, tools, and more. Luckily, over the last few years, 96 brazen threat actors, ranging from script kids to alle...
Is Your Approach To Pipeline Security Flawed? Rethinking CI/CD Security - Patricia R
Просмотров 506 часов назад
With DevSecOps becoming the standard, CI/CD pipelines have become the backbone of software development and deployment, running thousands of times a day. Each pipeline executes critical tasks such as building, testing, and deploying code - often leveraging automation and guardrails to ensure quality and security. Tools that integrate in pipelines promise to help. But what exactly is a pipeline? ...
An Introduction To Fault- Injection For Exploiting Bug-Free Code In Embedded Systems - @barsteward
Просмотров 756 часов назад
This talk will introduce attendees to fault-injection, a local attack category which is often used as the first step in the attack chain for embedded systems, and in some cases can also lead to remote attacks. It will cover the techniques which attackers use to generate security violations such as bypassing read protection, secure boot, or debug protection in embedded systems, even when the cod...
Cybersecurity’s New Imperative: Strengthening The Mental Immune System - Winn Schwartau
Просмотров 96 часов назад
This Talk is Important-very important-for the cybersecurity industry, hackers, and policymakers from the Boardroom to the Halls of Government. A long time ago, on June 27, 1991, Winn testified before the US Congress and was asked, “Mr. Schwartau: Why would the bad guys ever want to use the internet?” Today, our cognitive infrastructure is under attack, and humanity needs cybersecurity professio...
The Past, Present And Future Of Cloud-Native Security - Emma Yuan Fang
Просмотров 96 часов назад
Cloud-native has revolutionised how we build and deploy applications, but let's face it - we've made our share of mistakes along the way. From the early days of on-prem to today's massive cloud-native deployments, this has not only transformed application development but also dramatically reshaped the infrastructure, DevOps practices, and the overall security landscape. This talk takes a look a...
BYOTB: Bring Your Own Trusted Binary - David Kennedy
Просмотров 136 часов назад
BYOTB: Bring Your Own Trusted Binary - David Kennedy
The Practical Application Of Indirect Prompt Injection Attacks - David Willis-Owen
Просмотров 186 часов назад
The Practical Application Of Indirect Prompt Injection Attacks - David Willis-Owen
Elevate Your SSRF Game: Weaponize Internal DNS Records To Expose Hidden Endpoints - Guy Arazi
Просмотров 86 часов назад
Elevate Your SSRF Game: Weaponize Internal DNS Records To Expose Hidden Endpoints - Guy Arazi
Inside The Ransomware Toolbox: How To Beat Cybercriminals At Their Own Game - Will Thomas
Просмотров 2276 часов назад
Inside The Ransomware Toolbox: How To Beat Cybercriminals At Their Own Game - Will Thomas
From Garden To Grid: Lessons From Gardening For A Resilient Cybersecurity Strategy - Becky Hall
Просмотров 66 часов назад
From Garden To Grid: Lessons From Gardening For A Resilient Cybersecurity Strategy - Becky Hall
A Guide To Compromising Phishing Infrastructure - Vangelis Stykas & Felipe Solferini
Просмотров 156 часов назад
A Guide To Compromising Phishing Infrastructure - Vangelis Stykas & Felipe Solferini
Building The ATT&CK Pipeline For Linux - Tim Wadhwa-Brown
Просмотров 26 часов назад
Building The ATT&CK Pipeline For Linux - Tim Wadhwa-Brown
Closing Bits, Raffle And Prize Awards - BSides London
Просмотров 16 часов назад
Closing Bits, Raffle And Prize Awards - BSides London
MSSP, MDR, MFA - So Why Isn't Incident Response Solved? - Tim Haynes
Просмотров 356 часов назад
MSSP, MDR, MFA - So Why Isn't Incident Response Solved? - Tim Haynes
Turning To The Dark Side: Utilizing Offensive Techniques In Incident Response - Archie Essien
Просмотров 206 часов назад
Turning To The Dark Side: Utilizing Offensive Techniques In Incident Response - Archie Essien
Memoryless Peripherals And Secure Notebooks - Kai Harris
Просмотров 176 часов назад
Memoryless Peripherals And Secure Notebooks - Kai Harris
The Trustworthiness Of Generative AI In Real-Time Decision-Making - Meet Bhorania and Yash Akbari
Просмотров 626 часов назад
The Trustworthiness Of Generative AI In Real-Time Decision-Making - Meet Bhorania and Yash Akbari
Disabling Drones: Disruption And Forensic Data Analysis - Paavai Aram
Просмотров 306 часов назад
Disabling Drones: Disruption And Forensic Data Analysis - Paavai Aram
Quantum Safe Cryptography: A Buzzword Or Something More Serious? - Suketu
Просмотров 156 часов назад
Quantum Safe Cryptography: A Buzzword Or Something More Serious? - Suketu
Great work Kartik!
Smashing that like button
Smashing that like button
Brilliant talk! Some hard questions there too!
Love these guys.
so much useful to a big mass
Extra ordinary. & Commendable
Nice, how amazing robotics engineering has upgraded and also improved our lives 😊😊😊
Amazing 👏
(( aa )) is there any cryptographic process that keeps the secret even if the trusted friend is really an enemy ? that after all is often the suspicion in society. (( bb )) can scientific discovery be seen as a process of partially decrypting the universe, and the universe as an encrypted form of its underlying code ?
The key is at 6:46 because it's totally not obvious why that is. Why is doing "two times a complex operation on point A (so doubling A), followed once by the same operation on the resulting point B (so doubling B, which is 4 times A)" the same as doing "four times the initial complex operation on point A". Doubling A, and then doubling the result B again are 2 calculations. But four times an addition of A is four operations. That's like a rubiks cube: the order of twists is very relevant to where you end up. I mean, I have to assume these statements are correct but it is not obvious why. In fact, I think that the amount of math behind that is enormous. But exactly that is the bread&butter of this algorithm.
Who is here because of Task 3?
2024 watch this video🎉
great
I have been watching countless videos on how to get started in cyber sec and this video was hilariously to the point!! thanks for everything
We ran the exploit 16 times 😂😂
Great video!
Oh blessed cybersecurity professionals, Thank you for the knowledge I sought to write my paper. May you logs stay untampered and your files left intact.
Cool
Hi Hela. Thoroughly enjoyed your talk. I am studying cybersecurity and took some notes that have helped me with my assignments. The forensics side of things have sparked an interest in me. Any advice on where to start will be appreciated. Look forward to more presentations.
✋ 'PromoSM'
I remember my older brother editing the stats of the soldiers in X-com enemy unknown. We set the firing accuracy to the highest value, I think it was FFFFFF, at it make the ingame statbars to actually go past its max point, and start overlapping the rightside of the screen. But hey, They were accurate as hell
The current system..... Meritocracy - a society governed by people selected according to merit. What you are trying to achieve Racism - the belief that different races possess distinct characteristics, abilities, or qualities Sexism - the discrimination of a person based on their sex. Just to point out, I have about 20 years in the industry, nobody is going to hire you after a year of just fucking about pretending you are a hacker. Get some skills and stop crying that it's you need more diversity.
Just to highlight this, about 14 minutes in a listener is agreeing that we need less people with experience and more diverse people because they bring different ideas. See what I wrote about racism above, that's the definition, saying that we need diversity because it's not your experience that makes you a better employee it's the fact you are a different skin colour, religion or gender that makes you the best candidate. We fought world war 2 end this shit and you are bringing it all back.
Nice talk!
Great talk, clearly explained - thanks
Excellent talk
Thank you CyberCelt. appreciate the kind words!
@@dhruvbisani4467 Hi dhruv i attended your talk and didn’t have time to ask you some questions related to Red teaming. How can I contact you?
The "BYOVD-like attack theorised by members of UC" was not a theory. It was active years prior to 2015, there was a leak of information to abuse CPU-Z on UC around end of 2014 and then it spread like wildfire on the site. It was the go to method at the time (and other overclocking tools that let you arbitrarily rd/wr MSRs or physical memory) and still is used as mentioned. Infosec just didn't pick up on it much until 2017-2018ish because it was so dead simple that any pea brain could look at DriverObject->MajorFunction[14] and see ZwMapViewOfSection(\Device\PhysicalMemory) and go to town.
Plz unpack VMP I pay you!
All of the smartest hackers I got to work with in the industry over the years started in game hacking.
spicy
Fantastic talk, really interesting topic about exploring the dark web, a lot of really good stats about the insights around Tor (and the dark web). As Mentioned with it being Stefan's first talk, he dealt with the questions fantastically. Good job 👍👍
Fantastic talk for a recent grad and aspiring CTI analyst such as myself, well done! I hope your career has taken you far!
You're pretty flippant for a keynote speaker. When have you actually seen guns sold and shipped? Bitcoin is fake money huh? Worth more than gold. I think you mixed up some Alphabay and Empire facts. Hansa did go down for a bit under Dutch control when they were apply some of their spy tools. Cazas phone was locked. They tricked him with a story to unlock it. I think you over shot alphabays listings and users Did you call Dread Dreaditt?
Great presentation! Very professional well done!
Great!!!🇦🇿🇬🇧
so clearly
So proud
Fantasztikus informatív egyben motiváló!
FYI: JWTs have been designed to offer a standardized mechanism for encoding OAuth access tokens. If you look at from this perspective then you will suddenly see a very different story.
If Eric Zimmerman gave up tomorrow what tool would you use lmao? What a great ending question 😂😂😂😂
Good information, although my only suggestion is for the speaker to get some "media training". It almost feels like rambling with the "um" and pacing around.
He's speaking just fine as he should be, I'd suggest you learn the accent instead.
@@MsShailp Learn the accent? Are you dim? Constantly saying "um" isn't a good way to present.
In my community in Winchester VA stalker ware used by the hospital homeless police
Thank you for the simple explanation! Helped me a lot than reading few research papers :D
Nice one Rory 👍
Amazing and very informative talk! I'm eager to put some of Foo's advices in practice :D
Why would you do that? You must be one of those tattle tell kids no one liked. Pussy
Thank you, awesome video
one guy's name was literally Marcos Paulo?
We need jamming ones...for sound weapons
Audio gets better after 1:27.