Log in to bookmark your favorites and sync them to your phone or calendar.

Breaker [clear filter]
Wednesday, October 18


Call the plumber - you have a leak in your (named) pipe
As presented in the last Def Con Las Vegas:
Windows named pipes is a largely unfamiliar interface, or often mistekenly considered as an internal-only communication interface.

In this talk I will present how named pipes vulnerabilities can be exploited for remote denial of service, remote code execution and other dangerous attacks.


Gil Cohen

CTO, Comsec
Gil is an experienced application security instructor, architect, consultant and pentester just starting his 12th year in the field. _x000D_ With past experience in the civilian, government and military cyber security industries, Gil currently serves as the CTO of Comsec Group, in... Read More →

Wednesday October 18, 2017 10:10 - 10:55
Room 10 - CS and Communications Building
  • Technical Level All


IP Protection: How NOT to implement the license protection in .NET systems
IP is most valued property of the company, especially start-up.
There are many ways to implement the license protection in .NET systems.
Most, if not all, ways are wrong and can be easily compromised.
Discussed common methods to protect the license and methods to crack it

avatar for Vlad Bukin

Vlad Bukin

Security Research Manager, WAF, SpiderLabs, Trustwave
I am developer from dinosaur era - late 80-x of previous century. From this pre-historic time I am passionate about computers and software. I worked many years in software development area in many dev and lead roles: developer, leading developer, system architect, algorithm developer... Read More →

Wednesday October 18, 2017 11:05 - 11:50
Room 10 - CS and Communications Building


Don't let the cuteness fool you - Exploiting IoT's MQTT protocol

"Connect all the things!" is, for some time now, the main theme when talking about IoT devices, solutions and products. Our eagerness to find new, at times - innovative, ways to make anything to rhyme along the anthem of the internet is a great promise for malicious activity.

As those devices supposed to be lightweight they mostly rely on a small fingerprint stack of protocols - one of those protocols is the message protocol - MQTT.

We will go deep into protocol details, observe how common is to find such devices (and how), and several novel ways to abuse any one of tens of thousands easily spotted publicly facing MQTT brokers on the internet for "fun and profit".

During the presentation we will learn about - WHAT is using MQTT (common and extreme examples) - How SPREAD OUT it is? I’ll be sharing statistical information on different MQTT brokers and version fragmentation collected during research - An OVERVIEW of o its infrastructure and protocol bit & bytes (no prior knowledge required, your head won’t be blown). o General purpose TOOLS – libraries, open source software and apps - RECON – exploring device’s settings, gathering intel, spotting vulnerable devices (+ dropping tools) - Identifying clients - EXPLOITING bad configurations for fun and profit (+ in-the-wild examples): o Spy on subscribers via MQTT o Running remote code on connected devices. o Hijack unsuspected servers and utilize them for evil (e.g. botnet communication). o Misconfigured broker spits machine’s credentials. - DEMOs - Notes on securing your own MQTT-wielding IoT device. - All tools and scripts that were used will be shared right after the talk

avatar for dalmoz (Moshe Zioni)

dalmoz (Moshe Zioni)

Director of Threat Research, Akamai
Moshe (dalmoz) have been researching security since youth, positioned professionally since he was 18, when was actually surprised to find a place for his enthusiasm and talent. Consulted many industry leaders, banks, software vendors, insurance companies, health organizations, governments... Read More →

Wednesday October 18, 2017 15:25 - 16:10
Main Auditorium


Adversarial Machine Learning: 'Some rules can be bent, others can be broken'
Offensive AI allows us to leverage techniques used by ML algorithm to gauge their weak points and exploiting them. ML is great at identifying and classifying patterns, but an attacker can use the gray areas to influence (or even subvert) the pattern matching algorithms.

avatar for Guy Barnhart-Magen

Guy Barnhart-Magen

OS Hardening, Security Architecture and Embedded Devices, Cyber Security Consultant
BSidesTLV co-founder and CTF lead, Public speaker, and recipient of the Cisco “black belt” security ninja honor – Cisco’s highest cyber security advocate rank.With nearly 20 years of experience in the cyber-security industry, Guy held various positions in both corporates and... Read More →

Wednesday October 18, 2017 16:30 - 17:15
Main Auditorium