Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

8/6/2009
10:24 PM
David Maynor
David Maynor
Commentary
50%
50%

SecurityBSides: The Best-Kept Vegas Secret

Getting to SecurityBSides made me think of all the Vegas movies where a casino boss takes a cheater out into the desert and buries him in the sand.

Getting to SecurityBSides made me think of all the Vegas movies where a casino boss takes a cheater out into the desert and buries him in the sand.After getting into a towncar at the Caesar's Palace valet stand, the driver took me through an alley, down a dirt road, and into a construction site before finally arriving at a nondescript gated house on a remote cul-de-sac. After assuring the driver that this address was correct and where I really wanted to be, I took a deep breath and walked through the front door. The young lady waiting inside the door who took our names and accepted donations gave the experience the feel of entering a speakeasy. I was surprised there was not a password, secret knock, or mandatory decoder ring presentation.

After this build-up you might assume that I was at this house to purchase guns, drugs, cheap women, or something equally scandalous. Nothing could be further from the truth, I was there to see some presentations on security. While Black Hat had multiple tracks, almost 100 speakers, and entire ballrooms at Caesars Palace -- SecurityBSides had a den converted to a presentation room, a pool, a vending machine dispensing soda while playing music, and several coolers with free soda.

You'd think this setting warranted watered-down speakers, but no: this intimate gathering drew some big names, like Metasploit creator HD Moore. The topics ranged from proximity-based identity theft to earlier Twitter attacks, to advanced war-dialing techniques. Each of the talks was focused more on fostering intellectual debate than promoting the speaker's latest book, or their company's product sales pitch. After listening to a few talks, I began to forget about the way conferences normally run -- with the airplane-sized rooms, antiseptic talks, and the 10-15 minutes of Q&A time afterward where there is neither time nor ability to delve deeply into any topics.

SecurityBSides was nothing like those large cattle-call type conferences. It had the vibe of a hacker commune with lots of interesting people to talk to, room to setup laptops, and to watch as casual conversations turned into brainstorming sessions. One of the nice features of this informal format was that the audiences of 25-30 attending researchers felt okay divulging details of projects they are working on -- giving a peek under the hood to see the engine and talk spark plug,s rather than just glossing over the exterior.

This sense of intimacy and detail was aided by the speakers' choice of whether they wanted all, none, or a portion of their talk to be recorded. Speakers were not only available for questions, they took the time to sit outside the presentation "den" and engage in full discussions of various aspects of their talks. They were willing to chat security as long as folks were willing to join them.

The most interesting part of SecurityBSides is that the coordination, calls for speakers, attendance lists, and marketing was almost entirely by word of mouth. And in this day and age, that means Twitter. SecurityBSides was marketed as an alternative to the impersonal nature of Black Hat. After spending time there, I would say the organizers were enormously successful. I am happy to see that the organizers are planning a similar event opposite during RSA in San Francisco.

David Maynor is CTO of Errata Security. Special to Dark Reading

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Firms Improve Threat Detection but Face Increasingly Disruptive Attacks
Robert Lemos, Contributing Writer,  2/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8813
PUBLISHED: 2020-02-22
graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege.
CVE-2020-9039
PUBLISHED: 2020-02-22
Couchbase Server 4.x and 5.x before 6.0.0 has Insecure Permissions for the projector and indexer REST endpoints (they allow unauthenticated access).
CVE-2020-8860
PUBLISHED: 2020-02-22
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Samsung Galaxy S10 Firmware G973FXXS3ASJA, O(8.x), P(9.0), Q(10.0) devices with Exynos chipsets. User interaction is required to exploit this vulnerability in that the target must answer a phone call. T...
CVE-2020-8861
PUBLISHED: 2020-02-22
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-1330 1.10B01 BETA Wi-Fi range extenders. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue ...
CVE-2020-8862
PUBLISHED: 2020-02-22
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-2610 Firmware v2.01RC067 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of passwords. The issue results from the ...