Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

6/29/2016
12:10 PM
Lysa Myers
Lysa Myers
Commentary
Connect Directly
Facebook
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

The Newbies 'How To Survive Black Hat' Guide

There's little chance you won't be totally exhausted after "drinking from the information firehose" all week. But if you follow these eight steps, it will be a very satisfying kind of fatigue.

Preparing to attend your first Black Hat conference can feel a little daunting. Between its reputation for having the most hostile network in the world and a dizzying agenda of security’s best and brightest presenting their most newsworthy research, where do you even start? Here is a checklist to help prepare you to get the most out of the festivities.

Look at the agenda
The best first step to prepare for Black Hat is creating a list of sessions you would like to attend. Prepare backup plans: popular sessions fill quickly, people’s meeting schedules change, and you may need more downtime than you think. Lines for newsworthy sessions can start to form over an hour in advance. Ladies, keep an eye on the locations of women’s restrooms, as they may be converted to temporary men’s rooms mid-day.

Coordinate meetings
As fantastic as the sessions are, for many people Black Hat is primarily a networking event. Loads of folks in the infosec industry attend, so if there is someone in the industry you want to meet, this is the place to do it. If there is a conflict between a session and a meeting that you want to attend, keep in mind that the sessions are recorded. Unless you plan to ask questions of the speaker, you can still get all the information without attending in real time.

Prepare for a marathon of walking
Briefings are spread out over several floors, and the exhibit floor is sizeable. You will be walking. A lot. Wear comfortable shoes, and bring a backup pair or two to give your feet a break. Travel as light as possible. Learn some stretches you can do in your room or while standing in line to help you reset. Get a good understanding of the floor plan in advance, to minimize unnecessary wandering.

Update your security
Take some time before you leave to beef up your security. Update your software, especially the operating system, browser, and plugins. Block all incoming ports and require outgoing apps to receive manual approval to access the network. Remove any sensitive information from your devices, or use dedicated ones with minimal personal info. Use privacy screen protectors. Use RFID blockers for passports and payment cards. Enable two-factor authentication wherever it’s available. Install HTTPS Everywhere. Make sure your passwords are strong and unique for all accounts. Take a snapshot of your devices to make restoring them from backup as easy as possible.

Security on the floor
Ideally you should leave your laptop at home and bring a burner phone with minimal personal info. If you can’t do that, you can still minimize your risk by taking some precautions. Encrypt your devices. Turn off Wi-Fi, Bluetooth, and NFC. Turn off your phone or put it in airplane mode as much as possible. Use the internet sparingly and don’t log in websites or services unless absolutely necessary. If you do, use VPN and the cell network whenever possible, at least 1000 feet from the conference area. Do not use ATMs, as there may be skimmers (and exorbitant fees). Log out of as many services as you can, especially banking and mobile wallet apps, until you’re home. Just say no to charging stations, and scan removable media before use.

Take care of yourself
Black Hat happens during the dog days of summer, in the desert. The predicted temperature for the first day of summer in Las Vegas is 114; it gets unbelievably hot. While the air conditioning system does an amazing job of keeping things reasonable inside, it won’t be office-building chilly. You might still sweat, even though the air is quite dry. Make time to hydrate and shower more often than you would at home. Carry a water bottle. Don’t forget to eat. And as parties can go into the wee hours, plan to make time to sleep.

Use the buddy system
We’ve all heard stories of people who performed a Career Limiting Maneuver at some conference or other after getting inebriated. Brains addled with alcohol tend to make us more susceptible to social engineering and disclosing too much information. Desert conditions, exhaustion and sleep deprivation can make alcohol more potent than usual. Bring a buddy (especially if one of you doesn’t drink) to keep everybody safe and happy.

Restore from a known-clean backup
When you get home, restore your devices from known-clean backup, to purge your devices of anything that might have slipped in unnoticed. Don’t forget to reflash the firmware or BIOS if possible.

With some advanced planning, you can head home with less risk of feeling like you spent all week drinking from the information firehose. Black Hat can be a fun, invigorating week of learning and of meeting new people. While there’s little chance you won’t be totally exhausted by the end of the week, it is entirely possible for it to be a satisfying kind of fatigue.

Related Content:

Black Hat USA returns to the fabulous Mandalay Bay in Las Vegas, Nevada July 30 through Aug. 4, 2016. Click for information on the conference schedule and to register.

Lysa Myers began her tenure in malware research labs in the weeks before the Melissa virus outbreak in 1999. She has watched both the malware landscape and the security technologies used to prevent threats from growing and changing dramatically. Because keeping up with all ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Zero Trust doesn't have to break your budget!
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31476
PUBLISHED: 2021-06-16
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.1.3.37598. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the han...
CVE-2021-31477
PUBLISHED: 2021-06-16
This vulnerability allows remote attackers to execute arbitrary code on affected installations of GE Reason RPV311 14A03. Authentication is not required to exploit this vulnerability. The specific flaw exists within the firmware and filesystem of the device. The firmware and filesystem contain hard-...
CVE-2021-32690
PUBLISHED: 2021-06-16
Helm is a tool for managing Charts (packages of pre-configured Kubernetes resources). In versions of helm prior to 3.6.1, a vulnerability exists where the username and password credentials associated with a Helm repository could be passed on to another domain referenced by that Helm repository. This...
CVE-2021-32691
PUBLISHED: 2021-06-16
Apollos Apps is an open source platform for launching church-related apps. In Apollos Apps versions prior to 2.20.0, new user registrations are able to access anyone's account by only knowing their basic profile information (name, birthday, gender, etc). This includes all app functionality within th...
CVE-2021-32243
PUBLISHED: 2021-06-16
FOGProject v1.5.9 is affected by a File Upload RCE (Authenticated).