DEF CON remains the world’s premier hacking conference where the brightest minds in cybersecurity gather to share knowledge, push boundaries, and shape the future of digital defense—and we couldn’t be more excited to be part of this legendary event once again.
NetSPI is thrilled to announce our talks and contests in Las Vegas in August. Check out the details below:
We Know What You Did (in Azure) Last Summer
How much do you trust your cloud provider to hide the ownership information for your resources? Many organizations believe that their ownership information for cloud hosted resources is not available to anonymous users. Unless there’s an associated DNS record or other obvious identifiers (website content, SSL certificates, etc.), it might seem difficult to anonymously identify a cloud resource’s owner. What if we told you that some of your Azure resources can expose their ownership information?
This talk will explain how multiple Azure resource types (and Microsoft services) inadvertently expose their ownership information, allowing attackers to enumerate potential entry points into an Azure tenant. Thanks to the supporting structure of Azure resource subdomains, and public DNS data sources, we enumerated the ownership information of over 500,000 Azure resources.
We will wrap things up by sharing a new tool (ATEAM – Azure Tenant Enumeration and Attribution Module) that can be used to replicate our research, so you too can find out where all of your Azure resources have been hiding.
SSH-nanigans: Busting Open the Mainframes Iron Fortress through Unix
When: Sunday, August 10 | 10:00-10:45am PT
Location: L1 – EHW3 – Track 3 in LVCC

Philip “Soldier of FORTRAN” Young
Practice Director, Mainframe Penetration Testing at NetSPI
You may have heard tales of mainframe pentesting and exploitation before – mostly from us! Those stories often focused on the MVS/ISPF side of the IBM z/OS. But did you know that all those same tricks (and more!) can be pulled off in z/OS Unix System Services (OMVS) as well? I bet you didn’t even know z/OS had a UNIX side!
Over the years we’ve discovered multiple unique attack paths when it comes to Unix on the mainframe. In this talk, we’ll present live demos of real-world scenarios we’ve encountered during mainframe penetration tests. These examples will showcase what can happen with poor file hygiene leading to database compromises, inadequate file permissions enabling privilege escalation, lack of ESM resource understanding allowing for privileged command execution, and how dataset protection won’t save you from these attacks. We’ll also be demonstrating what can happen when we overflow the buffer in an APF authorized dataset.
Attendees will learn how to test these controls themselves using freely available open-source tools and how to (partially) detect these attacks. While privesc in UNIX isn’t game over for your mainframe, it’s pretty close. By the end, it will be clear that simply granting superuser access to Unix can be just as dangerous, if not more so, than giving access to TSO on the mainframe.
Contests
Tib3rius

- Friday at 10am PT on Contest Stage: Aw, man…pages!
- Friday at 4pm PT on Contest Stage: Um, ACKtually!
- Saturday at 10:30pm PT on Track 1&2: Feet Feud (Hacker Family Feud)
Phil Young

- Friday at 10am PT – Sunday at 12pm PT: PhreakMe
Team NetSPI will be at BSides Las Vegas and Black Hat USA!
Take a look at our other speaking engagements:
Explore More Events and Webinars

BSides Las Vegas
Learn what Team NetSPI is doing at BSides Las Vegas – 3 talks about affordable hardware security tooling, how to give a CFP, and cybersecurity leadership.

GDS Security Insight Summit Netherlands
Schedule a 1:1 with Team NetSPI at the GDS Security Insight Summit 27-28 October at the Grand Hotel Huister Duin in Noordwijk Netherlands.

International Cyber Risk Summit
Stop at NetSPI’s booth at the International Cyber Risk Summit July 10-11 at the The Westin DC Downtown in Washington, DC.