DEF CON remains the world’s premier hacking conference where the brightest minds in cybersecurity gather to share knowledge, push boundaries, and shape the future of digital defense—and we couldn’t be more excited to be part of this legendary event once again. 

NetSPI is thrilled to announce our talks and contests in Las Vegas in August. Check out the details below: 

We Know What You Did (in Azure) Last Summer

When: Friday, August 8 | 10:10-10:50am PT 
Location: Cloud Village, LVCC

Karl Fosaaen

Karl Fosaaen
VP, Research

Thomas Elling
Director, Azure/Entra/M365 Security Services

How much do you trust your cloud provider to hide the ownership information for your resources? Many organizations believe that their ownership information for cloud hosted resources is not available to anonymous users. Unless there’s an associated DNS record or other obvious identifiers (website content, SSL certificates, etc.), it might seem difficult to anonymously identify a cloud resource’s owner. What if we told you that some of your Azure resources can expose their ownership information?  

This talk will explain how multiple Azure resource types (and Microsoft services) inadvertently expose their ownership information, allowing attackers to enumerate potential entry points into an Azure tenant. Thanks to the supporting structure of Azure resource subdomains, and public DNS data sources, we enumerated the ownership information of over 500,000 Azure resources.  

We will wrap things up by sharing a new tool (ATEAM – Azure Tenant Enumeration and Attribution Module) that can be used to replicate our research, so you too can find out where all of your Azure resources have been hiding.

SSH-nanigans: Busting Open the Mainframes Iron Fortress through Unix

When: Sunday, August 10 | 10:00-10:45am PT 
Location: L1 – EHW3 – Track 3 in LVCC

Philip “Soldier of FORTRAN” Young
Practice Director, Mainframe Penetration Testing at NetSPI

Chad “Bigendian Smalls” Rikansrud
R&D Software Security Engineer at Broadcom

You may have heard tales of mainframe pentesting and exploitation before – mostly from us! Those stories often focused on the MVS/ISPF side of the IBM z/OS. But did you know that all those same tricks (and more!) can be pulled off in z/OS Unix System Services (OMVS) as well? I bet you didn’t even know z/OS had a UNIX side! 

Over the years we’ve discovered multiple unique attack paths when it comes to Unix on the mainframe. In this talk, we’ll present live demos of real-world scenarios we’ve encountered during mainframe penetration tests. These examples will showcase what can happen with poor file hygiene leading to database compromises, inadequate file permissions enabling privilege escalation, lack of ESM resource understanding allowing for privileged command execution, and how dataset protection won’t save you from these attacks. We’ll also be demonstrating what can happen when we overflow the buffer in an APF authorized dataset. 

Attendees will learn how to test these controls themselves using freely available open-source tools and how to (partially) detect these attacks. While privesc in UNIX isn’t game over for your mainframe, it’s pretty close. By the end, it will be clear that simply granting superuser access to Unix can be just as dangerous, if not more so, than giving access to TSO on the mainframe. 

Contests

Tib3rius

Tib3rius
  • Friday at 10am PT on Contest Stage: Aw, man…pages! 
  • Friday at 4pm PT on Contest Stage: Um, ACKtually! 
  • Saturday at 10:30pm PT on Track 1&2: Feet Feud (Hacker Family Feud) 

Phil Young

  • Friday at 10am PT – Sunday at 12pm PT: PhreakMe

Team NetSPI will be at BSides Las Vegas and Black Hat USA!

Take a look at our other speaking engagements: