This Meetup is past

26 people went

Location visible to members

Details

DATE: Thursday, June 6th, 2013 TIME: 6:00pm-8:30pm LOCATION: SecondMarket 636 Avenue of the Americas (Entrance on 19th St.) 5th Floor New York, NY 10011 Enter the building and check-in with building security. You will then be escorted to the break room and auditorium. PLEASE BRING ID OR YOU MAY NOT BE ABLE TO ENTER THE PREMISES. Lost? Questions on the day of the event? Contact Karsten at[masked] Closest trains are: 1 (18th Street station) F, M (23rd Street station) N, R (23rd Street station) L (6th Ave station) ** RSVP if you wish to attend through Meetup (http://www.meetup.com/iSEC-NYC-Open-Forum/) or email ([masked]) us! ** ** Complimentary food and beverages also provided ** -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= AGENDA -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= SPEAKER: David Myers / SecondMarket TITLE: Building Security into our Process: How SecondMarket Tackles Web Security ABSTRACT: It’s easy to talk about common web vulnerabilities and how to exploit them — but in this talk, Dave Myers will describe how SecondMarket improved its development processes and hardened its platform against these vulnerabilities, even with an existing web application under active agile development. This case study will discuss implementing system-wide protections, instituting secure development practices, and ensuring new features are protected as they’re developed. SPEAKER: Ang Cui / Columbia University TITLE: Stepping P3wns: Adventures in full spectrum embedded exploitation (and defense!) ABSTRACT: Our presentation focuses on two live demonstrations of exploitation and defense of a wide array of ubiquitous networked embedded devices like printers, phones and routers. The first demonstration will feature a proof-of-concept embedded worm capable of stealthy, autonomous polyspecies propagation. This PoC worm will feature several embedded device vulnerabilities previously disclosed by the authors. We will demonstrate how an attacker can gain stealthy and persistent access to the victim network via multiple remote initial attack vectors against routers and printers. Once inside, we will show how the attacker can use other embedded devices as stepping stones to compromise significant portions of the victim network without ever needing to compromise the general purpose computers residing on the network. The second demonstration showcases host-based embedded defense techniques, called Symbiotes, developed by the authors at Columbia University under support from DARPA's Cyber Fast Track and CRASH programs, as well as IARPA's STONESOUP and DHS's S&T Research programs. The Symbiote is an OS and vendor agnostic host-based defense designed specifically for proprietary embedded systems. We will demonstrate the automated injection of Software Symbiotes into each vulnerable embedded device presented during the first demonstration. We then repeat all attack scenarios presented in the first demo against Symbiote defended devices to demonstrate real-time detection, alerting and mitigation of all malicious embedded implants used by our PoC worm. Lastly, we demonstrate the scalability and integration of Symbiote detection and alerting mechanisms into existing enterprise endpoint protection systems like Symantec End Point. SPEAKER: Michael Lynch / iSEC Partners TITLE: Adventures in Network Protocol Fuzzing ABSTRACT: Fuzz testing is a great way to uncover security vulnerabilities, but has a significant barrier to entry. Creating a fuzzer from scratch is a costly undertaking, and most existing fuzzing frameworks either lack flexibility or are perceived as difficult to learn. In this talk, Michael will share his experiences writing a network protocol fuzzer using the Peach fuzzing framework. He’ll take you through his happy triumphs, warn you of the crushing pitfalls, and discuss effective strategies for fuzzing and working with Peach. During the presentation, Michael will provide a live demonstration of PeachFarmer, an open source tool he created during his research to facilitate fuzz testing in the cloud. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= About the iSEC Open Forum -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= The iSEC Open Forum is an informal and open venue for the discussion and presentation of security related research and tools, and an opportunity for security researchers from all fields to get together and share work and ideas. Open Forum meets quarterly in the Bay Area, Seattle and New York City. Forum agendas are crafted with the specific needs/interests of its members in mind and consist of brief 30 minute talks. Talks are not product pitches or strongly vendor preferential. Attendance is by invite only. Any area of security is welcome including reversing, secure development, new techniques or tools, application security, cryptography, etc. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=