6531_Security_Summit_WEB_01.jpg

 

 

Follow live coverage on Twitter: #JailbreakSec

The world's only security summit held at a production brewery.

Join some of the world's best security researchers as they talk about vulnerabilities in security tools at the only computer security event held at a production brewery.  Attendance is limited to 100 to keep the Security Summit small and encourage conversation between speakers, attendees, and sponsors.

Tickets include breakfast, lunch, and some drink tickets for happy hour.  Oh, and it includes a seat at the Security Summit to partake in the talks and discussion.

Come participate in the talks, the conversation, and the beer!


 

DATE

Friday, April 28, 2017

Location

Jailbreak Brewing Company
9445 Washington Blvd N
STE F
Laurel, MD 20723

Hours

Registration 9a
Talks 9a–5p
Happy Hour 5p-?

Price

$125

background_image2.jpg

Sponsors

Without the efforts of these amazing companies, the Jailbreak Brewing Company Security Summit would not have been possible. Please give them your support!

PLATINUM

GOLD

SILVER

Media coverage provided by:

Speakers

Patrick Wardle 

OverSight: Exposing Spies on macOS

BIO

Patrick Wardle is the Director of Research at Synack, where he leads cyber R&D efforts. Having worked at NASA and the NSA, as well as presented at many security conferences, he is intimately familiar with aliens, spies, and talking nerdy. Currently, Patrick’s focus is on automated vulnerability discovery, and the emerging threats of OS X and mobile malware. In his personal time, Patrick collects OS X malware and writes free OS X security tools. Both can be found on his personal website: http://www.Objective-See.com

TALK

One of the most insidious actions of malware is abusing the video and audio capabilities of an infected host to record an unknowing user. Macs of course, are not immune; malware such as OSX/Eleanor, OSX/Crisis, and others, all attempt to spy on OS X users.
And as was recently shown by the author, more advanced malware could piggyback into legitimate webcam sessions in order to covertly record the local user. As there are no visible indications of this malicious activity (as the LED light is already on), the malware can record both audio and video without fear of detection.

After examining various ‘webcam-aware’ OS X malware samples and describing the technical details of the piggyback attack, the talk will dive into OverSight. OverSight is a free tool that implements various novel protection mechanisms in order to alert Mac users of any code that attempts to access the mic or webcam (even via the stealthy piggyback attack). We’ll dive into the design and technical details of tool, describing various components.

Following this, we’ll look at an interesting case study, where OverSight discovered that a popular mac application was continuing to record, even when the user turned it off. Yikes!  Finally, the talk will conclude by discussing future trends of both webcam/mic aware macOS malware and defensive detection methodologies. With such insights, we’ll strive to keep macOS users protected and secure!

Jonathan Levin

BIO

Jonathan Levin is a trainer and consultant specializing in operating system internals. He is the author of definitive books on Android Internals as well as "Mac OS X and iOS Internals" (now in its second edition), and provides plentiful tools and research for the community on the books' web sites. He is founder and CTO of Technologeeks.com, a group of like-minded expert trainers and consultants.

TALK

Coming Soon...

Alexei Bulazel

Detecting & Evading Automated Malware Analysis

BIO

Alexei Bulazel is an NYC and DC-based security researcher. A recent graduate of Rensselaer Polytechnic Institute (RPI), Alexei worked under Dr. Bülent Yener on developing anti-emulation techniques for malware. He has previously presented his research at venues such as Black Hat, ShmooCon, and the USENIX Workshop on Offensive Technologies, among others. Alexei's research interests include Windows kernel / rookit development, reverse engineering, and exploitation; anti-emulation and anti-virtualization; and reverse engineering antivirus software.

TALK

Automated dynamic malware analysis systems, aka "malware sandboxes", are an important tool on the front lines of defense against modern malware. Unfortunately for defenders, these systems can be easily detected and evaded by malware.

In this presentation we'll take a comprehensive look at the design of automated dynamic malware analysis systems as used in industry, academia, and consumer antivirus software. We'll then survey actual offensive detection and evasion techniques as observed in the wild and proposed in academic literature and security conference presentations.

After introducing anti-analysis, we'll focus in on the seldom discussed emulators used by consumer antivirus software to analyze unknown binaries. While these emulators are installed on hundreds of millions of antivirus-protected computers worldwide, their design and internals have rarely been discussed publicly in conference talks or papers. We'll discuss AVLeak, a tool developed to help offensive researchers discover antivirus emulator "fingerprints" that can be used to detect and evade them. We'll demo the tool live and show real world fingerprints that can be used to detect and evade popular consumer AVs including Kaspersky, Bitdefender engine (licensed out to 20+ other AV products), AVG, and VBA. 

We'll conclude by discussing future directions for research in anti-analysis - both offensive and defensive; and try to address some of the inherent weaknesses in automated analysis systems that make them so easy for attackers to evade despite defensive innovation.

Ben Clark & Matt Hulse

How President Trump’s 400 lb Hacker Bypasses Security Products

BIO

Ben Clark is the Director of Cybersecurity at Millennium Corporation, where he leads the company's Red Team mission,  internal R&D, and strategic vision and growth for Millennium's cyber portfolio. Prior to joining the Millennium Team in 2008, Ben served 6 years as a Department of Defense civilian supporting the National Intelligence Community. Since joining Millennium, he has been instrumental in the execution of several hundred Red Team missions in support of Millennium's customers. He is also the author of the best selling book, The Red Team Field Manual (RTFM) and co-author of the Blue Team Field Manual (BTFM).

Matt has been an operator on Millennium’s Red Team since 2013. During this time, he has conducted numerous red team missions and contributed to the development of new tactics and techniques. Prior to working at Millennium, he was a penetration tester for Verizon Enterprise Solutions, and a technical lead for the Air Force Red Team. 

TALK

Organizations are increasingly layering security products and tools in the hopes of preventing attacks. Unfortunately, most of these products are playing simple numbers games, hoping to catch most, but failing to catch all, malware. The talk focuses on operational techniques used to circumvent detection. It will emphasize the understanding of security product weaknesses, and the tools and tricks available to take advantage of them.

Jeremiah Clark

The Most Insecure Security Tool of All

BIO

Jeremiah Clark is the Technical Director of Threat at Carbon Black, driving strategy and innovation for next generation endpoint security.  Prior to joining Carbon Black, Jeremiah worked at Microsoft as a Reverse Engineer on the Incident Response team and a Secure Development consultant.  Jeremiah's experience is rooted in a decade working in offensive and defensive cyber security at multiple intelligence and military agencies in the Department of Defense.

TALK

Employees represent the biggest threat to an organization, the absolute hinderance to an effective cyber security posture.  From clicking on a link to monitor a giraffe's birthing status, to installing new software via USB, or hoarding government secrets to give to WikiLeaks - humans are the weakest link in the chain.  How can we do a better job of detecting, mitigating, and managing this threat?

IMG_8568.JPG

Venue

It only seems fitting...

That the world's only security summit held at a production brewery be held at Jailbreak Brewing Company.  Jailbreak Brewing Company was founded by computer security professionals looking to liberate themselves from cubicle jobs and to create a product that helps free you from whatever drama is present in your life.

While some of the world's finest security researchers are talking about security topics, our brew team will be hard at work on the other side of the gigantic window making the next batch of creative juice for your enjoyment.  During breaks in the summit, tours of the brewery will be given to those who want to see the magic happening.

Our tasting room provides the perfect venue for creative discussion over some cold, fresh beer.

Tickets