Workshops will be on Friday 6th July, times to be confirmed. Workshops are free, to enter a workshop, you will need a ticket for the main event and a ticket for the workshop. When the times go up, please check for overlaps, in the past we have had to take tickets off people when they sign up for every workshop just because they can.
This is the schedule for this year’s workshops.
|Time||Slot 1||Slot 2||Slot 3||Slot 4|
|9-10||Introduction to Bluetooth Hacking||Z3/SymExec Workshop||From Zero to Hero|
|10-11||When USB devices attack – Zero to Hero Workshop||Z3/SymExec Workshop (cont)||From Zero to Hero (cont)|
|11-12||When USB devices attack – Zero to Hero Workshop (cont)||Z3/SymExec Workshop (cont)||From Zero to Hero (cont)|
|1-2||The Dark Arts||Docker 101||When USB devices attack – Zero to Hero Workshop||Introduction to Bluetooth Hacking|
|2-3||The Dark Arts (cont)||Docker 101 (cont)||When USB devices attack – Zero to Hero Workshop (cont)|
|3-4||The Dark Arts||Docker 101 (cont)||I’ve got 99 problems but a pin ain’t one|
|4-5||The Dark Arts (cont)||Docker 101 (cont)||I’ve got 99 problems but a pin ain’t one (cont)|
It says at the top and saying it again, please do not grab tickets for everything just because they are free, we will cancel ticket orders like this then you won’t get to go to any of the classes.
Docker 101 – Alex Kaskasoli, Mohit Gupta
Docker adoption rates have increased dramatically in the last couple of years and its use has become a common sight on security engagements. This can vary from individual containers running select aspects of a larger infrastructure to an entire swarm (cluster of containers) with self-healing properties within cloud platforms, which regularly form part of a Continuous Integration and Delivery (CD/CI) pipeline.
This workshop will provide an introduction to using Docker. It will include an overview of various tools used as part of the Docker ecosystem for creation, orchestration and monitoring of Docker instances, such as Docker Compose, Docker Machine and Docker Swarm. The main objective is to demystify basic usage and provide attendees with enough knowledge to feel comfortable with Docker for both their personal use and contextual awareness during engagements.
The workshop will cover the fundamentals on managing Docker containers and images, defining environments in YAML, spinning up Virtual Machines for Docker, as well as creating and using Docker swarms. Various exercises will be made available for participants to help solidify what they learn by deploying and interacting with their own instances.
Although the workshop is not security-oriented, some common security issues will be covered along with advice to avoid them, such as misconfigurations that could be used to break out of a Docker container. The workshop will also present how MWR has used Docker to make the life of security consultants easier, for example by quickly deploying various software for generic use or complete environments for payload testing.
This workshop is recommended for Docker beginners.
Personal laptops with a Linux host or Linux Virtual Machine. It is recommended to use a Linux host with Oracle VirtualBox which will aid with certain parts of the workshop.
From Zero to Hero – Scott Helme
An introduction to the theory and practical work behind TLS where you will obtain your own certificate and deploy HTTPS to a website!
Each attendee will need to bring their own laptop with a browser and SSH client. For Mac/Linux users the Terminal is fine and we recommend PuTTY (free) for Windows users or an SSH client of their choice.
Each attendee will need to have basic command line skills. Being able to move around folders and edit text files will be sufficient.
Introduction to Binary Dark Arts with SMT Solvers – Sam Brown
SMT solvers have been at the core of some seriously cool research projects, particularly in Reverse Engineering and Exploit Development. However the field has a high barrier to entry, often requiring a strong background in Computer Science that a lot of practitioners have never experienced. This workshop aims to provide some basic knowledge and exposure to the Z3 SMT solver and Angr binary analysis platform.
If you’ve ever wanted to play with Angr but found the barrier to entry too high or seen people do what may as well be straight up magic using tools like Z3 then hopefully this workshop will kick start your journey to understanding! Sample code and labs will be included which cover real world challenges. By the end of the workshop attendees should have an appreciation for what an SMT solver is, problems it can be used to solve and usage of Z3 and Angr to begin automating tasks.
At the end of the workshop a ‘king of the hill’ style CTF challenge will be opened up with a prize for the top performer.
- What the Hell is an SMT Solver?
- Lab – Cheating at Logic Challenges
- Lab – Encoding CPU Instructions
- Z3 in the Real World
- Lab – Using Angr in Anger
- CTF/King of the Hill
- Laptop with VirtualBox installed, 30GB of disk space and at least 4GB of RAM to dedicate to it. A Debian VM with all required tools installed and configured along with exercise files and sample code will be provided.
- Working knowledge of python scripting
- Some exposure to assembly language
Introduction to Bluetooth Hacking – James Ogden
Bluetooth is the world’s leading general purpose wire replacement protocol. Found in our phones, computers, watches, cars, headphones and numerous other places Bluetooth occupies a privileged position where it’s trusted to act as a conduit for some of our most sensitive data. This workshop, while covering some of the theory of Bluetooth, leans more towards the practical. Learn how to use Bluetooth security tools and how to get started in writing your own. A basic Bluetooth dongle and (heavily commented) C examples will be provided on the day to let you start playing with Bluetooth immediately. To get the most from this workshop you should have access to a laptop with Linux (or virtual machine) where a USB device can be connected and GCC + BlueZ development packages installed
I’ve got 99 problems but a pin ain’t one – Jose Lopes
In this workshop we’ll be covering certificate pinning (with some focus on mobile applications). We’ll be discussing trade-offs of different pinning strategies, and how they can be bypassed. Some prior knowledge is required for this workshop. Attendees must be somewhat familiar with Android application testing, namely setting up an HTTP proxy, unpacking an APK, using ADB, etc. There will be a significant practical component covering what was discussed. Syllabus below:
- What is certificate pinning?
- Why should you always pin?
- Where and what to pin?
- So… how should you pin?
- Exercises (all involve bypassing certificate pinning)
- Patching / Re-packaging / Re-signing an Android APK
- Code review
- Runtime instrumentation with Frida
What to bring
Delegates will need a system (*NIX or Windows) with the following installed and working:
- jd-gui (or your Java decompiler of choice)
- frida (pip install frida)
- Burp Suite (or your HTTP proxy of choice)
- Text editor of your choice
- Genymotion Android Emulator
- Free license should be fine
- Preferably with a “Google Nexus 4 – 5.1.0 – API 22 – 768×1280” device up and running
- Able to use ADB with the Genymotion device
- Able to intercept HTTPS traffic from their Genymotion device
- If you can, bring your own rooted Android device (anything above 5.1 should work)
- Be warned, I’ll share files via USB sticks
The Dark Arts – Neil Lines and Jamie Shaw
The Dark Arts workshop will cover some of the most deadly and interesting internal / redteam hacking techniques.
Those attending will be able to follow live instruction on how to build there own active directory lab, using powershell and CMD.
And after your domain is built then the real fun begins, attack after attack we will teach you all how to capture the domain admin, how to exploit typical configuration errors and how to poison traffic flows.
This workshop is suitable for all skill levels to attend.
When USB devices attack – Zero to Hero Workshop – Tim Wilkes
USB devices have been with us now for over 20 years. They have posed a security risk to organisations, which is not always as understood as well as it could be.
This workshop will look at USB devices and how they work, including practical exercises in making your own USB keyboard perform tasks on your behalf.
The workshop doesn’t assume any prior knowledge of programming, but a background in C and/or powershell would be useful.
Laptop with a USB A port (USB C must have a hub with USB A connections)