BSides Ume 2024

Europe/Copenhagen
Aula Biologica (Umeå University)

Aula Biologica

Umeå University

Johan Bures väg, Umeå, Sweden
Description

The second BSides Conference in Umeå, Sweden will take place June 4th to 5th. It is a community conference on IT security and related fields, part of the global BSides communit and is arranged by Academic Computer Club in Umeå

Registration is open until May 2024-05-22, after that there might be possibility for late registration, but the registration does no longer include dinner.

The first event took place in 2023: https://indico.neic.no/event/244/

The timetable is still a draft, minor changes can happen.

The Tuesday keynote on June 4th will by Beau Bullock on Graph Theory: Unveiling the Microsoft Entra ID Post-Exploitation Landscape.

For more interactions and micro updates, follow us on Mastodon or join our slack server

Gold sponsors: Omegapoint and Black Hills Information Security

Registration
Registration
31 / 140
    • 09:00 10:00
      Registration and morning coffee 1h Aula Biologica

      Aula Biologica

      Umeå University

      Johan Bures väg, Umeå, Sweden
    • 10:00 12:00
      Talks and presentations Aula Biologica

      Aula Biologica

      Umeå University

      Johan Bures väg, Umeå, Sweden
      • 10:00
        Welcome and pratical matters 15m

        Welcome and practical matters for BSides 2024

        Speaker: Mattias Wadenstein (NeIC)
      • 10:15
        Graph Theory: Unveiling the Microsoft Entra ID Post-Exploitation Landscape 45m

        In today's cloud-driven landscape, Microsoft Azure and 365 (M365) have become essential tools for businesses worldwide. However, beneath their user-friendly facades lie a landscape rife with potential threats stemming from default configurations. Through years of attacking Microsoft cloud environments during red team engagements I have found commonalities across many companies where overlooking default settings have left them vulnerable.

        Very recently I released a new post-exploitation tool for Microsoft Entra ID accounts called GraphRunner. This tool leverages the Microsoft Graph API, which is a fundamental piece of infrastructure for much of Microsoft 365 and Azure. I will demonstrate how this API can be leveraged to perform post-exploitation of a Microsoft Entra ID account to perform reconnaissance, establish persistence, escalate privileges, and ultimately pillage data from services such as SharePoint, Teams, and email.

        Throughout the talk, I will present real-world examples that underscore the critical importance of proactive defense. These demonstrations will be supported by practical, hands-on showcases featuring custom-built tools crafted specifically for these targeted attack scenarios.

        Speaker: Beau Bullock (Black Hills Information Security)
      • 11:00
        Delete your password manager 45m

        Passwords are out! So of course you do not need to manage them anymore. Passkeys, on the other hand, are the talk of the town as well as the topic of this talk.

        If you have heard about passkeys before and are curious to know more about them then this talk has got you covered. If you haven’t heard about them before but want to stay a jour, then this talk is a must.

        This talk will be a crash course into WebAuthn and Passkeys and provide you with everything you need to know to start supporting it in your own applications.

        Speaker: Mr Linus Lagerhjelm (Omegapoint)
    • 12:00 13:30
      Lunch 1h 30m Aula Biologica

      Aula Biologica

      Umeå University

      Johan Bures väg, Umeå, Sweden
    • 13:30 15:00
      Talks and presentations Aula Biologica

      Aula Biologica

      Umeå University

      Johan Bures väg, Umeå, Sweden
      • 13:30
        Securing legacy services - Jailing with systemd 45m

        Ever since the introduction of chroot() in the late 70s the concept of jailing locking down services have been a choice for the security minded to introduce damage prevention to their services. It's always better to write secure services rather than just locking them down, but it's not always possible, and the addition of jailing can be a good second line of defence against unknown vulnerabilities in your services.

        The options for jailing have come a long way since the introduction of chroot() and in a modern Linux kernel there are multiple different and competing ways to lock down a certain service. Some of them, like namespaces, ways got popularized by container technologies like Docker, but most of them are useful in more contexts than just containers.

        This will talk will give a overview of those technologies and how they can be added on to a service with the help of systemd without no or almost no changes to the service itself, making it especially helpful when trying to secure legacy services and third party code.

        Speaker: Anton Lundin
      • 14:15
        django-ca, HSM and open source contribution 30m

        django-ca is a feature rich certificate authority written in Python and maintained for around 10 years. As I write this talk submission, I am working with the maintainer to add HSM support to the application, so that it can be used inside of Sunet and various other security sensitive installations.

        A related blog post: https://kushaldas.in/posts/django-ca-hsm-and-poc.html

        Talk outline:

        • Kushal’s introduction
        • Introduction to django-ca/ certificate authority in general
        • Introduction to HSM (Hardware security module)
        • Python cryptography (https://cryptography.io)
        • Explanation of PrivateKey sign implementation in python cryptography
        • Our privatekey implementations using HSM
        • Initial proof of concept development
        • Design from the upstream
        • Lessons learned for the big change
        • Current status (hoping to get things ready for the conference in main branch)
        • Importance of PoC and talking to upstreams in Open Source projects
        Speaker: Kushal Das (Sunet)
      • 14:45
        Weathering Mirai, a 10 year retrospective 15m

        A decade ago, the Mirai DDoS botnet was the biggest seen with a capacity of roughly 600 Gbit/s packet floods. The week after the high-profile attack on krebsonsecurity, they pointed the direction at a Libera Chat (at the time known as "Freenode") IRC server hosted by Academic Computer Club at Umeå University.

        This talk gives a brief overview on how the network providers SUNET and NORDUNet mitigated the impact so that the University as a whole was unaffected, and only the targeted server and the computer club saw minor glitches in external connectivity.

        Speaker: Mattias Wadenstein (NeIC)
    • 15:00 15:30
      Afternoon coffee 30m Aula Biologica

      Aula Biologica

      Umeå University

      Johan Bures väg, Umeå, Sweden
    • 15:30 17:15
      Talks and presentations Aula Biologica

      Aula Biologica

      Umeå University

      Johan Bures väg, Umeå, Sweden
      • 15:30
        An In-Depth Analysis of Android’s Java Class Library: its Evolution and Security Impact 15m

        THIS WORK HAS BEEN ACCEPTED AND PRESENTED AT IEEE SECDEV 2023

        Android is an operating system widely deployed
        especially on devices such as smartphones. In this paper, we study
        the evolution of OpenJDK Java Class Library (JCL) versions
        used as the basis of the Dalvik Virtual Machine (DVM) and
        the Android Runtime (ART). We also identify vulnerabilities
        impacting OpenJDK JCL versions and analyze their impact on
        Android. Our results indicate that the complexity of the Android
        JCL code imported from OpenJDK increases because: (1) there is
        an increase in the number of classes imported from OpenJDK,
        (2) there is an increase in the fragmentation of the JCL code
        in Android as code is increasingly imported from multiple
        OpenJDK versions at the same time, and (3) there is an increase
        in the distance between the JCL code in Android and OpenJDK
        as, for instance, Android developer introduce customizations
        to the imported code. We also observe that most OpenJDK
        vulnerabilities (80%) are not impacting Android because the
        vulnerable classes are not imported in Android. Nevertheless,
        Android does import vulnerable code and little is done to patch
        this vulnerable code which is only ”patched” when a newer
        version of the vulnerable code is imported. This means that the
        code can stay vulnerable in Android for years. Most of the vul-
        nerabilities impacting Android (77%) have a security impact on
        the availability of the system. By developing a proof-of-concept,
        we show that OpenJDK vulnerabilities imported in Android do
        have a security impact. We suggest to seriously take into account
        public information available about OpenJDK vulnerabilities to
        increase the security of the Android development pipeline.

        Speaker: Timothée Riom (Umeå Universitet)
      • 15:45
        Cheating at Video Games for Fun and Profit 30m

        Globally, videogame cheats are a multimillion dollar industry. In this talk I will briefly discuss types of game cheats and how they work, and some techniques to detect and prevent them.

        Speaker: Melanie Bobowski Wadenstein
      • 16:15
        Cyber Clash: Hot Takes and Disruptive Discourse 45m

        Should law enforcement use hacking tools? Is XSS dead? And which one is the greatest threat to security: AI or the EU?

        In this session our panelists will tackle controversial topics with their wit and wisdom, from hacking ethics to encryption, privacy and those lazy programmers.

    • 19:00 21:30
      Dinner 2h 30m Tonka Strandgatan

      Tonka Strandgatan

  • Wednesday, 5 June
    • 09:00 10:00
      Morning coffee 1h Aula Biologica

      Aula Biologica

      Umeå University

      Johan Bures väg, Umeå, Sweden
    • 10:00 12:00
      Talks and presentations Aula Biologica

      Aula Biologica

      Umeå University

      Johan Bures väg, Umeå, Sweden
      • 10:00
        Analyzing Prerequistes of known Deserializtion Vulnerabilities on Java Applications 15m

        Insecure deserialization is regarded as one of the OWASP Top 10 software vulnerabilities. While requiring somewhat complex exploitation prerequisites, the impact of exposing this type of vulnerability is severe, often leading directly to remote code execution. The attack model is based on self-executing methods, invoked during the native deserialiaztion process - so-called gadget chains. Within the Java programming language this mostly refers to the invocation of readObject(). Serializable classes may override this method to implement custom deserialization logic, and thereby call further seemingly harmless methods. In our presentation we show how an attacker can leverage this to construct a chain of method invocations leading to undesirable effects. Furthermore, we analyzed and show how deserialization vulnerabilities rely on gadgets contained in third party libraries, affect latest JDK and library versions, and how one can use this information to gain visibility on the issue and harden Java applications.

        Speaker: Bruno Kreyssig (Umeå University)
      • 10:15
        Verifiable credentials solves all problems 30m

        and creates many new ones. The federation team at SUNET manages the Swedish identity federation for higher education (SWAMID). We are also involved with the eduGAIN inter federation and in some new EU projects looking into Verifiable credentials as basis for a digital wallet. Another area of development is OpenID Federation, an extension to OIDC to allow federation. This will allow us to hook VC's into an existing trust framework. I will give overview of what we have managed to build, what's next and what new capabilities this gives.

        Speaker: Mikael Frykholm (Sunet)
      • 10:45
        Twenty years later: Evaluating the Adoption of Control Flow Integrity 15m

        Memory corruption vulnerabilities still allow compromising computers through software written in a memory- unsafe language such as C/C++. This highlights that mitigation techniques to prevent such exploitations are not all widely deployed. In this paper, we introduce SeeCFI, a tool to detect the presence of a memory corruption mitigation technique called control flow integrity (CFI). We leverage SeeCFI to investigate to what extent the mitigation has been deployed in complex software systems such as Android and specific Linux distributions (Ubuntu and Debian). Our results indicate that the overall adoption of CFI (forward- and backward-edge) is increasing across Android versions (∼30% in Android 13) but remains the same low (<1%) throughout different Linux versions. Our tool, SeeCFI, offers the possibility to identify which binaries in a system were compiled using the CFI option. This can be deployed by external security researchers to efficiently decide which binaries to prioritize when fixing vulnerabilities and how to fix them. Therefore, SeeCFI can help to make software systems more secure.

        Speaker: Sabine Houy (Umeå University)
      • 11:00
        Dungeons & Dragons: The security tool you didn’t know you needed 30m

        In my talk, I'll dive into the world of game-based learning in cybersecurity, showcasing HackBack - a unique framework that blends role-playing game elements with security training. I'll explain how HackBack revolutionises traditional methods by providing immersive, risk-free simulations of security situations, both offensive and defensive, making it ideal for teaching concepts like Zero Trust and enhancing teamwork and empathy among participants. We'll explore the open-source nature of HackBack and how it fosters a community-driven approach to cybersecurity education, making it accessible and adaptable to various settings. Join me to discover how game-based learning is a crucial, yet often overlooked tool in developing effective security professionals.

        Speaker: Klaus Agnoletti
    • 11:30 13:00
      Lunch 1h 30m Aula Biologica

      Aula Biologica

      Umeå University

      Johan Bures väg, Umeå, Sweden
    • 13:00 15:00
      Workshops, training, tabletop games, hands-on exercises, birds of a feather sessions, etc. Aula Biologica

      Aula Biologica

      Umeå University

      Johan Bures väg, Umeå, Sweden
      • 13:00
        Let's play HackBack, an Incident Response role-playing game 2h

        I'll host a game of HackBack, an Incident Response role-playing game, loosely inspired by Dungeons & Dragons.

        Dive into HackBack at BSides Ume, where cybersecurity meets the intrigue of Dungeons & Dragons. Picture this: a world where you combat cyber threats not with mouse clicks, but with the cunning of a rogue and the wisdom of a wizard. This isn't your average workshop; it's a crash course in digital defense, served with a side of adventure and a sprinkle of wit.

        Why just talk about Zero Trust when you can live it, battling digital dragons and forging alliances along the way? Our HackBack session is more than just rolling dice; it's about rolling up your sleeves and diving headfirst into the cyber fray, all while laughing in the face of danger.

        Join us at BSides Ume for a unique blend of learning and levity, strategy and silliness. It's time to level up your cybersecurity skills in the most entertaining way possible. Let's HackBack together and show those cyber threats they've met their match!

        Speaker: Klaus Agnoletti
      • 13:00
        Writing Python modules in Rust 2h

        In this workshop we will learn how to write Python modules in Rust. Starting from python cryptography module, to various other parts of the Python ecosystem now has tooling written in Rust.

        The main reason is having secure code than C/C++ based extension modules we had so far.

        The participants will not need any prior Rust experience, we will work on top of a git repository and keep changing branches to learn new features.

        Speaker: Kushal Das (Sunet)
    • 15:00 15:30
      Afternoon coffee 30m Aula Biologica

      Aula Biologica

      Umeå University

      Johan Bures väg, Umeå, Sweden
    • 15:30 17:30
      Workshops, training, tabletop games, hands-on exercises, birds of a feather sessions, etc. Aula Biologica

      Aula Biologica

      Umeå University

      Johan Bures väg, Umeå, Sweden