![]() With the 0day track, we did quite well, identifying 10 previously unknown vulnerabilities. We were pipped to the post by Team Wolf Emoji, finishing up in second place, but we cleared the board and thankfully managed to compromise each device. with the challenge being to compromise every device on the network remotely.īy the time we were done, our scoreboard looked like this: This consisted of multiple networked IOT devices, routers, lightbulbs, NAS devices, DVRs etc. Shortly after entering the IOT Village, that team expanded to include a number of Secarma members who were there to party - Kyle, Jed, A hacker who values his privacy, and our faithful leader Mark.Īlready knowing that we would be competing to find as many 0days as possible in IOT devices, we also wanted to take part in the running CTF that was being hosted by SOHOpelesslyBroken. Our core “CTF” team started as 4 people, Sam, Lor, Dan, and myself. What I love about this atmosphere is that it draws people in to areas that they have never considered before. ![]() We pretty much spent most of our time in this village, except for the evenings when we were continuing to work on the 0day competition in the hotel rooms of LV with a makeshift rig of IOT devices, some networking setup, and beer: ![]() For me, sitting around with a bunch of hackers, techno music and low neon lighting is pretty much what I’m there for, and the IOT Village had all of this: Over the days of the conference, I got a taste of what Blackhat had to offer, and met some awesome hackers including TheLaytonCipher, Darkarnium, Bader and of course some of the resident Bugcrowd crewe, the brilliant Sam, Keith, Abby, Zoe, and of course Casey.īugcrowd certainly know how to throw a party, seeing us on the top floor in the Skyfall Lounge with some pretty epic views, and allowed us to catch up and share a few beers with our old friend Mr Helme and his entourage :)īut before long, it was time for Defcon, and LineCon 2017 commenced:Īsk anyone what they enjoy about Defcon, and you will get some crazy and profound answers. Seeing what the conference had to offer in terms of CTF challenges the year before, we went with the intention of competing in a few of the competitions, and had decided to take a look at the IOT Village who we knew were running an 0day track.īut before Defcon started I had some free time, and the awesome guys n’ gals at BugCrowd asked me if I would like to drop by their Blackhat booth and meet some of the researchers on the platform, talk with some people who may have questions, and generally just hang out. This year I attended the conference with some of the other hackers from Secarma. Landing in Manchester airport on the Monday, I was packed and ready to fly back over to LV for Tuesday afternoon: After checking out the local famous garages and technology spots, I was on a flight back to the UK: Due to some unique circumstances, I took what I think must be a record breaking detour back to Defcon. I live in the UK, so making it out to the US for this awesome conference is something that I look forward to throughout the year.Īs part of my day job I’m a penetration tester, and I actually found myself in Santa Clara the week before Defcon on an assessment. This year I attended Defcon for the second time. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |