2015 ShmooCon Firetalks Winners

Girl Holding Up TrophyMy post-Shmoocon recovery is taking a bit longer than usual but it’s finally come to that sad time in the year where I have to write an after-Firetalks post announcing the winners. Also, be sure to check out our Firetalks conference page to learn a little bit of history about Firetalks. Well on to the prize winners…

First Place: “Chronicles of a Malware Hunter”

by Tony Robinson (@da_667)

Cobalt StrikeOver the past year, since I’ve joined [undisclosed] I’ve been given unparalleled freedom to go forth and Detect Evil, both in my role as a Security Analyst, and outside of my role as someone with far too much dedication to infosec. Come listen to me talk about some of the fun things I’ve observed over the past year, including inadvertently discovering an (at the time) an APT, a not-so APT, and learned that sharing is caring.

Tony won a bladeRF X40. Thanks to Cobalt Strike (@armitagehacker) at AdvancedPentest.com for supplying this awesome prize!

Second Place: “Collaborative Scanning with Minions – Sharing is Caring”

by Justin Warner (@sixdub)

mach37As knowledge of advanced adversaries becomes more publicized, expectations for red teams to model their methods and procedures to emulate such adversaries increases. Network reconnaissance is a foundational component in a full-scope advanced engagement. An effective red team is able to conduct their reconnaissance while evading common detection capabilities. In this talk, I will release Minions, a proof-of-concept tool for flexible, distributed scanning at scale. Minions builds upon DNmap (developed by Sebastian Garcia), which is a Python script for the distribution of batch Nmap jobs across multiple scanning nodes. DNmap provides the core functionality for distributed scanning, but lacks a feature-rich interface to facilitate collaboration. Minions, however, will enable penetration testers and red teams to perform covert reconnaissance against target networks in an organized and efficient fashion. Utilizing a modified version of DNmap to distribute tasks, Minions can execute jobs across multiple scanning nodes with flexible profiles, scheduling, and more. With Minions, red teams or researchers can easily perform enumeration against large network ranges in a stealthy way, emulating the techniques of real-world adversaries.

Justin picked up a $200 Hacker Warehouse gift certificate. Thanks to Mach37 (@mach37cyber) at Mach37.com for supporting this prize.

Third Place: “Resource Public Key Infrastructure”

by Andrew Gallo (@akg1330)

TikrasResource Public Key Infrastructure (RPKI) is a new security mechanism to address the problem of prefix hijacking on the Internet by establishing a cryptographically traceable trust chain to prove an organization has the authority to advertise a specific prefix. The problems addressed by RPKI will be introduced, specifically, the manual and error prone method of prefix and route filtering. Examples of BGP hijacks will be presented. The method used to verify prefix<->Autonomous System relationship will be reviewed. The current state of RPKI deployment will be discussed, with particular attention paid to impediments to deployment and failure scenarios not addressed by this technology.

Andrew took home a Minipwner v2. Thanks to Tikras (@tikrascorp) at Tikras.com for supplying the third place prize.


Thanks to everyone for playing! See you all again next year!

3 comments for “2015 ShmooCon Firetalks Winners

  1. February 4, 2015 at 10:33 pm

    2015 ShmooCon Firetalks Winners http://t.co/fdOzYCRECg

  2. February 4, 2015 at 11:28 pm

    BLOGGED: 2015 ShmooCon Firetalks Winners http://t.co/1DVi1n3Z6w

  3. February 9, 2015 at 11:49 am

    2015 ShmooCon Firetalks Winners http://t.co/SAcGGY7i4i

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.