The clock is ticking for this year’s DEF CON, one of the world’s largest and oldest continuously running hacker conventions around (since 1993).
“XM Cyber is excited to be part of DEF CON 27, a truly hands-on and technical-oriented conference, a community of hacker spirt and security geeks,” said Boaz Gorodissky, Co-Founder & CTO, XM Cyber.
Don’t miss our presentation on Malproxying: Leave Your Malware at Home. In this talk, we will present a new approach to execute code on an endpoint without really storing the code on disk or loading it to memory, thus bypassing most of endpoint protection measures.
Learn More: During a classic cyberattack, one of the major offensive goals is to execute code remotely on valuable machines. The purpose of that code varies on the spectrum from information extraction to physical damage. As defenders, our goal is to detect and eliminate any malicious code activity, while hackers continuously find ways to bypass the most advanced detection mechanisms. It’s an endless cat-and-mouse game where new mitigations and features are continuously added to the endpoint protection solutions and even the OS itself in order to protect the users against newly discovered attack techniques. In this talk, we present a new approach for malicious code to bypass most of endpoint protection measures. Our approach covertly proxies the malicious code operations over the network, never deploying the actual malicious code on the victim’s side. We are going to execute code on an endpoint, without really storing the code on disk or loading it to memory. This technique potentially allows attackers to run malicious code on remote victims, in such a way that the code is undetected by the victim’s security solutions. We denote this technique as “malproxying”.
It’s also worth reminding you that August 8 will be the last day of Black Hat USA 2019, where XM Cyber specialists will also be glad to welcome you at booth 875.
About DEF CON
Many of the attendees at DEF CON include computer security professionals, journalists, lawyers, federal government employees, security researchers, students, and hackers with a general interest in software, computer architecture, hardware modification, and anything else that can be “hacked”.
The event consists of several tracks of speakers about computer- and hacking-related subjects, as well as cyber-security challenges and competitions (known as hacking wargames). Contests held during the event are extremely varied and can range from creating the longest Wi-Fi connection (aircrack-ng) to finding the most effective way to cool a beer in the Nevada heat.
“If you google around you’ll find dozens of write-ups that will give you an idea of what people have experienced at DEF CON. Trust write-ups more than media articles about the con. Some people play capture the flag 24×7, while many people never touch a computer at DEF CON. Some people see every speech they can, while others miss all speeches. Other activities include contests, movie marathons, scavenger hunts, sleep deprivation, lock picking, warez trading, drunken parties, spot the fed contest, the official music events. Because DEF CON is what the attendees make of it, there are more events than even we are aware of. Half the fun is learning what happened at DEF CON after the fact”, say the organizers.
About XM Cyber
XM Cyber provides the first fully automated breach and attack simulation (BAS) platform to continuously expose attack vectors, above and below the surface, from breach point to any organizational critical asset. This continuous loop of automated red teaming is completed by ongoing and prioritized actionable remediation of organizations’ security gaps. In effect, HaXM by XM Cyber operates as an automated purple team that fluidly combines red team and blue team processes to ensure that organizations are always one step ahead of the cyber-attackers.
HaXM by XM Cyber is the first BAS platform to simulate, validate and remediate attackers’ paths to your critical assets 24×7. HaXM’s automated purple teaming aligns red and blue teams to provide the full realistic advanced persistent threat (APT) experience on one hand while delivering vital prioritized remediation on the other. Addressing real user behavior, poor IT hygiene and exploits, the full spectrum of scenarios is aligned to your organization’s own network to expose blind spots and is executed using the most up-to-date attack techniques safely, without affecting network availability and user experience.
Come meet our XM Cyber team and find out first-hand about our latest developments.
Click here to schedule a meeting.