Binary Reverse Engineering for Beginners
Binary reverse engineering is a critical skill in the
infosec world, from verifying crypto algorithms to finding and analyzing
vulnerabilities and writing exploits. This often requires a balance of
experience and intuition that only comes from practice. Our workshop will delve
into the dark art of disassembly and provide participants with the tools and
techniques required to practice it and develop the percieved ""sixth
sense"" that accompanies expert reverse engineers.
All examples in the workshop will be implemented in 32-bit
x86 assembly, and some experience programming in a high-level language is
assumed (preferably C/C++). Examples will be performed on the Linux operating
system, although many techniques will convey to any platform. It is also
assumed that participants understand the legal risks associated with reverse
Participants should bring a laptop capable of running a Linux VM in VMware or VirtualBox. VMware and VirtualBox should be running the latest, updated versions. Relevant VMs will be distributed on the morning of the class with samples provided from a Google Drive.
(8 hour training)
Ben Demick is a Senior Lead
Engineer at Booz Allen Hamilton with over 6 years of experience reversing
embedded systems and doing embedded development. He holds a B.S. in Electrical
Engineering and Physics from Clarkson University, an M.S. in Electrical and
Computer Engineering from Johns Hopkins University, and has been an instructor
with Booz Allen's internal software reverse engineering program for the last 3
Allen Hazelton is a Chief Engineer
at Booz Allen Hamilton and has 10 years of experience reverse engineering.
Since 2008, Mr. Hazelton has led Booz Allen’s internal reverse engineering
training program and has taught over 250 of his colleagues. Since 2009, Mr.
Hazelton has lectured at the A. James Clark School of Engineering at the
University of Maryland College Park where he teaches a 3 credit undergraduate
course in software reverse engineering for computer engineering and computer
science majors. Mr. Hazelton holds a B.S. in Computer Engineering from the
University of Maryland College Park and is CEH and CREA certified.
Michael Schroeder is a Senior
Lead Engineer with Booz Allen Hamilton and has over 7 years of experience
reverse engineering embedded systems. He
holds a B.S. in Computer Engineering from the University of Maryland in College
Park, an M.S. in Electrical Engineering from Johns Hopkins University, and is
an instructor with Booz Allen's internal reverse engineering training program.
Building Blocks: An Introduction to Security Analysis
There’s a mantra often repeated in the sports world:
“Defense Wins Championships.” While there are no trophies to be won in
cybersecurity for having a champion-caliber defense; to help build a strong
defense it’s important to have a good, solid understanding of security
This workshop is designed for security analysts with less
than three months' experience; or for those interested in a security career;
who wish to fully immerse themselves in a mock-up of a SOC (Security Operations
Center) environment and learn about various tools that are typically found in
said environment, how to use them in a monitoring situation, how to use digital
forensics when performing a security analysis, how to respond to a security
incident; and why having a security audit plan as part of a defensive strategy
Syllabus and additional details on this training course can be found at the following link. This includes suggestions for software to download prior to training. https://docs.google.com/document/d/1C8ykGzS-JVyxMx2YE6aIg6OttpbaCcebO7-iMfA1S-M/edit?usp=sharing
(8 hour training)
Alpha Geek. Gamer. Husband.
Father. Cybersecurity enthusiast. While all these terms accurately describe
Kerry, what motivates him the most is anything and everything involving
cybersecurity. Whether it’s a new exploit, tool, news article, or an
opportunity to learn or to share with others his experiences, he possesses and
maintains a strong passion and devotion to the industry.
Having been involved in IT since
1998, Kerry chose to narrow his area of expertise over five years ago and
sharpen his security skills by focusing on four key areas: digital forensics,
incident response, security analysis, and security auditing. He is currently
employed with DB Consulting Group, Inc. in Silver Spring, Maryland as a
Computer Security Specialist; his prior positions have included Security
Analyst and Remediation Security Specialist. Kerry is married to his wife of
thirteen years, and has one child. In his spare time, if he’s not spending time
with his wife; he’s either reading up on the latest trends in cybersecurity,
playing games, putting together puzzles with his son, or teaching his son the
art of hacking.
Fun with Network Packet Analysis!
This workshop is geared for audiences of all levels. We'll
start with the basics of traffic flow, i.e. OSI model and TCP/IP stack, and
from there dive into the fun part -- looking at custom PCAPs to examine various
security issues. We will end up with carving files from hex, which is easier
than you might think!
(4 hour training)
Marcelle has a fancy bio and a
bunch of certs and degrees but none of that really matters for this workshop.
The only important thing is that she loves packet analysis and hopes you will
Workshops and Groups
Organized by security consulting and research firm
Security Evaluators (ISE), The IoT Village™ delivers thought
leadership advocating for security advancements in Internet of Things (IoT)
devices. The village consists of workshops on hacking numerous off-the-shelf
devices (e.g. medical devices, home appliances, routers, and storage devices),
live educational talks and a variety of contests. The IoT Village's™ contests
are brought to you by SOHOpelessly Broken™, the first-ever router hacking
contest at DEF CON, which delivered 15 new 0-day vulnerabilities to the
Women’s Society of Cyberjutsu (WSC)
The Women’s Society of Cyberjutsu (WSC) is a 501(c)3 non-profit passionate about helping and empowering women to succeed in the Cybersecurity field.
We are a community of women supporting each other through every step of her career journey.
Whether you're transitioning to cybersecurity, just entering the field, or are a seasoned vet, our top-notch hands-on technical training and workshops provide the practical skills that translate into real world experience.
Hackers for Charity
Saturday and Sunday
Hackers for Charity (HFC) is a non-profit organization that leverages the skills of technologists. They solve technology challenges for various non-profits and provide food, equipment, job training and computer education to the world’s poorest citizens.
Unallocated Space (UAS) is an active hackerspace location in Anne Arundel County (Severn, MD) that supports the DC / Baltimore Metro Area. As an open technology-based community lab, we invite you to share your creativity!
Our mission is to foster our community to “Teach, Learn, Build”. Our 1600+ sqft space is minutes from BWI, between Baltimore and Washington DC. Equipped with a wide range of tools, UAS welcomes DIY tech enthusiasts of all skill levels and interests. Our space enables everyday people to share ideas and work on group and individual projects. Our facility has resources that support electronics (soldering, circuits), fabrication (wood, plastics, metal), and is fully wired/wireless network with a VM lab for network experiments. Our classroom can handle 20+ students and hosts courses in electrics, web development, programming and computer networking.
Our members offer a steady stream of free and public events, classes, activities, and anything that gets people building, making, and learning. We serve the community on 100% donated funds as a non-profit organization. For more information, visit unallocatedspace.org for upcoming events.
Point3 Cyber A3 CT
BSidesCharm is honored to bring one of the most advanced CTF
environments to our elite attendees in the region.
The “All Against All”, or Cyber A3, is a live-fire
exercise. Each team is provided the same
set of “mission critical” services. Each
of these services may have one or more flaws.
Teams must ensure their services have optimal update, while also
researching vulnerabilities, developing exploits for those vulnerabilities, and
then patching their own vulnerable services.
Teams lose points for service downtime or if their flags are stolen. Teams
gain points for stealing flags from their competitors. At the conclusion the team with the most
points is crowned champion.
There are several skill sets required if one wants to
win: System and network administration,
packet capture and network monitoring, vulnerability research, exploit
development, reverse engineering, and host and network forensics. Participants must bring their own hardware,
software, and personnel. Optionally
teams should consider their own method of Internet access and file transferring
as the game network won’t facilitate this. The game is best played amongst team
sizes of ~5, and VMs will be hosted on your systems during the competition.
Team captains can pre-register for a guaranteed team spot from the following link:
The BSidesCharm Wireless Capture the Flag (WCTF) is a trip
through the useable RF spectrum. Challenges will involve all of the physics and
RF theory that we have all come to love so much. You will be using tools like
the RTL-SDR, HackRF, BladeRF, your cell phone, and various 802.11 radios.
Although not all are necessary to compete, they will help. The WCTF can be
completed with experience ranging from a little knowledge to a pen-tester's
capability, and $40 to $4000 worth of equipment. Regardless of what you bring,
the key is to read the clues and determine the goal of each step. We teach
along the way, so if you are a N00b, we will help you learn strategies to get
you to competition level. This year we maintain certain aspects of past WCTFs
but are also introducing new challenges. For example, as in past WCTFs, you
will need to sit for a while and hack at crypto and break into networks. But,
unlike past WCTFs, you need to break out your war-walking shoes because you
will be tracking and finding hidden nodes and possibly even remote sites -- and
not all of them will be WiFi. We will also be holding the very popular, RF
Signal Drinking Game. There will be clues everywhere, and we will provide
periodic updates so make sure you pay attention to what's happening at the WCTF
Control Center, on Twitter, the interwebz, etc.
Flags will range from transmissions in the spectrum to
pass-phrases used to gain access to wireless access points. Once you capture
the flag, submit it right away because some flags are worth more points the
sooner they are submitted (e.g., timed challenges) and others will be awarded
negative points (e.g., false flags). Offense and defense are fully in play by
the participants, the WCTF organizers, and the Con itself.
our websites for tools, what you need, and what to do. Enjoy your journey.