BSides CHS 2014

11.22.2014 9:00AM - College of Charleston

Register Now!

CC license image by Brian Klug (Flickr)


BSides CTF

Hosted by: Charleston ISSA


School of Science and Mathematics Building @ 9am-5pm (FREE) CTF Instructions

View details »

CC license image by Christophe Verdier (Flickr)


How I Pwned Your Website

Taught by Paul Burbage


School of Science and Mathematics Building (Room 138) @ 6-9pm (FREE)

View details »

Electronic Fontier Fundation logo


EFF Fundaiser Auction

Lead by: John


School of Science and Mathematics Building (Room 129) @ ALL DAY (CASH ONLY)

View details »

College of Charleston
Charleston ISSA
Phish Labs
MakeLab Charleston
No Starch Press
ZZ Servers
Strategic Operational Solutions

What is BSides?

BSides is a community-driven framework for building events for and by information security community members. The goal is to expand the spectrum of conversation beyond the traditional confines of space and time. It creates opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration. It is an intense event with discussions, demos, and interaction from participants. It is where conversations for the next-big-thing are happening.

BSides CHS History

BSides Charleston was started in 2012 and has been held at the College of Charleston annually. Since its existence BSides Charleston has been attracting security professionals from all over the Lowcountry area for this one day event.

BSides Logo
College of Charleston

College of Charleston

School of Science and Mathematics Building (Room 129)

202 Calhoun St. Charleston, SC 29424

11.22.2014 - 9:00am

(Between Coming St. and Pitt St.)


St. Philip Street Garage - Located at 81 St. Philip Street, near the intersection of Calhoun & St. Philip; rates: $1.00/half hour, $16 daily max.

George St. Garage - Located on George and St. Phillip Streets; rates: $1.00/half hour, no daily max.

Street Parking - Metered parking is available through the area; rates: $0.80/hour if you want to feed the meter.

CofC Surface Lots - Park at your own risk in College of Charleston owned lots, be sure to read the signage about permit requirements.

Time Speaker Topic
8:00am - 9:00am BSides Charleston Registration
9:00am - 10:00am

A BSidesCHS 2014 Keynote Speaker

Jayson Street

Kizz Myanthia


Jayson E. Street is an author of “Dissecting the hack: The F0rb1dd3n Network” from Syngress. Also creator of He has also spoken at DEFCON, DerbyCon, UCON and at several other ‘CONs and colleges on a variety of Information Security subjects. His life story can be found on Google under “Jayson E. Street” *He is a highly carbonated speaker who has partaken of Pizza from Beijing to Brazil. He does not expect anybody to still be reading this far but if they are please note he was chosen as one of Time’s persons of the year for 2006.

10:00am - 11:00am Andrew Morris

Ballin on a Budget: Tracking Chinese Threat Actors on the Cheap

Discovering threat groups using open source intelligence gathering and honeypots, collecting and analyzing their artifacts to figure out who they are and what their capabilities were, then analyzing and reverse engineering the communications between infected nodes to build our own client that allows you to track their targets in real time.

11:00am - 12:00pm Evan Davison

Allow myself to encrypt…myself!

Can we create data resilient to attack even when the host it resides on is compromised? How do we not lose availability or the ability to share & collaborate with others? We were on the trail last year, but now we think we have a solution & can’t wait to show you! Fast forward 1 year & we have possibly the first open source destined & patent protected comprehensive framework for data protection. It’s a big idea with big challenges destined for failure without your input and expertise so come join the conga line to crazy town!

12:00pm - 12:30pm Lunch Break / Networking @ Atrium
12:30pm - 1:00pm Frank Catucci

WUDS You Say SmartAssPhone?

WUDS is an acronym for Wi-Fi User Detection System. Using a Raspberry Pi, a wireless card and a smart phone this talk will present and demonstrate how to make your own burglar alarm, proximity intrusion detection, automatic notification, even automate home protection via Wi-Fi detection. This talk will also demonstrate how to use this for both good and evil.

1:00pm - 2:00pm

A BSidesCHS 2014 Keynote Speaker

Kizz Myanthia

Kizz Myanthia


Kizz MyAnthia has been in the Information Security field for over 14 years. Working with many diverse clients from multi-national and global organizations, .gov and DoD space, and every sized organization in between. He has hands-on experience testing many of the most dynamic and technically up-to-date systems used throughout the world. Kizz is currently part of the PoV Team at HP Fortify’s ShadowLabs and works to drive Information Security practices through hands-on testing, trainings, defining and directing testing methodologies, and working with organizations to develop Information Security programs and directives that allow the business to function and grow, but also to provide the highest level security to the organization and their clients.

2:00pm - 3:00pm David Zendzian

Holistic operational security bringing application, server and network security together

An examination of a modern rails application reviewing application security best practices going through specific rails controls for the application, best practices in deploying and how to integrate application controls, local host and network firewall controls into a self monitoring, alerting and automated security system.

3:00pm - 4:00pm Edward McCabe

Building an Open Source Threat Intelligence Program

Developing a Threat Intelligence Program using open source tools and public sources. Learning how to develop a resiliency program to address Advanced Persistent Threats for your business.

4:00pm - 5:00pm Rich Barger

Operation Arachnophobia: Don’t Get Caught in the Web

Working in collaboration with FireEye Labs, the TCIRT team discovered evidence pointing to this groups continued exploitation operations using custom malware, dubbed BITTERBUG by FireEye. This session examines “Operation Arachnophobia ” for more information about this exploitation activity and suspicious actions.

5:00pm - 6:00pm Robert Wessen

Just Apply the Patch: A tale of Struts 2, broken CVSS scores and IDS evasion

A very brief history of serious (RCE) Struts 2 vulns, their (misleading) CVSS scores and how obfuscation possibilities in some Struts payloads make it near impossible to protect with an IDS.

6:00pm - 6:30pm Closing Remarks
7:00pm - ? After Party @ Mynt (135 Calhoun St, Charleston SC)
  • Passive Recon: Let's Get Creepy! - Gabele Blanc & Philip Hartlieb

    Passive Recon: Let's Get Creepy! - Gabele Blanc & Philip Hartlieb

  • JAVA Shellcode Execution - Ryan Wincey

    JAVA Shellcode Execution - Ryan Wincey

  • JAVA Shellcode Execution - Ryan Wincey

    Waging war on an entire city - Andrew Morris

  • No  Image of this talk available

    Fantasy Defense In-depth - Evan D.

  • No  Image of this talk available

    Social Insecurity - Frank Catucci

  • No  Image of this talk available

    Free phish and malware hosting for life! - Paul Burbage & Dustin Weathers

    Every day websites with simple vulnerabilities in Content Management Systems such as Wordpress are compromised and used to host phishing and malware attacks.

  • No  Image of this talk available

    Using MLP to classify Encrytped Network Traffic - Micheal Reski

  • No  Image of this talk available

    BYOD Party Crashers: How to Protect Against Unauthorized Mobile Access - Brent Morris

  • No  Image of this talk available

    Fuzzing With Peach - Thomas Macklin

  • No  Image of this talk available

    Who Do You Trust? - Robert Castellow

    SalesForce, Google Apps, Cisco, Intuit, and many more use Security Assertion Markup Language (SAML 2.0) to exchange authentication and authorization information between security domains. Learn how to integrate SAML 2.0 services into your application and leverage existing authorization and authentication services so that you can sign in once and navigate smoothly across other trusted domains. This presentation is hands-on and will include real world examples.

  • No  Image of this talk available

    Printer To Pwnd - Deral Heiland

    In this presentation we go beyond the common printer issues and focus on harvesting data from multifunction printer (MFP) that can be leveraged to gain access to other core network systems. By taking advantage of poor printer security and vulnerabilities during penetration testing we are able to harvest a wealth of information from MFP devices including usernames, email addresses, and authentication information including SMB, Email, LDAP passwords. Leveraging this information we have successful gained administrative access into core systems including email servers, file servers and Active directory domains on multiple occasions. We will also explore MFP device vulnerabilities including authentication bypass, information leakage flaws and attacking firmware upgrade patching process to gain root level access to devices. Tying this altogether we will discuss the development of an automated process for harvesting the information from MFP devices with an updated release of our tool PRAEDA.

  • No  Image of this talk available

    SCADA Security - Why is it so hard? - Amol Sarwate

    The presentation will begin by introducing SCADA systems under the hood including RTU, IED, PLC, FEP, PCS, DCS, HMI, sensors, data historians and other SCADA components. The presenter will categories these components into distinct groups based on the functionality that each component provides. The presenter will review the security implications on each of these groups and identify where most of the threats lie. The presentation will take a packet level dive into SCADA protocols like MODBUS and DNP3 and study their security implications. The presentation will give example of attacks that can be carried out against each group and component. The presenter will release an updated version of an open-source tool to identify and inventory SCADA systems using the protocols discussed in this presentation. The presenter will then focus on real world examples of successful and not-so-successful implementations of security controls with SCADA systems. This will include examples of what some large organizations have done, and a discussion about why SCADA security cannot be deciphered just by tools or technical solution. The presentation will conclude with guidance on how control system owners can start implementing additional measures to get to an acceptable security.

  • No  Image of this talk available

    Programing Errors: Why do we begin to try and [except] a rescue? - Adrian (LabThug)

    The talk will cover programming errors and exceptions and also discuss how improper error messages can leak sensitive information. During the talk, I will teach the audience how to recognize, handle, and defeat programming errors, exceptions, and erroneous behavior.

  • No  Image of this talk available

    Mapping The Penetration Tester's Mind: An Auditor's Introduction To PenTesting - Nick D. (Kizz MyAnthia)

    Mapping the Penetration Tester’s Mind is a bridge gap series made to bring information technology professionals, auditors, managers, penetration testers and all those with an interest in information security to an equal understanding. Many times an auditor, manager, or compliance officer understands that a Penetration Test is required and the importance of having it done, but may not understand how it is performed or why certain actions were made. Mapping the Penetration Tester’s Mind will allow these professionals to gain insight in to how a Pen Tester looks at the project from start to finish, including viewing the SOW, applying methodologies and experience, target selection, exploitation, evidence collection, and reporting. Mapping the Penetration Tester’s Mind will not only present the ideals that are used to perform a test, but will also arm the attendees with the information and knowledge to ensure that they are choosing the right Pen Tester for their engagement. This material has never been presented with this type of focus or insight from an experienced tester like this before. Mapping the Penetration Tester’s Mind is sure to provide every attendee a high value of return and a better understanding of the “dark art” of penetration testing making it the bright light at the end of the tunnel.

  • No  Image of this talk available

    Practical Issues in Virtual Machine Covert Channels - Jeffball

    As virtualization is now the norm, physical separation is something of the past. Individual security domains that previously required strict hardware separation, now exist concurrently on one machine. This leaves these system vulnerable to potential data leakage between virtual machines via covert channels. This talk will give a brief introduction on covert channels, and then discuss the design and implementation of a framework to test data leakage via timing and storage covert channels. Special attention will be paid to the methods of synchronization, decoding, and other practical concerns of these covert channels. I'll detail how to use regression and cluster analysis to decode the information obtained from timing covert channels into the originally transmitted bits. Finally I'll conclude with a discussion of five separate covert channels in VirtualBox, VMware Player, and QEMU/KVM, detail the best synchronization and decoding methods for each.

  • No  Image of this talk available

    Top Ten Web Defenses - Jim Manico

    We cannot hack or firewall our way secure. Application programmers need to learn to code in a secure fashion if we have any chance of providing organizations with proper defenses in the current threatscape. This talk will discuss the 10 most important security-centric computer programming techniques necessary to build low-risk web-based applications.

  • No  Image of this talk available

    Encryption and Data Ownership in Cloud Computing - Timothy Mullen

    This session will discuss deep technical aspects of encryption in cloud environments as well as the legal, audit and compliance implications of data ownership and policy requirements for medium and high business impact (MBI and HBI) data in distributed computing topologies.

  • No  Image of this talk available

    Social Engineering…Because It Works - Scott Longheyer

    Employ a few info gathering techniques and common psychological principles to get the job done. The majority of successful security breaches begin with social engineering attacks against people, bringing the external threat to the inside. The current hybrid of technical controls and training in the tech industry has barely scratched the surface of defense, yet social engineering attacks are older than the tech industry itself. We will briefly cover the basics in this session and discuss options that may lower successful attack rates. Void where prohibited; no 0day required.

  • No  Image of this talk available

    Vishing Attacks Explained: A look inside some real world telephone phishing attacks - John LaCour

    In this talk, John LaCour from PhishLabs explains how malicious attacks using telephone phishing techniques to steal from your bank account.