—< NORTHEAST OHIO INFORMATION SECURITY FORUM MEETING ---< Wednesday June 15, 2010 ---< 6:30 PM - 8:00 PM ---< Pizza and social start 6:00 PM ---< Location: Park Center Plaza #1, 6100 Oak Tree Blvd, off Rockside Road, Independence, Ohio ---< Open to everyone and free as always The Northeast Ohio Information Security Forum will hold our monthly meeting at the above date and time. It will be held in the lower level of the Park Center Plaza #1 building (in the large room on lower level) off of Rockside Road in Independence. I've included links to maps and directions in this email. Talks planned (abstracts and bios at bottom of this email)... Ten Ways to Fail at Information Security by Chris Clymer by Chris Clymer, Senior Security Consulant SecureState Building a completely evasive backdoor without any detection rules by Dave Kennedy "ReL1K", Dude that breaks things Don't forget to come early, starting at 6:00 PM, for pizza and pop courtesy of NEOISF (http://www.neoisf.com/training). Another great meeting from NEO Info Sec Forum - we hope to see you there! -- NEOISF Board -- ---------------------------------------------------------------------------------- [Location] Park Center Plaza 1 6100 Oak Tree Blvd Google maps link: TinyURL link http://tinyurl.com/neoisfmtg [Directions] 1. I-77 2. Rockside Road exit 3. West on Rockside Road 4. 2nd light go South onto Oak Tree Blvd 5. Pull into the 3rd driveway on the right 6. Go to lower level Signs will be posted on the building. ---------------------------------------------------------------------------------- -- Follow us on Twitter: http://twitter.com/neoisf Our website: http://www.neoisf.org ============================================================ You are receiving this because you are on the Northeast Ohio Information Security Forum mailing list. To unsubscribe or edit your subscription send an email to board@neoisf.org ============================================================ - – - – - – - – - – - TALK ABSTRACT: Since leaving corporate life to become a consultant 12 months ago I’ve had the opportunity to observe and assess security programs across a wide array of companies. Hospitals, banks, utilities, law offices and grocery stores…everyone does security a little bit differently. One common theme has been that there is no one “right” way to run an effective security program. There are however so many spectacularly different ways to do security wrong! In this presentation I will highlight ten different ways that I’ve seen security NOT work, and which likely WON’T work for anyone, anywhere. SPEAKER BIO: Chris Clymer is a senior security consultant with the Advisory Services practice at SecureState, a Cleveland-based security consultancy. Chris is a co-host of the Security Justice podcast, is an organizer of Security Bsides Cleveland, a founding member of the Cleveland TOOOL chapter, and of course a board member of the Northeast Ohio Information Security Forum. He specializes in taking the opposite side of any security argument 😉 Building a completely evasive backdoor without any detection rules David Kennedy TALK ABSTRACT: We all know Anti-Virus is failing us but what about other technologies? We have HIPS, behavioral, heuristics, IPS/IDS and others. This talk will be covering a recent interactive backdoor that I wrote for the Social-Engineer Toolkit (SET) that acts polymorphic in nature per each instance and leverages 256AES encryption with a randomized cipher key exchange per connection. Best part is it doesn't get detected by anything out there and circumvents pretty much every protection mechanism I've seen. We'll go into how it was built, the overall structure and how you can build your own very easily leveraging Python. SPEAKER BIO: David Kennedy (ReL1K) is a security ninja and Director of Information Security for a Fortune 1000. Dave is on the Back|Track and Exploit-Database development team and a core member of the Social-Engineer podcast and framework. David continues to contribute to a variety of open-source projects. David had the privilege in speaking at some of the nations largest conferences on a number of occasions including BlackHat, Defcon and Shmoocon. David is the creator of the Social-Engineer Toolkit (SET), Fast-Track, modules/attacks for Metasploit, and has released a number of public exploits. David heavily co-authored the Metasploit Unleashed course available online and has a number of security related white-papers in the field of exploitation. David has a book soon to be released in July from NoStarch Press, “Metasploit: A Penetration Testers Guide”. David is one of the founders of DerbyCon, a hacker con located in Louisville, Kentucky. Lastly, David worked for three letter agencies during his U.S Marine Corp career in the intelligence field specializing in red teaming and computer forensics.
- NEOISF: Navigation
- Pages:
- Archives:
- April 2023
- November 2022
- October 2022
- September 2022
- June 2022
- July 2021
- April 2021
- March 2020
- February 2020
- January 2020
- November 2019
- October 2019
- September 2019
- August 2019
- July 2019
- June 2019
- May 2019
- April 2019
- March 2019
- February 2019
- January 2019
- August 2018
- July 2018
- May 2018
- April 2018
- March 2018
- February 2018
- January 2018
- November 2017
- October 2017
- August 2017
- July 2017
- June 2017
- May 2017
- April 2017
- March 2017
- February 2017
- January 2017
- November 2016
- October 2016
- August 2016
- June 2016
- April 2016
- March 2016
- February 2016
- January 2016
- December 2015
- October 2015
- September 2015
- July 2015
- June 2015
- May 2015
- March 2015
- February 2015
- December 2014
- November 2014
- October 2014
- September 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- September 2013
- August 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- February 2013
- December 2012
- November 2012
- October 2012
- July 2012
- June 2012
- May 2012
- March 2012
- February 2012
- January 2012
- December 2011
- August 2011
- June 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- November 2010
- September 2010
- August 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
- February 2010
- RSS Feed
June 15, 2011
NEOISF Meeting Wednesday June 15, 2011
April 19, 2011
NEOISF Meeting Wednesday April 20, 2011
—< NORTHEAST OHIO INFORMATION SECURITY FORUM MEETING
---< Wednesday April 20, 2010
---< 6:30 PM - 8:00 PM
---< Pizza and social start 6:00 PM
---< Location: Park Center Plaza #1, 6100 Oak Tree Blvd, off Rockside Road,
Independence, Ohio
---< Open to everyone and free as always
The Northeast Ohio Information Security Forum will hold our monthly
meeting at the above date and time. It will be held in the lower
level of the Park Center Plaza #1 building (in the large room on lower
level) off of Rockside Road in Independence. I've included links to
maps and directions in this email.
Talks planned (abstracts and bios at bottom of this email)...
"Windows Remote Management (WinRM) and PowerShell Remoting" by Jody McCluggage
"Enterprise Mobile Security – Beyond the BlackBerry" by Josh Kelley
Don't forget to come early, starting at 6:00 PM, for pizza and pop
courtesy of Solutient (http://www.solutient.com/training).
Another great meeting from NEO Info Sec Forum - we hope to see you there!
-- NEOISF Board --
----------------------------------------------------------------------------------
[Location]
Park Center Plaza 1
6100 Oak Tree Blvd
Google maps link: TinyURL link http://tinyurl.com/neoisfmtg
[Directions]
1. I-77
2. Rockside Road exit
3. West on Rockside Road
4. 2nd light go South onto Oak Tree Blvd
5. Pull into the 3rd driveway on the right
6. Go to lower level
Signs will be posted on the building.
----------------------------------------------------------------------------------
--
Follow us on Twitter: http://twitter.com/neoisf
Our website: http://www.neoisf.org
============================================================
You are receiving this because you are on the
Northeast Ohio Information Security Forum mailing list.
To unsubscribe or edit your subscription send
an email to board@neoisf.org
============================================================
– – – – – – – – – – –
“Windows Remote Management (WinRM) and PowerShell Remoting”
ABSTRACT:
Windows Remote Management (WinRM) and PowerShell Remoting: A basic
overview of how Windows Remote Management protocol and PowerShell
Remoting works with an eye towards mitigating possible security
issues.
BIO:
Jody McCluggage (CISSP, CISA, CISM, CCNA Security, CEH, MCTS, CHP) –
Director of Operations and Compliance at a local government agency.
– – – – – – – – – – –
“Enterprise Mobile Security – Beyond the BlackBerry”
ABSTRACT:
We’ve recently deployed new technology that allows for Android and
iPhones to sync with emails, calendars, and contacts while enforcing
the devices to adhere to corporate policies. This presentation goes
over the risks with allowing non-managed devices accessing your
corporate email and what can be done at a corporate level and a
personal level to mitigate them. I’ll also be going over the issues
that we had getting the system functional as well as other solutions
that were researched.
BIO:
Josh Kelley is a security engineer for an international Fortune 1000
company located in North Canton, Ohio. Josh has helped write and
author ground breaking attack vectors through PowerShell and the
Teensy HID devices and has presented at Blackhat and Defcon. Josh has
a number of strengths in the security industry including penetration
testing, zero day research, buffer overflows, web application
security, and exploitation.
March 15, 2011
NEOISF Meeting March 16, 2011
—< NORTHEAST OHIO INFORMATION SECURITY FORUM MEETING —< Wednesday December 15, 2010 —< 6:30 PM – 8:00 PM —< Pizza and social start 6:00 PM —< Location: Park Center Plaza #1, 6100 Oak Tree Blvd, off Rockside Road, Independence, Ohio —< Open to everyone and free as always The Northeast Ohio Information Security Forum will meet for its monthly meeting on Wednesday January 19, 2010 starting at 6:30 PM. It will be held in the lower level of the Park Center Plaza #1 building (in the large room on lower level) off of Rockside Road in Independence. I’ve included links to maps and directions in this email. We have two talks planned… +++ What the FOCA – Chris Murrey, SecureState +++ Vulnerabilities in Third Party Web Applications – Gary McCully, SecureState See bottom of email for talk abstracts. PRIZES! Did we get your attention? We plan to have some prize giveaways as well. Don’t forget to come early, starting at 6:00 PM, for pizza and pop. Another great meeting from NEO Info Sec Forum – we hope to see you there! – NEOISF Board – ============================================================ [Location] Park Center Plaza 1 6100 Oak Tree Blvd Google maps link: TinyURL link http://tinyurl.com/neoisfmtg [Directions] 1. I-77 2. Rockside Road exit 3. West on Rockside Road 4. 2nd light go South onto Oak Tree Blvd 5. Pull into the 3rd driveway on the right 6. Go to lower level Signs will be posted on the building. ============================================================ TALK ABSTRACTS Title: What the FOCA – Chris Murrey, SecureState In this presentation, Chris Murrey of SecureState will provide a detailed overview of FOCA, a tool for extracting metadata as well as discovery of systems. Attendees will leave with a thorough understanding of the tool, including proper use. Chris Murrey’s BIO: As a member of SecureState’s Profiling Team, Chris Murrey is passionate about the role he plays in ethical hacking. Mr. Murrey performs technical security assessments on a weekly basis, specifically Web Application Security Assessments and External Penetration Tests. An Offensive Security Certified Professional and Microsoft Certified Systems Administrator, Mr. Murrey previously worked in the IT sector for a Cleveland printing company and as a “jack of all trades” for a multi-million dollar corporation. Title: Vulnerabilities in Third Party Web Applications, Gary McCully It’s a third party web application. . . Of course it’s secure. They have a whole team of people who thoroughly test their software before it’s released to the public.” Many organizations are installing third party web applications in their production environment without subjecting the applications to a formal web application security assessment. These organizations assume that third party software is more secure than the web applications that are internally designed. All web applications, whether they are third party or not, should go through a formal web application security review before they are placed in the production environment. To illustrate the risks of installing an insecure third party web application, Gary McCully will walk through a series of vulnerabilities he has found in a third party web application which can lead to remote code execution on the underlying operating system. Gary's BIO: Gary McCully is a Security Consultant on SecureState’s Profiling Team. At SecureState, Mr. McCully performs Vulnerability Assessments, War Dialing, Firewall Reviews, Penetration Tests, Physical Penetration Tests, and Web Application Security Reviews. Mr. McCully recently passed the CISSP certification exam, establishing himself as an (ISC)2 Associate. Passionate about expanding his knowledge and expertise, Mr. McCully’s research interests include the discovery and exploitation of buffer overflows, lock picking, and SSL vulnerabilities. Before joining SecureState, Mr. McCully worked as a Security Analyst at National City Bank, where he was responsible for the corporate usage compliance program, and offshore user access. Mr. McCully also worked with technical teams to ensure software was implemented with proper security controls, and assisted with the Vendor Security Review Program.
February 16, 2011
NEOISF Meeting February 16, 2011
—< NORTHEAST OHIO INFORMATION SECURITY FORUM MEETING —< Wednesday December 15, 2010 —< 6:30 PM – 8:00 PM —< Pizza and social start 6:00 PM —< Location: Park Center Plaza #1, 6100 Oak Tree Blvd, off Rockside Road, Independence, Ohio —< Open to everyone and free as always The Northeast Ohio Information Security Forum will meet for its monthly meeting on Wednesday January 19, 2010 starting at 6:30 PM. It will be held in the lower level of the Park Center Plaza #1 building (in the large room on lower level) off of Rockside Road in Independence. I’ve included links to maps and directions in this email. We have two talks planned… +++ What the FOCA – Chris Murrey, SecureState +++ Ten ways to fail at Information Security – Chris Clymer, SecureState See bottom of email for talk abstracts. PRIZES! Did we get your attention? We plan to have some prize giveaways as well. Don’t forget to come early, starting at 6:00 PM, for pizza and pop. Another great meeting from NEO Info Sec Forum – we hope to see you there! – NEOISF Board – ============================================================ [Location] Park Center Plaza 1 6100 Oak Tree Blvd Google maps link: TinyURL link http://tinyurl.com/neoisfmtg [Directions] 1. I-77 2. Rockside Road exit 3. West on Rockside Road 4. 2nd light go South onto Oak Tree Blvd 5. Pull into the 3rd driveway on the right 6. Go to lower level Signs will be posted on the building. ============================================================ TALK ABSTRACTS Title: What the FOCA – Chris Murrey, SecureState In this presentation, Chris Murrey of SecureState will provide a detailed overview of FOCA, a tool for extracting metadata as well as discovery of systems. Attendees will leave with a thorough understanding of the tool, including proper use. Chris Murrey's BIO: As a member of SecureState’s Profiling Team, Chris Murrey is passionate about the role he plays in ethical hacking. Mr. Murrey performs technical security assessments on a weekly basis, specifically Web Application Security Assessments and External Penetration Tests. An Offensive Security Certified Professional and Microsoft Certified Systems Administrator, Mr. Murrey previously worked in the IT sector for a Cleveland printing company and as a “jack of all trades” for a multi-million dollar corporation. Title: Ten ways to fail at Information Security – Chris Clymer, SecureState Since leaving corporate life to become a consultant 9 months ago I’ve had the opportunity to observe and assess security programs across a wide array of companies. Hospitals, banks, utilities, law offices and grocery stores…everyone does security a little bit differently. One common theme has been that there is no one “right” way to run an effective security program. There are however so many spectacularly different ways to do security wrong! In this presentation I will highlight ten different ways that I’ve seen security NOT work, and which likely WON’T work for anyone, anywhere. Chris Clymer's BIO: Chris is a senior security consultant with the Advisory Services practice at SecureState, a Cleveland-based security consultancy. Chris is a co-host of the Security Justice podcast, is an organizer of Security Bsides Cleveland, a founding member of the Cleveland TOOOL chapter, and of course a board member of the Northeast Ohio Information Security Forum. He specializes in taking the opposite side of any security argument 😉