Aaron Grattafiori

664 Followers
268 Following
192 Posts

AI Red Teaming and Safety/Responsibility.

Ex-Offensive Security/Red Team Lead in big tech. Ex-Principal Consultant @ NCC Group / iSEC Partners / Security Innovation.

@kyle next up... QR code.

Use the Defcon Wifi (new blog)

Many security professionals, especially on social media, have an unfortunate tendency towards what we might call performative security. It’s where people broadcast their security measures to show how aware they are, and they suggest others follow their lead. It’s the inverse of security theater where ineffective security is imposed on us by organizations. It’s often ineffective, inconvenient, or both.

And today’s bad advice is “Don't use the defcon wifi.”

The #Defcon and #Blackhat networks are some of the most monitored networks anywhere. No one's going to blow an 0-day by using it on either network. This assumes everything's up to date and fully patched, and that you join the official networks, which are listed on signage around the venues. It also assumes that all your apps are using TLS everywhere. In contrast, there is a never-ending parade of warnings about malware in telecom infrastructure. There are routinely reports of extra base stations around Las Vegas. (I’ve heard numbers on the order of an extra 50, of which I’d guess many are simply just-in-time capacity from authorized suppliers.) The lack of authentication of base stations is apparently a ...feature... that’s never going to be fixed.

Now, there’s another way to interpret this, which is to put your devices in airplane mode or a Faraday cage, and that’s not awful advice. Disconnect. Be present. Enjoy the events. Talk to the people around you. If you want to disconnect, a well-constructed Faraday cage is safer than airplane mode, which let bluetooth and wifi work.

When I was at Microsoft, some of my co-workers made a big deal of how they locked down their laptop, or bought a burner for Defcon. Me? I asked why our products weren’t safe enough to use in that environment, given that they’re certainly used in more dangerous places.

https://shostack.org/blog/use-the-defcon-wifi/

Shostack + Friends Blog > Use the Defcon Wifi

Why it’s ok to use the Defcon wifi

@deviantollam I would enjoy a Defcon West in Vegas, and a Defcon East ... somewhere east. Or EU? Maybe if it splits it will be less insane?
@datagoon yeah, you never are when you step out of the airport... some years I went it was 110-115 every day 🥵
@johncarlosbaez wouldn't every command be simulated and tested to death first before sending it? It's not like we're changing things that often right? Crazy. Also amazing it's still running and reachable, what a testimony to the original engineering team.
MSMQ QueueJumper (RCE Vulnerability): An In-Depth Technical Analysis

Unpack the remote code execution vulnerability impacting the Microsoft Message Queueing service — CVE-2023-21554, a.k.a. QueueJumper.

Security Intelligence
@emurphy42 @sycophantic yeah, but have you gotten your immunity to totallynotavirus.scr?
@dave_aitel I've had success with detailed instructions with 40 and 70. Small changes can make big differences 🤷‍♂️
@dave_aitel try the larger models