BACK TO SPEAKERS
Edward Farrell
Mercury ISS
Edward Farrell is an independent information security consultant who specialises in penetration testing and incident response. In addition to starting up his own security practice, Edward is an avid participant in the Australian information security community. In his spare time, he can be found somewhere on the beach. Edward_Farrell_Reusing-Breach-Data-for-attack-and-defence-AusCERT2018

TUTORIAL: Docker for Cybersecurity professionals

Docker is still a relative unknown for most cybersecurity professionals or, in most cases, we don't have an opportunity to explore and understand the technology. The purpose of this class is to extend to the industry an opportunity to learn about docker, its security requirements & limitations as well as use cases for professionals. The tutorial will occur over a 4 hour period and include: 1. an overview of docker 2. security considerations from a design & architecture standpoint 3. securely configuring the environment 4. use cases and practical exercises for offensive security practitioners 5. use cases and practical exercises for defensive security practitioners Students will need to bring a laptop which they have administrative access to. Files and contents will be provided.  

Reusing Breach Data for Attack and Defence

Our team have broken into a CEOs account and demonstrated harm to their company with little more than a LinkedIn password and good reconnaissance. Data breaches and their disclosure have become commonplace and yet reusing contents from a breach for security testing or enhancing an organisations defences been poorly explored. Whilst technical complexity and time of execution is not comparable to more elegant threats, The accessibility and ease of exploitation of password should be of concern to individuals and businesses. Having collected and analysed such information over the course of two years, it was only natural to start reusing it in penetration testing. This talk will go through through some of the insights into the collection of data, its reuse in security testing, our development of an internal database for material from breaches, as well as how it can be used in a defensive function.