🤝  Join us on DISCORD  🤝

Recon Village

Talks from Recon Village - 2019 (DEFCON 27)

Details

Keynote

The OSINT space is Growing Are we Ready

Comprehensive Talk

Derevolutionizing OS Fingerprinting: the cat and mouse game

Name: Jaime Sanchez

Abstract: 

Traditional methods to defeat OS Fingerprinting in Linux were written as kernel modules, or at least, as patches to the Linux kernel, like Honeyd, IP Personality, the Stealth Patch, Fingerprint ****er, IPlog...
The reason is that if the aim is to change Linux TCP/IP stack behavior, and if we want to achieve it, we need to do it in the kernel layer. Most of these tools are old, doesn't work with actual kernels of can affect tcp/ip stack performance.

OSfooler-NG has been complete rewriten from the ground up, being highly
portable, more efficient and combining all known techniques to detect
and defeat at the same time:
- Active remote OS fingerprinting: like Nmap or Xprobe
- Passive remote OS fingeprinting: like p0f or pfsense
- Commercial engines like Sourcefire’s FireSiGHT OS fingerprinting

Some features in this versions are:
- No need for kernel modification or patches
- Simple user interface and several logging features
- Transparent for users, internal process and services
- Detecting and defeating mode: active, passive & combined
- Will emulate any OS
- Capable of handling updated nmap and p0f fingerprint database
- Undetectable for the attacker"

Hack the Planet! Hackers Influencing Positive Change
Building an OSINT and Recon Program to address Healthcare Information Security issues
Asset Discovery: Making Sense of the Ocean of OSINT

Name: Richard Gold

 

A URL Shortened By Any Other Name

Name: MasterChen

 

DECEPTICON: OPSEC to Slow the OSINT

Name:Joe Gray

 

Hack to Basics – Adapting Exploit Frameworks to Evade Microsoft ATP

Name: Anthony “C01И” Rose and Jake “Hubble” Krasnov

 

Lightning Talk

Finding the needle in the twitter haystack.
Social Media: The New Court of Public opinion (exploring the effects of social media and out unconscious bias)

Name: Susan

 

Use Responsibly: Recon Like an insider threat for Best User Training ROI
AttackSurfaceMapper: Automate and Simplify the OSINT Process

Name: Andreas Georgiou & Jacob Wilkin

 

OSINT Approach in Big-Data
From email address to phone number

Name: Martin Vigo

 

Using OSINT for Competitive Intelligence

Live Demo

PIE - A hardware based Prebellico Intelligence Exfiltration Botnet
Generating Personalized Wordlists by Analyzing Target's Tweets

Name: Utku Sen

Mining for Gold: A Framework for Accessing Pastebin’s Hidden Treasures

Name: Mike Landeck

Advanced Recon with OWASP Amass

Name: Jeff Foley (Changing category to Tool Demo)

Can you add a conference line, please?” - Using Cloud Services for Dial-In Reconnaissance Automation

Name:  Alina Dorina

Workshop

Manhunting 101 - OSINT Crash Course vs Human Targets

Talks from Recon Village - 2019 (DEFCON 27)

Videos

Finding the needle in the twitter haystack.
PIE - A hardware based Prebellico Intelligence Exfiltration Botnet
Social Media: The New Court of Public opinion (exploring the effects of social media and out unconscious bias)
Generating Personalized Wordlists by Analyzing Target's Tweets
Use Responsibly: Recon Like an insider threat for Best User Training ROI
Derevolutionizing OS Fingerprinting: the cat and mouse game
OSINT Approach in Big-Data
Hack the Planet! Hackers Influencing Positive Change
Building an OSINT and Recon Program to address Healthcare Information Security issues
From email address to phone number
Asset Discovery: Making Sense of the Ocean of OSINT
A URL Shortened By Any Other Name
DECEPTICON: OPSEC to Slow the OSINT
The OSINT space is Growing Are we Ready
Hack to Basics – Adapting Exploit Frameworks to Evade Microsoft ATP
“Can you add a conference line, please?” - Using Cloud Services for Dial-In Reconnaissance Automation