Black Hat: 9 free security tools for defense & attacking

Black Hat: 9 free security tools for defense & attacking

Some of the researchers who at Black Hat will show how they hack and release the tools they used to do it

When Black Hat convenes next week in Las Vegas, it will be a rich environment for gathering tools that can be used to tighten security but also - in the wrong hands - to carry out exploits.

Researchers presenting generally point out the value these releases hold for researchers like themselves who operate in experimental environments as well as for enterprise security pros who want to build better defenses against such attack tools.

Presenters will detail a broad range of exploits they’ve carried out against devices, protocols and technologies from HTTP to internet of things gear to the techniques penetration testers use to test the networks of their clients.

Here is a sampling of some of the scheduled educational briefings coming up next week along with a description of the free tools that will accompany them. 

HTTP/2 & QUIC - Teaching Good Protocols To Do Bad Things

Presenters: Carl Vincent, Sr. Security Consultant, Cisco, and Catherine (Kate) Pearce, Sr. Security Consultant, Cisco

These two researchers took a look at HTTP/2 and QUIC, two Web protocols used to multiplex connections. The researchers say they are experiencing déjà vu because they have found security weaknesses in these protocols that are reminiscent of weaknesses they found two years ago in multipath TCP (MPTCP). Back then they discovered that because MPTCP changed paths and endpoints during sessions, it was difficult to secure the traffic and possible to compromise it. “This talk briefly introduces QUIC and HTTP/2, covers multiplexing attacks beyond MPTCP, discusses how you can use these techniques over QUIC and within HTTP/2, and discusses how to make sense of and defend against H2/QUIC traffic on your network,” according to the description of their talk. They say they will release tools with these techniques incorporated.

Applied Machine Learning for Data Exfil and Other Fun Topics

Brian Wallace, Senior Security Researcher, Cylance, Matt Wolff, Chief Data Scientist, Cylance, and Xuan Zhao, Data Scientist, Cylance

This team applied machine learning to security data to help analysts make decisions about whether their networks are facing actual incidents. They say lacking an understanding of machine learning can leave you at a disadvantage when analyzing problems. “We will walk the entire pipeline from idea to functioning tool on several diverse security-related problems, including offensive and defensive use cases for machine learning,” they write in describing their briefing. They plan to release all the tools, source code and data sets they used in their research. They’ll also include an obfuscation tool for data exfiltration, a network mapper and a command and control panel identification module.

GATTacking Bluetooth Smart Devices - Introducing a New BLE Proxy Tool

 Slawomir Jasek, IT Security Consultant, SecuRing

The internet of things is rife with devices that make use of Bluetooth Low Energy, but they don’t always take advantage of all the security features of the technology.A

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags GoogleciscoAmazon Web Servicesblack hat

More about Amazon Web ServicesAWSCacheCiscoFacebookGoogleIT SecurityMicrosoftSmartTwitter

Show Comments