I had the pleasure of attending BsidesROC this past Saturday in Rochester, NY while visiting family. The only previous experience I’d had with Bsides was in Las Vegas last summer, and I must say out of the many small conferences I have been to over the last couple of years, these guys did a very impressive job! The conference consisted of two tracks with a total of 15 talks.
Here’s a rundown of the events:
The Rochester chapter of TOOOL was kept very busy with a constant flow of lock pickers, both new and veteran, and managed to sell out of the kits they had available.
Interlock, the local hackerspace was also there and had a number of great projects to show off. I always love seeing hackerspaces at conferences!
Hacker Battleship, a unique play on the CTF which was really fun for the 24 who participated. Someone SQL injected the scoreboard too 😉
There were just over 200 attendees and everything flowed very smoothly. The event had the feeling of something that just happened there every weekend, and there were flying SHARKS! Albeit without laser beams for the safety of all present of course. 😉
Some other misc stats:
The 3D badges took approximately 50 hours to print and were awesome!
3129 DHCP leases were handed out throughout the day.
6 flying sharks and fish, including one flying red angry bird.
In the first episode of SecuraTip, I showed viewers how to extract files from pcaps using a very manual method, and using an automated method with NetworkMiner. The purpose of this was to show the drastic difference between the two methods.
As Doug Burks and CIDSecurity mentioned on Twitter and YouTube there is an easier method for pulling out files from pcaps using Wireshark verse the manual process I showed. Though there is a major limitation that I will speak more of at the end.
Wireshark HTTP object export options
1. Open the pcap with Wireshark.
2. Choose File –> Export Objects –> HTTP
*While I chose HTTP for this, you may need to choose a different option like SMB to correspond with the type of traffic you are dealing with.
3. You will now be presented a list of files that you can save out directly from the HTTP sessions.
4. Simply press Save As and you know have the file.
Now as you can tell if you have watched the SecuraTip episode, there are some limitations here. For instance we do not see the files 1.txt and 2.txt that we saw when looking at the PCAP with NetworkMiner. The reason for this is that WireShark is just pulling files from HTTP Sessions. 1.txt and 2.txt were in the same pcap but were transferred via FTP instead of HTTP. As far as I know there is not automated way to pull FTP files transferred directly in Wireshark. Please correct me if I am wrong there. NetworkMiner doesn’t care what protocol or service was used, if the file was transferred in the clear, then it will try to extract it.
As we all know, there are many ways to attack any problem in IT. Do you have a different technique other than what is described here or in the video? Let us know.
After nearly 4 years dormant, we’re bringing back the SecuraByte! These are designed to cover things that can’t wait for our normal podcast cycle. In our 7th iteration, we interview Jake Kouns regarding the RVAsec security conference he is organizing in Richmond, VA which will be hosted again at VCU!