11.23.17

announce: NO December DC206 Meeting/BBQ

Posted in Uncategorized at 09:41 by Lee Fisher

We’re taking December off for the DC206 Meeting. We’ll be back in January. Happy Holidays.

Some related December events to attend:
http://hushcon.com/

SeaSec East – End of Year party

Tuesday, Dec 5, 2017, 6:00 PM

Unity Technologies
110 110th Avenue Northeast Bellevue, WA

24 Members Attending

It’s December, and I thought we’d do something a little different.We will all be meeting at a place not a restaurant, and be enjoying ourselvesUnity Technologies in Bellevue has so graciously allowed us to bivouac in their meeting place on 5 December. So, we’ll order in, sit around, talk about infosec, maybe have a few prizes to raffle off, enjoy…

Check out this Meetup →

2017 ISSA Puget Sound Holiday Party


BLR Open Hack Nights in December.

11.03.17

announce: November DC206 Meeting (+ Locksport + BBQ)

Posted in Uncategorized at 11:04 by Lee Fisher

When: Nov 19th (3rd Sundays), 11:00am-~4:00pm
What: DC206 Meeting
Where: Black Lodge Research

[[
This month’s DC206 Meeting is different. It starts at 11:00am, instead of 1:00pm. Three things are planned:
1) Locksport activity, run by Dune, starting at 11:00am.
2) presentation by Taylor starting at 1:00pm.
3) BBQ, run by Spooney McAwesome, starting after the talk ends.
If things work out, this may become the normal schedule for future DC206 Meetings. We’ll see…
]]

—–

Locksport event:

This month, Dune will be running a Locksport event, starting at 11:00 until 1:00.

They will be showing Tim Jenkins talk at Lockcon 2017 about escaping from prison via lockpicking/impressioning. Tim Jenkins was a political prisoner in a South African jail and taught himself to pick and impression locks. He used these skills to escape. This is the only talk to be recorded and allowed to be distributed outside of Lockcon.

—–

DC206 Meeting Presentation:

[This month, Taylor is giving an introductory talk on the Bash shell. If you are new to Bash shell, this is a good starting point. If you are experienced, please attend and help answer some questions and point out some other tricks.]

Bash Scripting For Beginners
by Taylor

If you are new to scripting and to want learn about Bash this talk is for you. This is a beginners talk by a beginner. I share the knowledge I have learned so far with attendees. I will go over concepts that you will need to get started with Bash, things I feel were tricky to learn that might help you, and examples to see how things work.

Taylor is an Edmonds Community College Information Security and Digital Forensics graduate. He took a class on Bash scripting there. He hangs around BLR on Open Hack Night.

—–

BBQ:

This month the chef will be Spooney McAwesome.

For BBQ, veg[eteri]ans, please bring something you can eat, we’re planning on hamburgers.

—–

Black Lodge Research:
17725 NE 65th St, A-155; Evans Business Park, Bldg A; Redmond, WA 98052
https://blacklodgeresearch.org/ https://twitter.com/the_black_lodge/
https://www.facebook.com/BlackLodgeResearch/

http://www.openstreetmap.org/node/2184616237#map=19/47.66334/-122.10399
https://map.what3words.com/warm.rapid.epic

WARNING: Don’t trust the WiFi at the lodge, until KRAKEN issues are resolved.

 

09.25.17

announce: October DC206 Meeting: Firmware is the New Black

Posted in Uncategorized at 15:53 by Lee Fisher

What: Oct DC206 Meeting: Firmware is the New Black
When: October 15th (3rd Sundays), 1-3pm
Who: Vincent Zimmer
Where: Black Lodge Research

Firmware is the New Black – Analyzing Past Three Years of BIOS/UEFI Security Vulnerabilities

https://www.blackhat.com/us-17/briefings.html#firmware-is-the-new-black-analyzing-past-three-years-of-bios-uefi-security-vulnerabilities
http://vzimmer.blogspot.com/2017/08/black-hat-usa-2017-firmware-is-new-black.html
https://github.com/rrbranco/BlackHat2017/blob/master/BlackHat2017-BlackBIOS-v0.13-Published.pdf

In recent years, we witnessed the rise of firmware-related vulnerabilities, likely a direct result of increasing adoption of exploit mitigations in major/widespread operating systems – including for mobile phones. Pairing that with the recent (and not so recent) leaks of government offensive capabilities abusing supply chains and using physical possession to persist on compromised systems, it is clear that firmware is the new black in security. This research looks into BIOS/UEFI platform firmware, trying to help making sense of the threat. We present a threat model, discuss new mitigations that could have prevented the issues and offer a categorization of bug classes that hopefully will help focusing investments in protecting systems (and finding new vulnerabilities). Our data set comprises of 90+ security vulnerabilities handled by Intel Product Security Incident Response Team (PSIRT) in the past 3 years and the analysis was manually performed, using white-box and counting with feedback from various BIOS developers within the company (and security researchers externally that reported some of the issues – most of the issues were found by internal teams, but PSIRT is involved since they were found to also affect released products).

Bio:

Vincent Zimmer was born in Houston, Texas, where he also grew up. Vincent attended Cornell University in Ithaca, New York, and achieved a Bachelor of Science in Electrical Engineering. Vincent has worked for various technology companies, including Intel Corporation, where he has been employed since 1997. While working at Intel, Vincent received his Master of Science degree in Computer Science from the University of Washington in Seattle, Washington. Vincent is presently a senior principal engineer in the Software and Services Group at Intel. During Vincent’s career working on embedded systems and firmware, he has received over 350 US patents https://en.wikipedia.org/wiki/List_of_prolific_inventors and presented at several industry conferences. In addition to the Beyond BIOS book, Vincent has published book chapters and articles. Along with writing firmware, Vincent has also contributed to and written specifications in the Unified Extensible Firmware Interface (UEFI) Forum, the Trusted Computing Group (TCG), and the Internet Engineering Task Force (IETF). Vincent presently lives in the Seattle area of Washington state with his wife and 2 daughters.

Black Lodge Research:
17725 NE 65th St, A-155; Evans Business Park, Bldg A; Redmond, WA 98052 https://blacklodgeresearch.org/ https://twitter.com/the_black_lodge/
https://www.facebook.com/BlackLodgeResearch/
http://www.openstreetmap.org/node/2184616237#map=19/47.66334/-122.10399
https://map.what3words.com/warm.rapid.epic

08.22.17

announce: September DC206 Meeting: Home Coffee Roasting with Josh Armour

Posted in Uncategorized at 10:20 by Lee Fisher

Update with slides from Josh and A/V from Colby:

[[
https://docs.google.com/presentation/d/1DuiruIQ3oE75106SXqtWDCmH5EDb8f2Saf_NAaHev_s/edit?usp=drivesdk

Here are the three videos of the three different roasting devices:
* Drum Roasting w/a Huky –

* Drum Roasting –

* Fluid Bed Roasting –

We also recorded the talk itself. The audio drops really low at around the 8:15 mark but if you try hard enough you can hear him still:

]]

What: September DC206 Meeting: Home Coffee Roasting

When: September 17th (3rd Sundays), 1-4pm

Who: Josh Armour

Where: Black Lodge Research
17725 NE 65th St, A-155; Evans Business Park, Bldg A; Redmond, WA 98052
https://blacklodgeresearch.org/
https://twitter.com/the_black_lodge/
https://www.facebook.com/BlackLodgeResearch/
http://www.openstreetmap.org/node/2184616237#map=19/47.66334/-122.10399

In this talk I demonstrate the use of two home roasters – a drum roaster and a fluid bed roaster. I’ll cover the stages of coffee development, roast a couple samples, and give attendees a chance to try roasting. Everyone will leave with some freshly roasted beans, an understanding of what the different roast levels mean, and a shopping list of how to get started themselves. I’ll wrap up with some discussion around DIY/modification roasters available online.

Josh Armour is a security/privacy engineer at a large global search/advertising company. But in his spare time he enjoys roasting coffee, taking digital photos, and spending time with wife+offspring đŸ™‚

 

08.19.17

announce: August 20 2017 DC206 BBQ/Movie Night

Posted in Uncategorized at 12:29 by Lee Fisher

August 20 2017 DC206 BBQ/Movie Night

Announcement URLs:

What: August DC206 Meeting: BBQ and Movie Night

When: 2017-08-20 (3rd Sundays), 3pm-EOD

Where: Black Lodge Research
17725 NE 65th St, A-155; Evans Business Park, Bldg A; Redmond, WA 98052
https://blacklodgeresearch.org/
https://twitter.com/the_black_lodge/
https://www.facebook.com/BlackLodgeResearch/
http://www.openstreetmap.org/node/2184616237#map=19/47.66334/-122.10399

Note, BBQ/Movie Nights startd at 3PM, NOT 1PM, like the other DC206 Meetings. Movie starts when dark enough, until end-of-movie.

The lodge is a bit of a mess. Perhaps some of you could join me at the lodge around 2pm for a brief cleaning party? Similarly, hopefully some of you can stay after movie and help clean up lodge from BBQ mess.

Who is bringing what:

Mike:
I’m bringing a veggie tray and a fruit tray.

Blibbet:
I’ll be providing hard-cider, water, and some other non-alcoholic beverages, and 4 ice-filled chests, like last year, space for others food/beverages in 2 chests. Unlike last year, [‘bitch’-]beer drinkers will have to BYO[B]B.

Noid:
I’m bringing burgers (and a pack of veggie burgers). I’ll also bring onions, lettuce, cheese, and bacon for said burgers. Yes you can put bacon on your veggie burger (we won’t tell)

When I get to the Lodge in the morning I’ll check to see if we’re still good on things like ketchup, mustard, and pickles. I’ll also check the chip situation. Last time we had soooo many tortilla chips left over

EVERYONE ELSE: Please consider bringing some good beer, and/or some side-dish, some other BBQ-able meats, some vegan options, some deserts.
Bring a camp chair to watch the movie, bring a hat and some sunblock.

 

07.01.17

announce: July DC206 Mtg: AMD and Intel architectural differences

Posted in Uncategorized at 14:31 by Lee Fisher

Who: Alex Floyd

What: July DC206 Meeting: AMD and Intel architectural differences

When: July 16th (3rd Sundays), 1-4pm

Where: Black Lodge Research; 17725 NE 65th St, A-155; Evans Business Park, Building A; Redmond, WA 98052 USA
https://blacklodgeresearch.org/

Computer chipsets have vastly evolved over the last decade. In this talk we take a look at the design differences of AMD and Intel architectures from Intel’s 1st gen core series to Kaby Lake, and AMD’s Bulldozer (Family 15h) through the evolution to AMD’s APU series up to Zen. This look will show us the chipset logical layout changes for AMD and Intel over the generations, and why each iteration is better or worse for practical real world applications because of the logical chipset designs.

Researched and written by some guy that likes learning things that not every one knows.

06.30.17

announce: BLR.asm July: Intro to Radare2/Iaito

Posted in Uncategorized at 16:22 by Lee Fisher

WHAT: BLR assembler class: Intro to Radare2/Iaito
WHEN: Sunday, July 9th (2rd Sundays), 1:00pm
WHO: ‘Blibbet’
WHERE: Black Lodge Research; 17725 NE 65th St, Unit A-155; Evans Business Park, Building A; Redmond, WA 98052; https://blacklodgeresearch.org/

No new Intel assembly this month, instead we’ll focus on a tool. This class will focus on getting started with Radare2 and the new Iaito GUI. We’ll look at how to use Radare to examine x86 assembly-based ELF32 images. This won’t be a full Radare2 feature tutorial — I’m just learning it myself — rather a basic use of radare2/iaito to examine assembly language. Unlike some tools, Radare is very powerful with a steep initial ramp-up (like Vim or Blender), you’ll need to spend a few days to get used to using this tool. We’ll cover a small set of it’s core features, focusing on unassembly and viewing the stack. 2/3 of the time on Radare, 1/3 on Iaito GUI.

To prepare, get Radare2 and Iaito installed on your system. Radare has lots of binary packages, Iaito is Qt 5.x C++ and has nearly no packaging so you’ll have to build it from source, unless you’re using BlackArch-Live Linux distro. I’ll assume you have the software installed before class. Get your previous homework on that system, so you can examine those binaries with Radare.

http://www.iaito.re/
https://rada.re/
https://github.com/zxgio/r2-cheatsheet
https://github.com/pwntester/cheatsheets/blob/master/radare2.md
https://zachgrace.com/cheat_sheets/radare2.html
https://www.gitbook.com/book/radare/radare2book/details
https://www.google.com/#q=radare+pancake+video+youtube

 

 

Return of the DC206 Mailing List

Posted in Uncategorized at 15:54 by Lee Fisher

For the last  year or so, the DC206 Mailing list has been hard to subscribe to, the list’s host went down and the list was migrated to a temporary server. Recently, Noid has ‘rebooted’ the list, so normal methods to subscribe to the list should now work.

Subscribe by emailing list-request@lists.dc206.org with the subject “subscribe”, or use the web form at:

http://lists.dc206.org/listinfo.cgi/list-dc206.org

Besides the Black Lodge Research classroom whiteboard, the DC206 Mailing List is the main place where announcements for the DC206 Monthly Meeting, Black Lodge Research’s Open Hack Night, Black Lodge Research’s assembly language class) occur. The archives of the list are not open to the public, either.

01.05.17

announce: January DC206 Meeting

Posted in Uncategorized at 11:36 by Lee Fisher

Who: Dan Tebbs of Quadrifly
What: Building the Quadrifly indoor drone game
When: January 15th (3rd Sundays), 1pm
Where: Black Lodge Research; 17725 NE 65th St, A-155; Evans Business Park, Building A; Redmond, WA 98052 USA

Dan Tebbs of Quadrifly will present on the new indoor drone game that was assembled at BLR. Dan will give a 45min presentation describing what he’s done. Interesting challenges which he will talk about include: Creating the scoring gates, Selecting a drone, and Hacking the control channel. There will be a small version of the game to be played in the lodge, so attendees should be able to play a minimal version of the game for a few minutes.


http://blacklodgeresearch.com/
http://dc206.org/

11.30.16

December DC206 Meeting: Zach on Social Engineering

Posted in Uncategorized at 09:26 by Lee Fisher

What: December DC206 Meeting
When: 3rd Sundays (Dec 18th), 1-3pm
Where: Black Lodge Research; 17725 NE 65th St, A-155; Evans Business Park, Building A; Redmond, WA 98052 USA

Introduction to Social Engineering

by Zach

In this introductory presentation on social engineering, the speaker will dissect a few of his more fun engagements and walk through the prep work and psychological techniques that made the attacks work

Zach has over 10 years of experience with social engineering in a variety of roles, from defusing hostile people and drunk wrangling, to conning creds and gaining access as “your IT guy”. His enjoyment of studying human behavior and learning what makes people tick in combination with his ability to talk to anyone is what makes him successful in his practices.

http://blacklodgeresearch.org/
http://dc206.org/

« Previous entries Next Page » Next Page »