<?xml version='1.0' encoding='utf-8' ?>
<!-- Made with love by pretalx v2026.1.0.dev0. -->
<schedule>
    <generator name="pretalx" version="2026.1.0.dev0" />
    <version>1.0</version>
    <conference>
        <title>Bsides Exeter 2025</title>
        <acronym>bsides-exeter-2025</acronym>
        <start>2025-04-26</start>
        <end>2025-04-26</end>
        <days>1</days>
        <timeslot_duration>00:05</timeslot_duration>
        <base_url>https://pretalx.com</base_url>
        <logo>https://pretalx.com/media/bsides-exeter-2025/img/GlitchLogo_52nIv8h.png</logo>
        <time_zone_name>UTC</time_zone_name>
        
        
        <track name="Purple" slug="5427-purple"  color="#9340ff" />
        
        <track name="Red" slug="5428-red"  color="#ff0022" />
        
        <track name="Blue" slug="5429-blue"  color="#0000ff" />
        
    </conference>
    <day index='1' date='2025-04-26' start='2025-04-26T04:00:00+00:00' end='2025-04-27T03:59:00+00:00'>
        <room name='Auditorium' guid='566ec2e8-2700-53fd-a428-98eb2a75f908'>
            <event guid='3b166551-fbe0-5782-932b-af81a877975c' id='66926' code='7QKCSC'>
                <room>Auditorium</room>
                <title>Accelerating Progress: Shifting from a Reactive to Proactive Approach in Cybersecurity</title>
                <subtitle></subtitle>
                <type>Keynote</type>
                <date>2025-04-26T09:00:00+00:00</date>
                <start>09:00</start>
                <duration>00:40</duration>
                <abstract>Anticipatory governance in cybersecurity refers to proactive, forward-thinking strategies for managing cyber risks and enhancing resilience. It involves identifying potential threats, vulnerabilities, and future opportunities and challenges within the cybersecurity landscape, then preparing for them in advance. Rather than reacting to security incidents after they occur, anticipatory governance focuses on predicting and mitigating risks before they materialise. This talk will explore the key elements of anticipatory governance in cybersecurity, offering actionable insights for security practitioners. By embracing anticipatory governance, organisations can strengthen their security posture and navigate the increasingly complex digital ecosystem with agility, resilience, and trust.</abstract>
                <slug>bsides-exeter-2025-66926-accelerating-progress-shifting-from-a-reactive-to-proactive-approach-in-cybersecurity</slug>
                <track>Purple</track>
                
                <persons>
                    <person id='67461'>Heather Lowrie</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2025/talk/7QKCSC/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2025/talk/7QKCSC/feedback/</feedback_url>
            </event>
            <event guid='dfd5e305-d4f8-5f0b-b53c-0b7a59d1f751' id='62937' code='UAWWPS'>
                <room>Auditorium</room>
                <title>Aftermath: The human cost of ransomware</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2025-04-26T09:45:00+00:00</date>
                <start>09:45</start>
                <duration>00:40</duration>
                <abstract>Join a seasoned SecOps lead as they dig beyond the financial &amp; reputational impacts of cyber incidents and explore the often overlooked emotional toll, cultural shifts, and stresses that happen when they hit.

Discover the far-reaching consequences, from sleepless nights and anxiety to organisational trauma, and go home with practical strategies to build resilience and protect your people before, during, and after attacks.</abstract>
                <slug>bsides-exeter-2025-62937-aftermath-the-human-cost-of-ransomware</slug>
                <track>Blue</track>
                
                <persons>
                    <person id='64073'>Adrian Taylor</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2025/talk/UAWWPS/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2025/talk/UAWWPS/feedback/</feedback_url>
            </event>
            <event guid='28174655-bd38-5b7b-b09a-e7c77bfc7e75' id='62327' code='8Y8MPQ'>
                <room>Auditorium</room>
                <title>Prompt-ing the Injection - LLMs Under Attack!</title>
                <subtitle></subtitle>
                <type>Rookie Talk</type>
                <date>2025-04-26T10:30:00+00:00</date>
                <start>10:30</start>
                <duration>00:20</duration>
                <abstract>This talk provides a brief overview about how Large Language Models (LLMs) work, with a detailed explanation &amp; live demonstration about how you can gather sensitive information from LLMs. This simulates how an attacker could gain information from new and emerging technologies.</abstract>
                <slug>bsides-exeter-2025-62327-prompt-ing-the-injection-llms-under-attack</slug>
                <track>Purple</track>
                <logo>/media/bsides-exeter-2025/submissions/8Y8MPQ/Prompt-ing_The_In_5A9dt6q.png</logo>
                <persons>
                    <person id='63440'>Smitha Bhabal</person>
                </persons>
                <language>en</language>
                <description>This talk begins by explaining the fundamental workings of LLMs, detailing how these models generate responses based upon the prompts they recieve. With this understanding, the session shifts focus towards specific vulns that arise when threat actors manipulate inputs to influence the models outputs.

Through live demonstrations, attendees will seek how attackers can exploit these vulnerabilities, simulating real world scenarios where prompt injection is used to cause unintended behaviour or access confidential data. The talk will emphasise the importance of recognising these threats as LLMs become more integrated into applications across industries. This talk will finish with a summary of the elements, and how organisations could defend against these.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2025/talk/8Y8MPQ/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2025/talk/8Y8MPQ/feedback/</feedback_url>
            </event>
            <event guid='d2973053-2382-525b-8a9a-fb1569d701b2' id='64551' code='AHBT98'>
                <room>Auditorium</room>
                <title>Security mismatch. Organisational users have different IT expectations from system administrators. Using organisational culture to close the gap</title>
                <subtitle></subtitle>
                <type>Rookie Talk</type>
                <date>2025-04-26T10:50:00+00:00</date>
                <start>10:50</start>
                <duration>00:20</duration>
                <abstract>This paper will look at reasons why organisations use approved software lists, and why users (with little real understanding of security) find such lists increasingly frustrating, once they have found that they can do the job quicker and more effectively using their own apps.
It also examines the role of BYOD in expanding this headache for managers of organisational systems, and how best practice of a hybrid approach to BYOD/organisation systems that embraces security issues can in turn reduce the more general problem of &quot;Shadow IT&quot;.
The follow on from this would be an academic paper examining the relationship between type of organisation culture and extent of Shadow IT.</abstract>
                <slug>bsides-exeter-2025-64551-security-mismatch-organisational-users-have-different-it-expectations-from-system-administrators-using-organisational-culture-to-close-the-gap</slug>
                <track>Blue</track>
                
                <persons>
                    <person id='66890'>Richard Henson</person>
                </persons>
                <language>en</language>
                <description>Computer users get more sophisticated in their use of applications every day. Organisations typically have one application type for each job function, and double-down on security for those applications and the platforms that support them. Users see their application use as quicker and more efficient than the official way, and take short-cuts, often breaking policy to do so. This has been happening for many years, and as apps get more sophisticated, the gulf between end-users and system administrators gets wider. What can be done to close the gap? The role of organisational culture is examined, and conclusions tentatively drawn. Academic research that followed based on types of organisational culture and extent of mismatch. All organisations would participate anonymously.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2025/talk/AHBT98/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2025/talk/AHBT98/feedback/</feedback_url>
            </event>
            <event guid='d74a766f-9a5d-5ad1-9d69-6ddd86b8b7e8' id='65200' code='D7MRHZ'>
                <room>Auditorium</room>
                <title>The Art of Threat Modelling</title>
                <subtitle></subtitle>
                <type>Rookie Talk</type>
                <date>2025-04-26T11:10:00+00:00</date>
                <start>11:10</start>
                <duration>00:20</duration>
                <abstract>The &apos;Art of Threat Modelling&apos; covers a high level overview of the what, why, how of threat modelling and how we all  can threat model pretty much..... anything</abstract>
                <slug>bsides-exeter-2025-65200-the-art-of-threat-modelling</slug>
                <track>Blue</track>
                
                <persons>
                    <person id='66045'>Deleted User</person>
                </persons>
                <language>en</language>
                <description>Threat Modelling isn&apos;t boring!

This talk is aims to show you this in a fun, fast paced and engaging way looking at:

* The fundamentals of threat modelling
* How you can Threat Model anything 
* The use of your operational data, such as threat intel or post incident reviews, to help better shape your outputs

Enjoy</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2025/talk/D7MRHZ/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2025/talk/D7MRHZ/feedback/</feedback_url>
            </event>
            <event guid='8c635d65-15de-59a6-bef8-fc37978d033f' id='69107' code='LAXSZ9'>
                <room>Auditorium</room>
                <title>How to Hack Yourself</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2025-04-26T11:40:00+00:00</date>
                <start>11:40</start>
                <duration>00:40</duration>
                <abstract>In this talk we&apos;ll dive into the world of Open Source Intelligence (OSINT), exploring how public information from online sources can be used to uncover personal (and sometimes private) details about yourself. You&apos;ll learn what a digital footprint is, how every action online contributes to your digital identity, and the potential risks associated with using social media. Most importantly, we&#8217;ll also go through actionable steps to help you safeguard your privacy and protect yourself from potential online threats. Whether you&#8217;re a beginner or want to deepen your understanding about your digital footprint, this session will help equipped you with the tools to stay safe in today&#8217;s social media driven world.</abstract>
                <slug>bsides-exeter-2025-69107-how-to-hack-yourself</slug>
                <track>Purple</track>
                
                <persons>
                    <person id='63373'>Stuart Baker</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2025/talk/LAXSZ9/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2025/talk/LAXSZ9/feedback/</feedback_url>
            </event>
            <event guid='3a68784d-f71a-5e99-a51d-37db8ec5f715' id='64805' code='SRMVWC'>
                <room>Auditorium</room>
                <title>Battle-Tested Incident Recovery: Lessons from the Front Lines</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2025-04-26T12:20:00+00:00</date>
                <start>12:20</start>
                <duration>00:40</duration>
                <abstract>Jack Hughes a leader of the Unit 42 Digital Forensics and Incident Response team will provide insight into the often-overlooked world of incident recovery. This talk draws on real-world experience and lessons from the front line of cybersecurity. Jack will discuss commonly observed mistakes that derail containment and recovery efforts based on the experience of leading hundreds of incidents globally. 

The session will walk through case studies, lessons learnt the hard way and methodologies for incident recovery that reduce the current and future risk of incident recurrence.  

Whether you&apos;re a seasoned incident responder or new to the field, this session will equip you with the insights and practical guidance to transform your approach to incident recovery.</abstract>
                <slug>bsides-exeter-2025-64805-battle-tested-incident-recovery-lessons-from-the-front-lines</slug>
                <track>Purple</track>
                
                <persons>
                    <person id='65685'>Jack Hughes</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2025/talk/SRMVWC/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2025/talk/SRMVWC/feedback/</feedback_url>
            </event>
            <event guid='f55d3de9-4c26-58d7-9665-4f32bf88f636' id='64865' code='33CQKT'>
                <room>Auditorium</room>
                <title>Hacktivists V2.0</title>
                <subtitle></subtitle>
                <type>Keynote</type>
                <date>2025-04-26T14:00:00+00:00</date>
                <start>14:00</start>
                <duration>00:40</duration>
                <abstract>We as an industry have been heavily focused on the ransomware threat. A loud and dramatic threat that commands the attention of security professionals, governments and CEO&#8217;s globally but has possibly diverted some of our resources away from another increasingly concerning threat.
Hacktivists seem like an old adversary that are the concern only of big banks and extractive industry organisations. This is a dangerous assessment. In this talk we will look at the rapid increase in their number, capability and motivation. Who are they? How do they select targets? How are they funded? Why do they pose a threat to you? What discussions do we need to have in 2025 to combat them?</abstract>
                <slug>bsides-exeter-2025-64865-hacktivists-v2-0</slug>
                <track>Purple</track>
                
                <persons>
                    <person id='65744'>lisa forte</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2025/talk/33CQKT/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2025/talk/33CQKT/feedback/</feedback_url>
            </event>
            <event guid='fde0898c-e091-5a74-bce1-1250fa8124e4' id='65995' code='FRL7UC'>
                <room>Auditorium</room>
                <title>Grand Social Engineering - DevSecOps and Influence</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2025-04-26T14:45:00+00:00</date>
                <start>14:45</start>
                <duration>00:40</duration>
                <abstract>Successful DevSecOps transformation is much more then putting tools in pipelines and declaring &quot;shift left&quot;. The hardest shift to pull off is when it comes to nudging values towards digital safety, and in this talk I walkthrough the techniques and literature I use to do this at scale. We will cover theories from Organisational Change Management, Leadership and Influence, and how we can apply these social tools in the context of DevSecOps to help you make an impact.</abstract>
                <slug>bsides-exeter-2025-65995-grand-social-engineering-devsecops-and-influence</slug>
                <track>Purple</track>
                
                <persons>
                    <person id='66734'>Seb Coles</person>
                </persons>
                <language>en</language>
                <description>DevSecOps is more than just technology&#8212;it&#8217;s a fundamental shift in mindset, culture, and collaboration. While many organizations focus on tools and automation, the real challenge lies in leading people through this transformation. This talk will explore the psychological and organizational change management techniques essential for driving a successful DevSecOps journey.  

We&#8217;ll begin by examining a change model like Kotter&#8217;s 8-Step Change Model, a structured approach to transformation that helps organizations create urgency, build coalitions, and embed lasting change. Understanding these steps enables leaders to navigate resistance and foster buy-in at all levels. We will also look psychological safety, a critical factor in high-performing teams. Using David Rock&#8217;s SCARF Model we&#8217;ll explore how to create environments where developers, security, and operations teams can collaborate without fear. Psychological safety is the foundation for open discussions, continuous learning, and innovation in security practices. Finally, Influence and communication play a crucial role in transformation. We&#8217;ll discuss key techniques such as mirroring and active listening, which enhance trust and alignment. Understanding the principles of negotiation and persuasion allows leaders and change agents to align stakeholders, overcome objections, and drive meaningful action. I will talk through my own experiences applying these models in the context of DevSecOps.

Whether you are a leader, engineer, or security professional, this talk will equip you with the tools to influence change, foster collaboration, and make an impact.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2025/talk/FRL7UC/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2025/talk/FRL7UC/feedback/</feedback_url>
            </event>
            <event guid='18f7078e-ba7d-51cb-a8b5-2c74a0c81eae' id='65953' code='YVFNNG'>
                <room>Auditorium</room>
                <title>Hacking the Job Market: Double Your Chances of Landing an Ethical Hacker Role</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2025-04-26T15:30:00+00:00</date>
                <start>15:30</start>
                <duration>00:40</duration>
                <abstract>Cybersecurity is one of the fastest growing industries, and with that growth comes competition. You&#8217;re not only competing with other graduates from your university, but you&#8217;re also competing with passionate, self-driven individuals from the rest of the world who have been honing their skills inside and outside the classroom.
If you want to stand out and land your first cybersecurity job, you need more than just a degree or certification. Employers are looking for passion, initiative, commitment and adaptability, all those things that can&#8217;t be taught in a classroom. 
As a manager for an Application Security (AppSec) team, I have reviewed hundreds, if not thousands of applications and conducted several hundred interviews. I&#8217;ve seen firsthand what makes a candidate stand out and outshine other candidates. Our recruitment is heavily focused on junior roles out of necessity, as we are located far from metropolitan areas and can&#8217;t easily attract already established senior professionals. However, my insights might be useful for more senior roles and even roles outside AppSec and Cybersecurity as well, but again, my target group for this paper is junior roles in Ethical hacking.

In this talk, I&#8217;ll share my real-world insights from hiring and mentoring cybersecurity professionals and show you how to differentiate yourself.
I&apos;ll share what I look for in candidates, the mistakes to avoid, and hopefully share what makes someone to truly standout and be more hirable.
By the end of this talk, you&#8217;ll have a clear action plan for building your skills, personal brand, and network so you can land that first job with confidence. It&#8217;s a lot of hard work, but trust me, it will make a difference, not just in the short run, what you do from today, will impact the rest of your career.</abstract>
                <slug>bsides-exeter-2025-65953-hacking-the-job-market-double-your-chances-of-landing-an-ethical-hacker-role</slug>
                <track>Purple</track>
                <logo>/media/bsides-exeter-2025/submissions/YVFNNG/hired_CSFtN6D.PNG</logo>
                <persons>
                    <person id='66694'>Mikael Svall</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2025/talk/YVFNNG/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2025/talk/YVFNNG/feedback/</feedback_url>
            </event>
            <event guid='eccacb69-dab0-5512-9bd0-1bff341a980b' id='64801' code='7BBYE8'>
                <room>Auditorium</room>
                <title>The (Un)Natural History of Malware</title>
                <subtitle></subtitle>
                <type>Keynote</type>
                <date>2025-04-26T16:30:00+00:00</date>
                <start>16:30</start>
                <duration>00:40</duration>
                <abstract>Malware is constantly evolving, much like biological viruses that adapt over time in response to our defenses. I like to analyze malware as if it were a living entity, driven by the ultimate goal of survival. Just as Evolutionary Game Theory (EGT) is used to study biological evolution, what if we applied it to malware evolution as well?

In this talk, I&#8217;ll explore how EGT can help us understand why malware behaves the way it does and how different strategies shape its evolution. From one-shot viral outbreaks like the ILOVEYOU worm, to stealthy shape-shifters like Simile, adaptive threats like Emotet, and symbiotic threats like CrackedCantil, we&#8217;ll examine how attackers develop survival tactics&#8212;some aggressive, some deceptive, and some even collaborative.

And just like in nature, where species must adapt or go extinct, I&#8217;ll discuss how defenders can use EGT principles and lessons from nature to anticipate future malware threats and build stronger defenses.</abstract>
                <slug>bsides-exeter-2025-64801-the-un-natural-history-of-malware</slug>
                <track>Purple</track>
                <logo>/media/bsides-exeter-2025/submissions/7BBYE8/lena_pic_2_JTLGxWE.PNG</logo>
                <persons>
                    <person id='65680'>Lena Yu</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2025/talk/7BBYE8/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2025/talk/7BBYE8/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Seminar Room 1' guid='07acacbc-30fd-5d10-adf4-2409a3cfaf83'>
            <event guid='0c821b27-8af4-539c-9009-a9c5e37b859c' id='62665' code='SD3YF8'>
                <room>Seminar Room 1</room>
                <title>Why should professionalism matter to you?</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2025-04-26T09:45:00+00:00</date>
                <start>09:45</start>
                <duration>00:40</duration>
                <abstract>You have probably heard of the move to professionalise the cyber security industry, but why should you care? Whether your focus is on red teaming, pen testing, vulnerability scanning or threat intelligence, you need to understand the shift in the industry that will, at some point in your career, have a fundamental effect on the way that you record achievement, demonstrate competence and define your experience. I&apos;ll talk you through the changes and how to align your career pathway with them.</abstract>
                <slug>bsides-exeter-2025-62665-why-should-professionalism-matter-to-you</slug>
                <track>Purple</track>
                <logo>/media/bsides-exeter-2025/submissions/SD3YF8/Chartership-600x4_aIg3ujd.png</logo>
                <persons>
                    <person id='63819'>Debi McCormack</person>
                </persons>
                <language>en</language>
                <description>I will provide a detailed synopsis of the move to professional registration that has been instigated by the UK Cyber Security Council, backed by central Government and funded by DSIT. There is still confusion in the technical security community about why a Professional Title matters, so I will explain the direction and the effect this is going to have on job searches in the near future. I will also talk about CPD, ethics and standards, and giving back to the industry, and how this should be recorded if you are an offensive consultant - what counts, what doesn&apos;t, and what YOU think should count. I&apos;ll ask attendees to give me their opinions about this and the move towards professionalisation as a whole. I&apos;ll open the floor to questions so we can discuss whether you think this is a good idea, how much you&apos;re willing to invest on your individual career path, and how to progress from Associate to Chartered status as your career progresses.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2025/talk/SD3YF8/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2025/talk/SD3YF8/feedback/</feedback_url>
            </event>
            <event guid='c314cdf8-4c8c-575d-bdae-f40bc21553de' id='65977' code='NRP3EG'>
                <room>Seminar Room 1</room>
                <title>HODL Your Keys: How Seed Phrases Get Stolen</title>
                <subtitle></subtitle>
                <type>Rookie Talk</type>
                <date>2025-04-26T10:30:00+00:00</date>
                <start>10:30</start>
                <duration>00:20</duration>
                <abstract>In today&#8217;s world cryptocurrency is becoming an area of interest for just about anybody. We constantly hear about it in the headlines, the thousands to billions being stolen, made or gone missing. In most cases, the seed phrase is the master key to all of this news. But how secure is it, really? From phishing scams and malware to sophisticated supply chain attacks, hackers, insiders and that shy teenager in their mom&#8217;s basement, are constantly evolving their tactics to hijack seed phrases and drain wallets.</abstract>
                <slug>bsides-exeter-2025-65977-hodl-your-keys-how-seed-phrases-get-stolen</slug>
                <track>Purple</track>
                
                <persons>
                    <person id='66715'>Mykhailo Shtepa</person>
                </persons>
                <language>en</language>
                <description>In this talk, we will break down how crypto wallets work, how seed phrases are generated, and the most common ways they get compromised. More importantly, we&apos;ll arm you with best practices to keep your crypto safe. Whether you&apos;re a seasoned trader or just starting out, this session will help you fortify your defenses in the ever-evolving landscape of digital finance.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2025/talk/NRP3EG/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2025/talk/NRP3EG/feedback/</feedback_url>
            </event>
            <event guid='93fb44ba-1d14-535e-b35f-328ed0d03326' id='64797' code='VJACQJ'>
                <room>Seminar Room 1</room>
                <title>One Flew Over the Auditors Nest (Dodging the Pitfalls of Compliance)</title>
                <subtitle></subtitle>
                <type>Rookie Talk</type>
                <date>2025-04-26T10:50:00+00:00</date>
                <start>10:50</start>
                <duration>00:20</duration>
                <abstract>In the dark shadowy depths of auditing, you can see a plethora of nonconformities lurking - relentless, chaotic and recurring. Time and time again, these common pitfalls can catch companies off guard, undermining their Information Security Management System (ISMS). Whether you&apos;re an auditor, implementer or just a curious soul looking to unravel the mysteries of an ISMS, we&apos;ll take a look at the top five nonconformities (personally rated by me) and more importantly, the best mitigations and methods you can employ to prevent these devious traps from recurring!</abstract>
                <slug>bsides-exeter-2025-64797-one-flew-over-the-auditors-nest-dodging-the-pitfalls-of-compliance</slug>
                <track>Blue</track>
                
                <persons>
                    <person id='65700'>Chris</person>
                </persons>
                <language>en</language>
                <description>An Information Security Management System (ISMS) is the backbone of an organisation&apos;s approach to tackling information security. The most widely known ISMS framework, lauded through the Halls of Compliance, is ISO27001. You&apos;ve probably heard of it! 

The ISMS is there to provide a structured approach in protecting organisational and client data in a way that is best suited to the business needs. Some businesses may have an ISMS to generally improve their information security, others may try to implement one for tendering purposes. Though many understand generally what is required, many misinterpret, overlook or outright miss areas that could result in the very foundations of the ISMS crumbling and cracking.

&quot;But what are these areas that are so often missed?&quot; I hear you cry. An excellent question!

In this talk, I will uncover the five most common nonconformities and how to effectively remediate them that I&apos;ve encountered during my 4 year tenure as an ISO27001 Lead Auditor. Though the talk will primarily be focused on ISO27001, the knowledge gained can still be applied to any ISMS, regardless of the framework. 

So come along so you can learn from these experiences and help improve your own ISMS or - if you&apos;re an auditor or implementer - further improve your knowledge!</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2025/talk/VJACQJ/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2025/talk/VJACQJ/feedback/</feedback_url>
            </event>
            <event guid='ec3fc640-6210-58fa-b098-e753bd4acc2a' id='65884' code='W9CQR7'>
                <room>Seminar Room 1</room>
                <title>Black Belt Security - Lessons From Karate</title>
                <subtitle></subtitle>
                <type>Rookie Talk</type>
                <date>2025-04-26T11:10:00+00:00</date>
                <start>11:10</start>
                <duration>00:20</duration>
                <abstract>Karate is a martial art focused primarily on improving self-defence, recognising different types of attacks and being prepared to react to them in an efficient way. Sound familiar? Its enduring legacy offers us many lessons that we can bring into our workplaces to strengthen our security. Also, Cobra Kai has made it cool all over again, so tie on a patterned headband, grab a bonsai tree, and join me to explore how karate can help us improve security. Please note that no previous experience is necessary, and no audience members will be &quot;volunteered&quot; for demonstrations.</abstract>
                <slug>bsides-exeter-2025-65884-black-belt-security-lessons-from-karate</slug>
                <track>Red</track>
                
                <persons>
                    <person id='66634'>Rudi van der Heide</person>
                </persons>
                <language>en</language>
                <description>The presentation will start with an introduction and explanation of why I&apos;m talking on this topic. I will explain that as a Nidan (second dan) black belt in karate working in cybersecurity, I&apos;m in a position to draw lessons between the two. It will then say what it will not be: a karate class, Cobra Kai, or a history lesson.

The main part of the presentation will consider the three main aspects of karate, kihon (basics), kata (set patterns of moves), and kumite (sparring). It will explain what each of these areas are, what they require from the practitioner, and how they apply to cybersecurity. This will be backed up with anecdotes and examples that I&apos;ve gathered during my time learning karate.

After the three main areas, the presentation will cover the &quot;black belt level&quot; of tips, the lessons that might not be obvious to a beginner but become clearer as they progress through the grades.

The presentation will take a light-hearted approach, avoiding technical descriptions or confusing jargon. No previous experience or knowledge of karate will be required.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2025/talk/W9CQR7/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2025/talk/W9CQR7/feedback/</feedback_url>
            </event>
            <event guid='82386680-a222-5837-aaf0-848a62b61fd0' id='66197' code='ZJ8PKK'>
                <room>Seminar Room 1</room>
                <title>Ctrl panic + Alt response plans + Del the drama: Best practices for incident response</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2025-04-26T11:40:00+00:00</date>
                <start>11:40</start>
                <duration>00:40</duration>
                <abstract>Cyber incidents can affect organisations of any size or sector, at any time, so it&#8217;s crucial that you have a plan in place to ensure you can respond, recover and continue operating. This session will highlight some of the current best practices in incident response based on cyber crime investigations here in the South West as well as nationally recognised guidance.</abstract>
                <slug>bsides-exeter-2025-66197-ctrl-panic-alt-response-plans-del-the-drama-best-practices-for-incident-response</slug>
                <track>Blue</track>
                <logo>/media/bsides-exeter-2025/submissions/ZJ8PKK/SWRCCU_Logo_JPG_aL6ZQun.jpg</logo>
                <persons>
                    <person id='66948'>South West Regional Economic and Cyber Crime Unit (SWRECCU)</person>
                </persons>
                <language>en</language>
                <description>Over 50% of organisations in the UK experienced a cyber breach or attack in the last 12 months, yet only 22% have a formalised incident response plan (DSIT Cyber Breaches survey). With organisations now relying on digital systems to operate, it&#8217;s important to consider what you do when things go wrong. Who do you contact? Who is responsible for what?  Should technical teams just switch everything off? Do we send all our staff to the pub whilst we figure this out? These are just some of the questions that businesses should consider when building their incident response plans and the technical response to an incident. 
The session will signpost attendees to a number of free incident response resources, and we will cover what you can expect from a law enforcement response to cyber attacks.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2025/talk/ZJ8PKK/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2025/talk/ZJ8PKK/feedback/</feedback_url>
            </event>
            <event guid='2501ed5f-57c8-5cdb-a229-2d0e1b6670ff' id='65971' code='KVVXM3'>
                <room>Seminar Room 1</room>
                <title>The Uncomfortable War: Keeping Kids Safe.</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2025-04-26T12:20:00+00:00</date>
                <start>12:20</start>
                <duration>00:40</duration>
                <abstract>Should a three-year-old have their own phone?

Children face numerous dangers online, from cyberbullying and predatory behaviours to data privacy risks. This talk explores the key challenges kids encounter on the internet and the evolving threats they face. We&apos;ll discuss the importance of building awareness among parents, educators, and IT professionals, and look into strategies to protect children in a connected world.</abstract>
                <slug>bsides-exeter-2025-65971-the-uncomfortable-war-keeping-kids-safe</slug>
                <track>Blue</track>
                
                <persons>
                    <person id='66712'>Joe wells</person>
                </persons>
                <language>en</language>
                <description>As children become more immersed in the online world, they face unprecedented risks that many parents, educators, and even security professionals struggle to keep up with. From cyberbullying and online predators to exposure to inappropriate content and data privacy concerns, protecting kids online is becoming increasingly challenging. In this discussion, we will explore the most pressing dangers children face today, and provide practical, actionable steps that adults can take to safeguard young users. We&apos;ll cover tools, techniques, and strategies (and maybe even make a few of our own!) to help create a safer online experience for the next generation of potential security leaders...maybe.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2025/talk/KVVXM3/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2025/talk/KVVXM3/feedback/</feedback_url>
            </event>
            <event guid='739ea24d-ec13-5a95-ab5c-36a9cdd449b0' id='65269' code='CDBWSY'>
                <room>Seminar Room 1</room>
                <title>Super Pets - The Hero you didn&apos;t know you had in your house!</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2025-04-26T14:45:00+00:00</date>
                <start>14:45</start>
                <duration>00:40</duration>
                <abstract>We tend not to pay too much attention to things which are so familiar that we don&apos;t always see their true potential or value... like the faithful dog that guards the house or goes to get help if their owner is injured.

The good news is that something is already in every corporate and home environment, but do we leverage it to enhance our security posture... not very often, instead favouring the new shiny tools or latest marketing must have, but yet we still see breaches, ransomware and scams... whether you know it or not we all have a super pet or hero dog in our houses and it can help!</abstract>
                <slug>bsides-exeter-2025-65269-super-pets-the-hero-you-didn-t-know-you-had-in-your-house</slug>
                <track>Blue</track>
                <logo>/media/bsides-exeter-2025/submissions/CDBWSY/Dog_with_sunnies_qJWni6i.jpg</logo>
                <persons>
                    <person id='66109'>Gary Cox</person>
                </persons>
                <language>en</language>
                <description>This session will dive into traffic distribution systems, how they work and how they are leveraged by criminal groups.  Most importantly we&apos;ll discuss how we can look to defend ourselves.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2025/talk/CDBWSY/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2025/talk/CDBWSY/feedback/</feedback_url>
            </event>
            <event guid='7ab8dd30-f5f1-5b36-bcf2-561eb73fb3d9' id='65878' code='UHAECY'>
                <room>Seminar Room 1</room>
                <title>Buffy vs. Phishing: Slaying Cyber Threats Sunnydale Style</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2025-04-26T15:30:00+00:00</date>
                <start>15:30</start>
                <duration>00:40</duration>
                <abstract>Think slaying vamps is tough? Try battling ransomware. This talk flips the script, proving Buffy&apos;s not just awesome at slaying demons &#8211; she&apos;s a cybersecurity guru in disguise. We&apos;ll dissect her tactics: threat modeling, rapid response, training and awareness, security tools and techniques, and the crucial power of the Scooby Gang. Forget silver bullets, we&apos;re talking firewalls and threat intel. Learn how Buffy&apos;s intuition and experience translate to real-world cyber defense, and why even The Chosen One needs a team. Because in cybersecurity, just like in Sunnydale, you&apos;re never fighting alone.</abstract>
                <slug>bsides-exeter-2025-65878-buffy-vs-phishing-slaying-cyber-threats-sunnydale-style</slug>
                <track>Blue</track>
                
                <persons>
                    <person id='66898'>Andreea Mihai</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2025/talk/UHAECY/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2025/talk/UHAECY/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Seminar Room 7' guid='26abe7f8-2439-5c0e-b8af-a92563410428'>
            <event guid='cb17eacd-b3c4-52ea-9695-0b44e9014f44' id='62917' code='HDPXVF'>
                <room>Seminar Room 7</room>
                <title>Is Your Phone Spying on You? An In-Depth Analysis of Vulnerabilities in Cisco VoIP Phones</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2025-04-26T09:45:00+00:00</date>
                <start>09:45</start>
                <duration>00:40</duration>
                <abstract>Do you trust the embedded devices around you? Perhaps you shouldn&apos;t! Even industry giants make significant mistakes. In this presentation, we will analyse Cisco&apos;s VoIP phones, that can be found in offices, governmental buildings, and even the White House. These devices were found to have critical vulnerabilities, including easily exploitable flaws.

Fun Fact: Did you know that President Biden and Trump used these phones?

Among the vulnerabilities discovered was unauthenticated packet capture, allowing attackers to intercept and listen to any phone call made or received on the device. We&apos;ll demonstrate live how simple it is to intercept, reconstruct, and listen to a phone call.

This presentation will dive into other issues uncovered during the blackbox testing of these devices. We&apos;ll also discuss what Cisco could have done differently to prevent these vulnerabilities and provide guidance on how to avoid similar pitfalls. Additionally, we are going explore the challenges and importance of thorough blackbox testing.

Join us for a comprehensive look at the security flaws in trusted devices and learn how to protect against them.</abstract>
                <slug>bsides-exeter-2025-62917-is-your-phone-spying-on-you-an-in-depth-analysis-of-vulnerabilities-in-cisco-voip-phones</slug>
                <track>Red</track>
                
                <persons>
                    <person id='64056'>Balazs Bucsay</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2025/talk/HDPXVF/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2025/talk/HDPXVF/feedback/</feedback_url>
            </event>
            <event guid='7bb23c7b-e833-5d02-a759-8061709cadaa' id='65903' code='LQTB8N'>
                <room>Seminar Room 7</room>
                <title>Zero to Pentester: My &#8216;root&#8217; into Cyber</title>
                <subtitle></subtitle>
                <type>Rookie Talk</type>
                <date>2025-04-26T10:30:00+00:00</date>
                <start>10:30</start>
                <duration>00:20</duration>
                <abstract>A 20-minute presentation on my journey from working in oil &amp; gas into becoming a Senior CTL APP Pentester and all the challenges I have faced since moving into cyber 3 years ago.

This will be aimed at encouraging people to explore their soft skills, and that technical skills aren&#8217;t all you need. Key points in the talk will include self-development, tips on resources to use, things I&#8217;d do differently and my goals going forward. It is aimed at students/graduates/people looking to transition into cyber security.

The talk will be interactive and will contain some technical information, however this is considered a careers talk, not a technical talk.</abstract>
                <slug>bsides-exeter-2025-65903-zero-to-pentester-my-root-into-cyber</slug>
                <track>Purple</track>
                
                <persons>
                    <person id='66653'>Ross Mitchell</person>
                </persons>
                <language>en</language>
                <description>This presentation focuses on my transition into cyber security from oil &amp; gas, and how I transferred skills from a completely different role and industry to succeed in my current day-to-day role. There seems to be a misconception in the security space which leans on the idea that success in this industry only comes from graduating from university with a degree in cyber security.

Penetration testing is a consultancy-focused role (or should be), therefore client communication is a key skill. Having the ability to effectively communicate technical information to a non-technical audience is a prime example of a skill that makes a great consultant. For example, there&apos;s a critical difference between being able to execute a complex DOM-based Cross-Site Scripting attack and the ability to explain the risk of the attack, and how it could be leveraged to contextually affect a specific system.

Although certain technical aspects will be noted in this talk, it is more weighted towards having the correct mindset and objectives. Moving from a completely different industry into one as technical as ethical hacking can be daunting, and navigating the plethora of information available can be a task in itself. However, it&#8217;s important to maintain a positive outlook and set reasonable goals, as mindset is far more powerful than prior knowledge. The old saying goes: &quot;Give a man a fish, and you feed him for a day. Teach a man to fish, and you feed him for a lifetime.&quot; The same applies to learning in cyber security.

You can either gain knowledge to overcome a single task or adopt a mindset and work ethic that allow you to tackle a hundred tasks. This goes both ways&#8212;employers should recognise talented candidates based on proven work ethic and drive, demonstrated through achievements on platforms like Hack The Box, TryHackMe, TCM Security, A Cloud Guru, and YouTube, rather than overlooking them simply for not holding a cyber security degree.

In this talk, I delve into how I progressed to the level of a Senior CTL APP Pentester, providing actionable tips for industry newcomers and those looking to transition into cyber security.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2025/talk/LQTB8N/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2025/talk/LQTB8N/feedback/</feedback_url>
            </event>
            <event guid='d714a5af-8ffc-5cfe-929c-67061b9b328a' id='65997' code='FBYR9G'>
                <room>Seminar Room 7</room>
                <title>Analyzing the Impact of Spectre and Meltdown Vulnerabilities on Modern Computing Systems: A Case Study</title>
                <subtitle></subtitle>
                <type>Rookie Talk</type>
                <date>2025-04-26T10:50:00+00:00</date>
                <start>10:50</start>
                <duration>00:20</duration>
                <abstract>This case study, explained by 2 master&apos;s students, dives into the Spectre and Meltdown vulnerabilities, which were exploited to target the CPU architecture design aimed at enhancing performance. 

Retrospectively, the system had failsafes in place to address this issue, but they were not deployed quickly enough, to prevent this exploit.

Attackers leveraged the &quot;Least Recently Used&quot; logic to breach the hardware layer from the software layer, leading to one of the most significant threats in history.

Major companies were hesitant to release information until they had a firm solution to ensure public safety.

This talk will showcase how the attack was carried out and what countermeasures were implemented to stop this exploit from being carried out in today&apos;s world.</abstract>
                <slug>bsides-exeter-2025-65997-analyzing-the-impact-of-spectre-and-meltdown-vulnerabilities-on-modern-computing-systems-a-case-study</slug>
                <track>Red</track>
                <logo>/media/bsides-exeter-2025/submissions/FBYR9G/sm_7GAbK7f.jpg</logo>
                <persons>
                    <person id='66735'>Mohammed Mohtesham Ali</person><person id='69002'>Abhishek Aggarwal</person>
                </persons>
                <language>en</language>
                <description>The Illusion of Safety Superimposed on a System Prioritizing Performance

Over the years, in their pursuit of fine-tuning hardware architecture to meet our aspirations of performance and safety, designers faced a fundamental question: which one can we deliver to the public while maintaining their trust that this is a secure system?

However, this delicate balance was shattered when a fatal flaw was discovered, affecting modern architectures in a way that wasn&apos;t fully preventable by software patches alone.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2025/talk/FBYR9G/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2025/talk/FBYR9G/feedback/</feedback_url>
            </event>
            <event guid='0e6b30d7-c06f-503c-9081-381c41baeaf3' id='65979' code='JTGJXG'>
                <room>Seminar Room 7</room>
                <title>Custom Scripts and tools for pen testing: a beginner&apos;s guide</title>
                <subtitle></subtitle>
                <type>Rookie Talk</type>
                <date>2025-04-26T11:10:00+00:00</date>
                <start>11:10</start>
                <duration>00:20</duration>
                <abstract>A beginner-friendly session aimed at running through common pain-points within the penetration testing process and how automation and scripting can be introduced to help alleviate these issues using Python and Bash. This session explores automating web requests, managing and manipulating large datasets, and generating customer-appropriate outputs to help testers improve efficiency without advanced coding knowledge. Attendees will leave with practical techniques and examples to build custom scripts that streamline workflows and improve testing consistency.</abstract>
                <slug>bsides-exeter-2025-65979-custom-scripts-and-tools-for-pen-testing-a-beginner-s-guide</slug>
                <track>Red</track>
                
                <persons>
                    <person id='66719'>Adam Crease</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2025/talk/JTGJXG/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2025/talk/JTGJXG/feedback/</feedback_url>
            </event>
            <event guid='72e6ebee-d2c4-5906-a52e-4161b69b43dc' id='65996' code='KYLMU8'>
                <room>Seminar Room 7</room>
                <title>Cybersecurity Threats and Attacks in Modern Manufacturing</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2025-04-26T11:40:00+00:00</date>
                <start>11:40</start>
                <duration>00:40</duration>
                <abstract>Modern manufacturing relies heavily on highly integrated IT systems. While various terms -- such as Industry 4.0, Cyber-Physical Production Systems, and the Industrial Internet of Things (IIoT) -- describe these systems, they all share a common characteristic: the fusion of enterprise software with sensors and actuators. This creates a complex IT landscape comprising devices with diverse computational capabilities, operating systems, and software versions. Additionally, many manufacturing environments must integrate legacy systems that were never designed to be connected to the internet, further complicating security efforts.

Beyond the inherent challenges of securing such heterogeneous environments, cyberattacks on manufacturing systems can have severe real-world consequences, extending beyond data breaches to physical disruptions and costly damages.

In this talk, I will first provide a brief introduction to modern manufacturing systems. I will then explore key cybersecurity threats, with a particular focus on attacks targeting process logic vulnerabilities that can be exploited by both external threat actors and insiders. As far as possible, identified threats will be illustrated by real world attacks. I will conclude the talk with a brief outlook on ongoing research developing tools to detect (and mitigate) cybersecurity threats in modern manufacturing.</abstract>
                <slug>bsides-exeter-2025-65996-cybersecurity-threats-and-attacks-in-modern-manufacturing</slug>
                <track>Red</track>
                
                <persons>
                    <person id='66733'>Achim D. Brucker</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2025/talk/KYLMU8/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2025/talk/KYLMU8/feedback/</feedback_url>
            </event>
            <event guid='982369bd-6371-588d-8abf-95c502c74a8a' id='65236' code='CNHPUV'>
                <room>Seminar Room 7</room>
                <title>The Single-Packet Shovel: Digging For Desync-Powered Request Tunnelling</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2025-04-26T12:20:00+00:00</date>
                <start>12:20</start>
                <duration>00:40</duration>
                <abstract>Despite HTTP Request Tunnelling&apos;s resurgence in recent years with the advent of [HTTP/2 Desync Attacks](https://portswigger.net/research/http2#h2desync), its much bolder big brother HTTP Request Smuggling has stolen the limelight, leaving cases of desync-powered tunnelling buried for all but the most dedicated tunnelling enthusiasts. 

In this session I will reveal the discovery of wide-spread cases of request tunnelling in applications powered by popular servers including IIS, Azure Front Door and `redacted` including the creation of a novel detection technique that combined the recently popularised &quot;Single-Packet Attack&quot; with our ever-trusty HTTP desync techniques. 

Throughout the presentation I will also explore the complexities of navigating security research for the first time, drawing parallels from the advice given in [so you want to be a web security researcher](https://portswigger.net/research/so-you-want-to-be-a-web-security-researcher) and illuminate the ease through which existing tooling from industry leading researchers can be adapted in order to rapidly test your own ideas even with a rudimentary understanding of programming.</abstract>
                <slug>bsides-exeter-2025-65236-the-single-packet-shovel-digging-for-desync-powered-request-tunnelling</slug>
                <track>Red</track>
                
                <persons>
                    <person id='66080'>Thomas Stacey</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2025/talk/CNHPUV/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2025/talk/CNHPUV/feedback/</feedback_url>
            </event>
            <event guid='978b04f3-02dd-5841-829e-79f5605ee287' id='62326' code='D3TBA7'>
                <room>Seminar Room 7</room>
                <title>Beacon Harvest: Conquering Cobalt Strike at Scale</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2025-04-26T14:45:00+00:00</date>
                <start>14:45</start>
                <duration>00:40</duration>
                <abstract>Cobalt Strike started as a legitimate red team tool for simulating adversarial attacks; however, its powerful capabilities have made it a frequent target for abuse by APT groups, hacktivists, and cybercriminals. This talk outlines an automated, large-scale approach to harvesting Cobalt Strike payloads from VirusTotal and de-obfuscating them to extract key Indicators of Compromise (IOCs). By analysing these beacons at scale, we transform raw malware data into actionable threat intelligence&#8212;helping defenders stay one step ahead of adversaries who exploit Cobalt Strike for malicious gain.</abstract>
                <slug>bsides-exeter-2025-62326-beacon-harvest-conquering-cobalt-strike-at-scale</slug>
                <track>Red</track>
                
                <persons>
                    <person id='63439'>Ben (@polygonben)</person>
                </persons>
                <language>en</language>
                <description>Although Cobalt Strike was originally developed for ethical hacking and red teaming, the platform&#8217;s robust features have increasingly drawn the attention of malicious actors. From state-sponsored APTs to hacktivists and cybercriminals, adversaries leverage Cobalt Strike for sophisticated and stealthy attacks. In this session, we will demonstrate our end-to-end process for:

- Continuously harvesting Cobalt Strike payloads from VirusTotal
- Automating the de-obfuscation of extracted samples
- Identifying and extracting key IOCs, such as C2 infrastructure and configuration details

We will walk through the custom scripts and tooling that power this pipeline, sharing the challenges and lessons learned in scaling up analysis. Attendees will see how to convert vast quantities of malware data into timely, actionable intelligence to enhance detection, incident response, and overall security posture. By studying these real-world payloads, defenders can better understand how threat actors abuse Cobalt Strike and apply those insights to fortify their defences.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2025/talk/D3TBA7/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2025/talk/D3TBA7/feedback/</feedback_url>
            </event>
            <event guid='562cd69e-7027-5d73-bdf1-38423275f578' id='65799' code='33YKMS'>
                <room>Seminar Room 7</room>
                <title>Paint Me Like One of Your Firmwares</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2025-04-26T15:30:00+00:00</date>
                <start>15:30</start>
                <duration>00:40</duration>
                <abstract>For over 11 years the final two iPod nano models somehow managed to evade the best efforts of even the most tenacious hackers to subvert - something which I took personally. The first public jailbreak of an Apple device was a prize simply too enticing to ignore. In this talk I&apos;ll explain how I went from zero access to full, persistent and unobstructed control over the entire device. Join me on this tale of ancient font formats and blindly trying to leak bits out of the darkness....</abstract>
                <slug>bsides-exeter-2025-65799-paint-me-like-one-of-your-firmwares</slug>
                <track>Red</track>
                
                <persons>
                    <person id='66559'>Callum T</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2025/talk/33YKMS/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2025/talk/33YKMS/feedback/</feedback_url>
            </event>
            
        </room>
        
    </day>
    
</schedule>
