BSides Joburg 2024

BSides Joburg 2024

To see our schedule with full functionality, like timezone conversion and personal scheduling, please enable JavaScript and go here.
09:00
09:00
30min
Opening

Opening of BSides Joburg 2024 by the organizing team

Track 1
09:30
09:30
45min
Could ZA be 1337? What if we cast off the dark and lead the way to a new dawn
singe

What if South Africa weren’t just consumers, but renowned in the global cyber community; known for our innovative people, groundbreaking contributions, and pioneering companies? What would that look like, how could we get there, and would it be worth it?

Prevailing winds suggest we are at the start of a decline: a dwindling pool of entrants, an erosion of skills, and a market too narrow to sustain or inspire greatness. This slow death spiral threatens to undermine what we could be.

In this keynote, I want to warn us away from the dark path, and towards a future where South Africa is propelled from an increasingly tenuous periphery to the centre of all things cyber.

Track 1
10:15
10:15
15min
Tea Break
Track 1
10:30
10:30
45min
Terribly Layered Security - The common security failings of cryptography implementations for mobile
Connor du Plooy, Andre Lopes

This talk will delve into the intricate world of transport security, specifically within mobile applications, highlighting the terrifying vulnerabilities that can be introduced into your applications unknowingly. We will explore how these security flaws can be exploited by threat actors, compromising data integrity and user privacy. The presentation will cover critical aspects such as host name validation, certificate chain validation, certificate/public key pinning and even the use of custom cr

Track 1
10:30
45min
The Hidden War: Navigating the Threats of Corporate Espionage
Kitso Moema

Explore the hidden world of corporate and industrial espionage, where adversaries aim to steal trade secrets and intellectual property for competitive advantage. This presentation delves deep into the legalities, impacts, and methodologies of espionage activities, including the darker aspects, shedding light on the complex landscape while unraveling the mechanisms employed behind these covert operations.

Track 2
11:15
11:15
5min
Break
Track 1
11:15
5min
Break
Track 2
11:20
11:20
45min
Doppelgänger Devices: Investigating Fake iPhones & Security Implications
Ansie Brough

In this presentation, I delve into the world of counterfeit iPhones, examining their security risks and offering practical methods for distinguishing fake devices. Through thorough forensic analysis and penetration testing, I aim to uncover vulnerabilities and provide strategies to enhance user security. Join me as we explore the implications of doppelgänger devices and how to navigate the counterfeit landscape in today's digital world.

Track 1
11:20
45min
The evolution/revolution of Cryptography and Quantum Computing in Cyber Security
Ivan Burke, Sa'ad Kari, Vimilan Naiker

In this talk we provide a brief introduction to common cryptographic algorithms and weaknesses within their implementation. We show how quantum computing trivializes the exploitation of these weaknesses and how modern quantum resistant cryptographic algorithms seek to overcome these issues.

Track 2
12:05
12:05
5min
Break
Track 1
12:05
5min
Break
Track 2
12:10
12:10
45min
Certpinning, OpenSSL and Memory Patching. Sounds fun right?
Isak van der Walt

This is a technical and theoretical talk on an alternative approach to bypassing certificate pinning by using Frida to change values in memory. It will cover my research on certificate pinning over the last few months, mainly within an Android mobile context.

Track 1
12:10
45min
Reverse-Shell Fallacy: An introduction into defence evasion techniques
Gerhard Botha

The session will go over different techniques to bypass different types of defences you may encounter during engagements. We'll also do a brief discussion about the architecture, design, and flaws present in these defences, and why a successful reverse shell isn't always a measurement of success.

Track 2
12:55
12:55
50min
Lunch
Track 1
12:55
50min
Lunch
Track 2
13:45
13:45
45min
AV Evasion - How Adversaries Aim to Bypass Antivirus Tools
Marvin Ngoma

Malicious actors continually refine their techniques to evade detection by antivirus (AV) software. In this session, we will delve into the sophisticated methods cybercriminals use to circumvent traditional AV defenses, showcasing the ongoing battle between attackers and defenders. This talk aims to provide a detailed understanding of contemporary AV evasion tactics and practical strategies for strengthening security postures against these advanced threats.

Track 2
13:45
15min
The CISO's Field Guide to GenAI
Samresh Ramjith

The aim of the talk is to equip cybersecurity practitioners with a comprehensive understanding of GenAI, its impacts on business and suggest strategies on securing GenAI for use in the enterprise.

Track 1
14:00
14:00
15min
I've seen you get hacked! (AI Real-Time Attack Simulation)
nithen

Imagine running multiple threat models, attack trees and graphs – simultaneously - on real-time asset cartography, vulnerability data and threat intelligence. Leveraging AI for predictive analytics, you could proactively defend regardless of the dynamics and turbulence presented in the emerging technology, attacker or vulnerability landscape. This is how we did it - and what we learnt.

Track 1
14:15
14:15
15min
Is ChatGPT a friend of foe to CTF competitions?
Heloise Meyer

Capture the Flag (CTF) events have become a popular format for ethical hacking competitions, offering participants invaluable opportunities to practice and hone their cybersecurity skills. With the release of ChatGPT, an artificial intelligence (AI)-based chatbot, the question now is: Can ChatGPT solve CTF challenges?

Track 1
14:30
14:30
10min
Break
Track 1
14:30
10min
Break
Track 2
14:40
14:40
15min
BlindSQLi falls on deaf ears
Rohan Dayaram

Explore the journey of discovering a blind SQL injection flaw, uncovering unforeseen access to sensitive data, and navigating the implications for cybersecurity practices. Gain insights into identifying, exploiting, and preventing such vulnerabilities.

Track 2
14:40
45min
Cybersecurity in the Boardroom: From Risk to Strategic Advantage
Sandika Daya

Cybersecurity is no longer just an IT concern; it's a critical business issue demanding boardroom attention. This talk dives into the evolving threat landscape and its potential impact on an organization's reputation, finances, and operations.

Track 1
14:55
14:55
15min
Your Own Worst Enemy - Beating Imposter Syndrome
Roberto Arico

A lightning talk about Imposter Syndrome, and some techniques to overcome it.

Track 2
15:25
15:25
15min
Tea Break
Track 1
15:25
15min
Tea Break
Track 2
15:40
15:40
45min
Developing a cybersecurity framework for commercial banks in South Africa
Tlhologelo Mphahlele

The study proposed a conceptual framework for South African commercial banks as a direct response to the exponential rise of cyber-attacks and threats. It proposed this framework by identifying the factors impeding commercial banks from developing their own frameworks. The factors were identified using a mixed methods approach, with qualitative data collection facilitated through interviews and quantitative data collected by means of a survey distributed to IT, risk, compliance, and governance.

Track 2
15:40
45min
Hacking The Airwaves!
Robin Roodt

This talk will dive into the world of hacking wireless communication, focusing on the automotive industry, access control, and IoT communications. We will jump into the mind of how attackers view wireless communication and explore various attack vectors that could allow them to unlock your car and drive away or bypass your office access control to gain access to sensitive areas such as the server room.

Track 1
16:25
16:25
5min
Break
Track 1
16:25
5min
Break
Track 2
16:30
16:30
45min
From Overheating to Overachieving: A Comedic Tale of Hacking My Car
Rudi Grobler

Embark on a humorous and enlightening journey into the world of car hacking in this developer-focused conference talk. As my trusty old car overheated and befuddled multiple repair shops, I decided to take matters into my own hands. Armed with an OBD connector, I ventured to uncover the secrets hidden within my vehicle's systems.

In this presentation, I'll guide you through the process of reverse engineering, offering a brief Electronics 101 for beginners. Discover how I used Arduino to decode

Track 1
17:15
17:15
30min
Closing

Closing ceremony of BSides Joburg by organizing team

Track 1