working gif

Live Stream (best effort): https://www.twitch.tv/bsidesslc


Join us for Bsides Redrocks Saturday, December 9th!

Gardner Student Center at Utah Tech University

1037 E 100 S, St George, UT 84770


Laptop! If possible, bring a laptop to make participating in hands-on events a breeze!


BSides Redrocks is a non-profit, 501(c)(3) run, conference focused on cybersecurity. At this conference you can expect to meet & network with industry experts, many of whom are located throughout Utah.


Our goal is to provide a platform for the community to come together and share ideas, insights, and knowledge. We want to help grow the cybersecurity community in Utah and provide a place for people to learn and grow.


CONTESTS

Capture the Flag (CTF)

Sign Up Now! https://ctf.bsidesredrocks.org/

For Help, See Discord Channel: #ctf


Prizes for the Winning Team and Top Individuals!


1st place individual: Switch Light

2nd place individual: Apple AirPods

3rd place individual: $100 Apple gift card

Top Team: 5x $25 Apple gift cards


Participant(s) must be phyiscally present at the closing ceremonies to win prize(s).


MAPS

Gardner Student Center at Utah Tech University - Campus Map


SCHEDULE

9:00 AM - Registration Begins




Sessions - GRAND BALLROOM

10:00 AM thru 10:25 AM - Opening Ceremonies

Bryce Kunz // TweekFawkes




10:30 AM thru 10:55 AM - Solving the People Problems in Your VMDR Program

Jesse Harris

VMDR programs need more than technology. Hear some real-world lessons and good advice on getting the people behind them on board across your organization. You'll be burning down those vulns in no time!




11:00 AM thru 11:25 AM - Table Top Exercises - (probably) not as boring as you think*

Zodiak - (Matt Lorimer)

Come to this high level presentation to learn how to have fun while perfecting your incident response plan. Table top exercises can help you survive the cybersecurity incidents you encounter. In this session you will learn about formal and informal table top exercises, how to choose which is best for your situation, and how to make them effective.

Presentation is applicable to all technical and management levels.




11:30 AM thru 12:25 PM - I Thought I Was Secure... Until I Wasn't

Brandon Benson

An overview of what happens when you don't follow best security guidelines or guidance. Examples of exposure from untrusted software (video cameras) Examples of what happens when you allow your computer on internet with out a password, and examples of what happens when you only use default creds. In addition we'll play with social media and how to do photo matching online.




12:30 PM thru 1:25 PM - PKI Unleashed: Navigating the Digital Trust Labyrinth in Modern Enterprises

Kenyon Abbott

The digital realm is rife with unseen pathways and hidden pitfalls, at the center of which lies the complex maze of Public Key Infrastructure (PKI). This session delves into the intricate world of PKI, demystifying its mechanisms and highlighting its significance in ensuring trust within an untrusted network. Attendees will embark on a comprehensive journey, unraveling the components and operations of PKI, from digital certificates to cryptographic algorithms and trust models. By session's end, participants will have gained a clear understanding of PKI's pivotal role in enterprise security, the challenges faced in its implementation, and best practices for its management. So, why join us? Because in the rapidly evolving landscape of cybersecurity, mastering the art of navigating the PKI labyrinth is not just advantageous—it's essential. Equip yourself with the knowledge to forge ahead confidently and securely in the digital domain.




1:30 PM thru 2:00 PM- Break




2:00 PM thru 2:25 PM- From Red to Blue: Security Strategies in Azure

Anthony Hendricks




2:30 PM thru 2:55 PM - A Day in the Life of a Security Analyst

Josh Boyles

This session talks about what a blue-teamer does on a typical day. Highlights include vulnerability management, responding to alerts, creating documentation, interfacing and providing expertise to other teams, post-mortems and PRACTICING YOUR IRP OVER AND OVER UNTIL IT’S SECOND NATURE.




3:00 PM thru 3:25 PM- Retro Reboot: Modding's Role in Preserving Gaming History

Tyler Steiner




3:30 PM - Closing Ceremonies

Bryce Kunz // TweekFawkes




Workshops - CONFERENCE ROOM C




10:30 AM thru 1:25 PM - Absolute Beginner's Introduction to Basic Malware Analysis

Jay Stevenson

This is a workshop to familiarize people with concepts and techniques regarding basic malware analysis.

Generally geared toward people with some IT experience but NO prior knowledge of malware analysis or cyber-threat intelligence, this workshop can give you enough information to explore the field further on your own.

If you are an IT employee who has ever been asked "does this attachment look safe?" or are an IT student who would like to expand your knowledge into the InfoSec branch of the field, this is a workshop may be useful.

Attendees will be provided three virtual machines in VirtualBox format. You will need to bring a laptop capable of running all three VMs at the same time (about 6 to 8 gigs of VM RAM). You will want to import the VMs, test them, and snapshot them before the workshop.

!!! - Course Prep - !!!

Download and import these 3 virtualbox VMS.

During the import, make sure you choose to "Include all network adapter mac addresses."

Analysis VM: https://drive.google.com/file/d/18PrZPTSkGFLJRKOcLXk3pk3OooMBfQi9/view?usp=drive_link
Malware Sandbox VM: https://drive.google.com/file/d/1iasJvEM77eHccV5yDKAQhJ7wwrT8h0NW/view?usp=drive_link
Router VM: https://drive.google.com/file/d/15FLVioAJTZkJb5WYcJmIk-eW0cv4Aqdp/view?usp=drive_link

After importing, boot them up, make sure they all work, can ping each other:
sandbox 192.168.99.100 user: timmy timmy123
analysis 192.168.99.10 user: analyst analyst123
router 192.168.99.1 user: root opnsense123

Shut them down, snapshot them so you don't have to re-import them when we mess them up.




2:00 PM thru 2:55 PM - Resume Review Session: Optimizing Your Cybersecurity Career Path

Brandon Benson

Tips and tricks for helping create resumes that get noticed. Review good and bad examples of resumes and answer questions/review resumes of students to give feedback




Workshops - CONFERENCE ROOM B


10:30 AM thru 1:30 PM - Red Team Community

Mike Weaver

This is the spot where you can develop your hacking skills. Our goal is to provide a fun and educational environment where you can both learn how hacking works and test your abilities in a realistic environment. Whether you are a beginner or an expert hacker, there are opportunities for you to learn new things and challenge yourself.

The majority of the content will be geared for new beginners to the Red Team world.

!!! - You'll want to bring your own laptop - !!!


Bio: Mike Weaver is a board member of DC801/801Labs, a hackerspace community that fosters learning and collaboration in technology and security fields. He is currently working as a security incident responder at Adobe and has over eight years of experience in information security analysis, threat detection, and incident response. In his spare time, he enjoys building his own home lab 🖥️, riding horses 🐎 with his wife, and playing video games 🎮 with the kids. You can find him every Thursday at the 801Labs hackerspace in SLC.




2:00 AM thru 3:30 PM - Architecting a 3 tier application in your HomeLab...on the cheap (free)!

klipper (Shaun Price) & compukidmike (Michael Whiteley)

All too often, we get into the habit of spinning up a solution and just doing a port forward or NAT to it; thus making the security of our internal network dependent on third-party applications / solutions / that we spin up for testing. In this session, we will properly segment those applications into the appropriate trust zones, and expose only an endpoint in our DMZ. We can even go a step further, and only expose it via Argo tunnels behind strong authentication.

This session will be a working session where participants will build:

A Load Balancer / Reverse Proxy
One of their favorite web-based solutions (I'll have some ready if they don't have one first-hand)
The proper firewall rules to allow for segmentation
Protection for the application with a WAF
Strong Auth (if desired)

And we will do it for absolutely no cost whatsoever using a mixture of Open Source solutions, generous 'free' tiers, and some luck. (Live Demos abound!)

Bring a laptop if you'd like to follow along. I'll have some spare compute / storage for you to use if you'd like to build it along with me.

Note: Schedule is tentative and subject to change.





Code Of Conduct

The core of our Code of Conduct is “Be Excellent to Each Other”. We will remove anyone from the event who is not in compliance with our Code of Conduct.

We expect all participants to support our Code of Conduct. Everyone at the event is a participant, including but not limited to sponsors, speakers, event organizers, staff, and volunteers. We assume that the majority of people are intelligent and intended to do well, but this event will be a safe and productive environment for everyone. To that end, we will spell out the behaviors and/or actions we support and do not support at the event.

We invite you to help us make the BSidesSLC event a place that is welcoming and respectful to all participants, regardless of race, gender, gender identity and expression, age, sexual orientation, disability, physical appearance, national origin, ethnicity, political affiliation, or religion. We desire for everyone to be able to focus on the event, network with other participants, and build up of our community, hence we will not tolerate harassment of participants in any form or fashion, including but not limited to online or in person.

We have no tolerance for physical, verbal, sexual harassment or offensive behavior of any kind.

Examples of harassment include:
sexualized images in public spaces,
verbal threats or demands, offensive comments,
intimidation, stalking, slights and negative messages,
harassing photography, harassing recording,
unwelcome physical contact, unwelcome sexual attention, and/or
sustained disruption of sessions or events.
Harassment also includes both intentional and unintended offenses.
Our code of conduct extends to conference-related social events at off-site locations, and in related online communities and social media.
If you are not sure, ask, or err on the side of basic decency and common courtesy.

Participants asked to stop any harassing behavior are expected to comply immediately. Conference participants violating this Code of Conduct will be expelled from the event without a refund, and/or banned from future events, at the discretion of the BSidesSLC staff.

Please bring any concerns to the immediate attention of the event staff. You may also email help@bsidesslc.org with any concerns. We thank our participants for your help in keeping the event welcoming, respectful, and friendly to all.

*Staff reserves the right to determine what constitutes compliance with this Code of Conduct.
*Staff reserves the right to remove anyone from the event for any reason without a refund.