Files

804 lines
42 KiB
Plaintext
Raw Permalink Normal View History

Episode: 420
Title: HPR0420: Defcon 17 Interview
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0420/hpr0420.mp3
Transcribed: 2025-10-07 20:13:44
---
what
Hello and welcome podcast listeners to another episode brought to you by Hacker Public
Radio.
I'm your host for today, Phoenix.
Well, I'm very lucky to be joined, not just by one guest, but by two, previous HPR
or interviewees, Christon Riley, who I personally interviewed myself for episode 315, and Frank
Brayjack, who fellow HPR hosts can fall in interviewed for episode 298.
Welcome guys.
Firstly, Frank, I'm sure I pronounce your surname, they're wrong.
How do you pronounce it again?
Is it Bray?
Frank Braydeck.
As HPR listeners know, the who have heard me interview people before, I'm absolutely
terrible at surname, so I do apologize.
Could I...
Could I...
I'm sure you're the only one mumbling it.
So I'm quite used to it.
So it's okay.
I'll just say Frank and I'll listen to you.
Don't worry.
That was my plan from now on in which it'll be Frank, maybe even Franky from time to time.
Firstly, could I ask you to introduce yourself to the HPR role?
Please, I'll start with you, Chris.
Well, yeah, my name's Chris Riley.
I work for a bank in Austria as an IT security analyst and penetration tester.
I was lucky enough to go over to the Black Hat Defcon events with a nice shiny press pass.
They let me go without paying and get into all the backstage areas and talk to the speakers.
So I thought it would be a good chance to come on and have a quick chat with you about what we saw and what the event was like.
And Frank, please introduce yourself to the HPR audience.
Yeah.
Well, let's head on from Greta.
I could work for Schubert Phillips as a security engineer.
I'm also the author of an open source program called Thornnesses, which was covered in the HPR podcast with Ken.
And I was lucky enough that my boss paid my make tickets to and entrance to Black Hat Defcon.
I picked up with Chris who I've met through Hacker Public Radio, interestingly enough.
There was a link between the two podcasts and yeah, we decided to hook up in Vegas and see what we could do.
Brilliant.
Well, just to give the HPR audience a quick idea about what we've got planned today is I've asked both Chris and Frank to jump on the line with us.
And just to kind of talk about a Hacker event that ethical hackers around the world will know as Defcon.
Defcon 17 was held in Vegas this year.
And as both the guests have already said that they both attended the event.
So what I've asked them to do is just come back and share what they found out for us for you guys.
So I suppose my first question is, you know, how would you describe Defcon to someone from the HPR audience?
Well, it's important to kind of tell the difference.
There was two conferences that went back to back.
There's Black Hat followed directly afterwards by Defcon.
The two events are kind of like polar opposites of each other.
You've got the first two day event, which is Black Hat, which is slightly more of a corporate event.
You get the people who come there from various different vendors around the world.
You know, they talk, they sit down in suits and talk about security issues.
Not quite as bad as it sounds.
I mean, there's a lot of very technical stuff going on at a Black Hat.
You have to sit down, meals and things like that.
And as soon as Black Hat finishes and winds up, the next day, Defcon Darts,
which is 10,000 people in jeans and Black T-shirts running around causing absolute mayhem.
And, you know, looking at very, very technical presentations.
As Chris said, it was the corporate conference.
But I think it's the most technical and most cutting edge, great groundbreaking conference in security.
There is, whereas the other ones, for instance, an RSA conference,
are more formal, far more, yeah, defense, compliance, that sort of thing.
It's really about how do we break stuff?
I mean, my feeling about Defcon really is that it kind of shows.
I mean, I've got to be honest with you.
I've never been in that.
I hope to get one Monday.
But my kind of feeling for Defcon is it's kind of like all the hackers go for a trip to Vegas.
And a conference broke out while they were there.
And from what you feel back, I mean, I know a lot of people put a lot of hard work into it.
It's like a chance for hackers to show other hackers the stuff that they found.
You know, that is to find an audience that's really interested in how this is broken,
or how we fix this, or how this is wrong.
Do you think I'm kind of fair in thinking that?
I mean, it really is kind of like the high point of the calendar for the year.
For people who work in IT, people who work in penetration testing,
or even the defense side, they tend to focus their entire year around Defcon
because that's when one of the big research comes out.
That's when all of the things that people have been working on for the last nine to 12 months,
suddenly come out, do a talk on it.
You get kind of like a lull for about a month before Defcon Black Hat,
because people don't want to talk about things until Black Hat hit and Defcon hit.
And then it's just all out mayhem for a couple of months.
Yeah, it's also the chance to, like he said,
it's one of a few chances to actually disclose this information in a legal way
and to show off it in a more legal way than to sit down with somebody
and actually break somebody, break into somebody's system.
Yeah, I mean, I think Defcon has a reputation for being a good place for disclosure.
I mean, each and Defcon that I can remember back to,
there's always been a big discovery announced at Defcon just to, you know,
from DNS issues to, you know, iPhone problems, you know,
is a prime example.
I mean, what was some of the highlights for you at the event at Frank?
Well, you touched on the iPhone one that was a very, very interesting talk,
talk to you, sit and watch also because it was, yeah, all over the news.
But I think the really biggest issues that were around SSL and SSL certificates,
really three talks, disclose vulnerabilities, both,
Moxie Modding Spike, and Dan Kinninski came up with the same exact same vulnerability,
although Dan admitted that Moxie's exploit for it was much better than his own.
Dan, they just seriously highlighted that you can't just say,
okay, if I've got this padlock and my browser doesn't say something's wrong,
I can trust the site.
Yeah, it's always been the case where people have kind of relied on SSL as the security for their website.
They don't care what's going on underneath that because SSL will always protect them.
And, you know, we've been trying to tell people people in the kind of our industry
have been trying to tell the developers, okay, look, SSL is not always going to be there to save you.
This kind of research comes back and says, look, we need to do more in regards to security and defense in depth
and not just rely on SSL to save everyone, which is kind of a good thing.
It's nasty that it's broken and it's not working like we wanted to be,
but it's nice that we actually can look back at this and say, well, that is the reason why we should be doing this better.
It's funny that we're talking about SSL and the iPhone.
There are probably two examples of why hacking conferences and disclosures are a very important thing.
You're talking about two, you know, iPhone as well.
The iPhone's a prime example of two weeks before, as far as the media has reported this,
two weeks before DEF CON, the Apple were told about the iPhone vulnerability and had done nothing
until it became breaking news at DEF CON.
And then all of a sudden within 48 hours of it hitting BBC News 24,
all of a sudden there's a patch available for iTunes to fix the problem.
And with SSL as well, I mean, security certificates, I mean,
it feels like for the past 12 months that's always been banging a drum about that there's problems here,
you know, as big disclosures, you know, we get to a hacking conference.
And, you know, and it's finally when it's almost like, you know,
why hamsters media attention for the other 11 months and three weeks.
You know what I mean?
You know, I miss this way.
I think these conferences are very good in that way.
It gives a podium for developers and hackers to be able to discuss issues in a probably broader context
with other people in the industry who probably may be appreciate the issues
slightly, you know, probably appreciate the issues that have been found a lot more
fuller than maybe accounts and so on and so forth.
I just have a very funny that, you know, the first two that we talk about are two that,
you know, I've been disclosed to the company prior to them being spoken to a hacking event.
I do have to correct you a little bit there.
I mean, Apple released the patch the day after the presentation in Black Hat,
because the first presentation.
Yeah, Frank, I mean, the BBC reported saying that actually the guys had spoken to the iPhone guys,
you know, two weeks before Daphne with regards to this.
Yeah.
Yeah, but these problems are not easy to fix.
I mean, it's not like they just have to turn around and just flick one bit.
It was, it was a fundamental issue with the iPhone.
There were, it's not just an iPhone-related issue.
They also attacked other SMS.
Yeah, I appreciate it.
I'm not saying that this is an easy fix.
I'm just saying that once, you know, if it hadn't been disclosed that Daphne
would have been such an imperative to get it fixed or fast.
Do you know what I mean?
And it's the disclosure aspect of it, that the point that I'm trying to raise.
Oh, yeah.
I mean, sometimes, sometimes without the disclosure, people don't do anything.
I mean, the perfect example is the, the Chaos Computer Congress last year,
where there was a demonstration on, you know, finally killing MD5
as a hashing algorithm, where they took 200 PlayStation 3s and created a false CA certificate.
And there was a lot of things that fell into place to make them do that.
But it was the final nail in the coffin of MD5,
and people have been saying for the last three to four years,
at least that MD5 is dead, please stop using it.
And it wasn't until that presentation that all of the CAs that were still using it
to have been said, okay, we won't use this anymore.
And it wasn't until that day where they said, okay, we've seen the presentation now.
Now we finally believe you can break it.
Now we're not going to use it anymore.
And it was one of those things where they've been told for years
and they just needed that proof before they were actually doing anything about it.
Just pressing.
Which is also part of Marlin, or of Moxie's talk,
about SSL, he said last year I did a presentation,
and then Microsoft came out and said, no, this is not an issue
because there's that, that and that.
So to prove that it was indeed an issue,
we created a fake Microsoft.com certificate.
And a sign in.line.com certificate.
And all of a sudden, the issue gets fixed in Microsoft products.
So it isn't, it isn't incentive for people to go and fix stuff.
On the other hand, you have to realize that there's disclosing
and there's disclosing.
There was a subtle but distinct difference between, for instance,
the iPhone talk and other talks,
which were about to take a, take an example,
USB attacks, to take the opposite end of the spectrum,
is it was this researcher of El Dominguez,
who was saying, well, yes, I have this exploitable function.
And he was the kernel driver in Linux.
I put my customized USB stick in it.
I own your computer, but I cannot disclose
where the actual vulnerability is.
Whereas if you looked at the iPhone presentation,
they literally have the SMSes they used
to do the compromise written on the bottom of the slides.
So anybody paying attention could piece the bits together.
We're kind of bunching some things together,
because it's very easy for us to kind of group together
the iPhone vulnerabilities that were talked about,
because there's more than one.
There was a discussion on the SMS, which was primary aimed at the iPhone.
There was also another discussion on SMS, which worked across multiple phones,
which wasn't so much of an exploit.
Yeah, it's basically where you receive an SMS and it fakes itself,
so it looks like a notification from your provider.
So sometimes you can get a notification from your provider that says,
would you like to update your settings? Yes, no.
And your average user is going to go, okay,
my service provider wants me to update my settings.
I'll click yes.
It doesn't look any different than a standard service provider,
but what that can do then is change settings on your phone.
So you can then just receive an SMS and change your proxy settings.
So all of your internet traffic goes through a third party proxy server,
which is obviously a big problem.
For me, the reason why maybe one vulnerability gets picked over another
is straight down to the basic media.
The vulnerability in iPhone sells papers.
Do you know what I mean?
Oh, yeah.
And you're absolutely right here.
Numbers of vulnerabilities discovered, but yeah,
BBC on the main, because it's a catchy title.
And it's a shame because you can see how lawyers get involved in disclosures
when it comes to information against the brand,
rather than against a service or a product itself.
And I think to touch back to what Frank said as well,
I think it's fair to say that I touched with this with Pete Woods
from first base when I interviewed him recently about,
people just don't believe it until they see it with their own eyes.
And I think that's where death on itself is good because it's a chance
for that sort of information to be shared.
I mean, you're right as well, Frank, the big issue as well is disclosure.
I mean, being having gagging orders put on you,
that does happen.
And that's not such a cool thing, but you're right as well.
You have to be responsible about how you disclose that information.
I mean, I don't know how you disclose an SMS vulnerability
without telling everyone in the world in one go,
because that seems to me that that's the only way,
rather than telling small pockets of people.
But you have to let the manufacturers know prior to that as well, I suppose.
Yeah, but the problem is, I mean, who do you tell the manufacturers of phones?
You tell the service providers in every single country?
There's always going to be someone who doesn't pay any attention.
And then when you finally do release it, then only that person is runnable.
So what's fair?
You can't, as an individual and as a security researcher,
make contact with, you know, 5,000 different contacts.
You can only say, well, I can tell you all at once or I can tell none of you.
Oh, I can try and tell you.
And if you don't listen, then I'll just go public with the information.
I mean, there's always issues that death on and back out with lawyers
and things that get pulled at the last minute.
There's only a certain amount of press coverage.
But I mean, prior to the event, all the press coverage was on Barnaby Jack's,
Jackpotting ATMs talk, which got pulled from death comp.
You know, there was a lot of room is going around about that.
And there was also a lot of bad press going around about Chris Gates's Oracle exploits
for MetaSploit, which was completely unfounded.
Everyone was saying he broke Oracle and now he's going public with all the information
and there was going to be chaos.
What he actually did wasn't find the vulnerabilities.
It was purely to make them easier to use during penetration testing,
to be able to prove to people that these vulnerabilities are already there.
And people were saying that he was a bad person for doing it, which I don't agree with at all.
Now that was a really unfair press.
Yeah, it was.
I mean, everyone who I know who went to the presentation thought the presentation was great,
loved the presentation.
I love the functionality and personally as someone who works and tests Oracle,
it's nice for me to be able to test it, exploit these systems and then say,
look, not only do we think these systems are exploitable,
we can now prove that they're exploitable.
Therefore, you must be patching this system.
You must make it better.
And as you said, people sometimes need to be proved to be proved wrong.
You need to be able to shove it in their face and say, look what we did.
And you need to make this better.
And if you can just say, well, we think we might possibly at some point in the future be able to do this,
there's not much incentive for them to fix it.
I think what it is is that people find it hard to visualize when you say,
oh, look, it's vulnerable to this exploit and this exploit and this exploit.
I think people find it hard to see the real life visual aspect of what you're talking about.
You know, oh, it's vulnerable to this sort of this sort of exploit.
Oh, but when's anyone going to do that to us?
And it's not until they see it in front of a screen and go, oh, my God,
someone really could do that very easily against us.
And I think that that's a fantastic, I think it was great that the ethical hacking communities
come to a situation where, you know, it can fill out a Vegas hotel during this stuff
and have tens of thousands of people come from all over the world to come and see this stuff.
You know, it's a great reflection on our industry growing and growing and growing.
You know, in those kind of instances, that's where post exploitation comes in.
Because it's very easy to say you're vulnerable to this exploit and that's it.
But business people don't understand that until you can say,
and by being vulnerable to this exploit,
here's a copy of all of your personal identifiable information for 10,000 clients.
And once you can start doing that, it becomes more of a real issue
because people are those kind of high levels of management don't understand vulnerability.
They don't care if there's one vulnerability or ten vulnerabilities.
What they understand is dollar values.
How much will they lose because of this exploit?
How much could they lose because of this exploit?
I think it's also hard for them to also explain to them as well,
that not all loss is gaced in dollars.
You know, if you lose 10,000 customers records,
you know, even if you don't get fined for it,
even the fact that your customers have lost confidence in you.
Yeah, reputational issues are sometimes more serious than dollar values.
Yeah, I mean, it's easy for us guys to appreciate that,
but maybe not so easy for co-centre managers to get that,
you know, you lose 10,000 people's records.
You know, you're going to have 10,000 people very, very annoyed.
One thing that helps is that there's a regulation now that
tries to prove vulnerability on these people,
and for instance, when you talk about regulation that's been put in place,
that we have made CEOs personally liable for misrepresentation
if they didn't take due care to protect their information.
Yeah, they sort of start to listen,
which was one of the key notes I think I'd like to have.
Actually, if you look at security, security is getting a lot of broad cost time.
We all need to speak C level language.
I think you're absolutely right, Frank.
I think you're absolutely right, Frank.
There's starting to become more accountability.
The problem is, is it's not uniformed from country to country.
There isn't like this global regulator that says,
well, the American industry needs to protect its state,
the same way as the British industry and the British industry,
there is no uniformed control over that country,
upon country, who are saying,
data protection, how you look after information and so on and so forth.
Rome wasn't built in a day, though,
and I think it will take a little while.
But I think more disclosure of the importance of looking after data,
and as data becomes more valuable as well, I suppose.
I mean, moving away to, I think this is more the black hat
for the sort of topic that we're addressing right now.
Although it does actually, it does actually go hand in hand
with the talk that Joe McGraw is going to try forward did,
is it more money, more problems,
where they're actually discussing some of the issues
that the bad guys have,
and it wasn't so much exploiting systems,
because the problems they were talking about
that seemed to be very easy in business logic related issues.
The issues that the bad guys were coming across
is what they're going to do with all the money.
What do you do when you've just stolen $480 million?
What do you do with it?
Where do you put it?
Where do you move it to?
Well, yeah, I mean, they're their presentation.
I mean, they're funny guides,
but the presentation follows on from last year's presentation,
which is get rich or die trying,
and it was a very, very funny presentation.
It didn't have a lot of substance from a tactical point of view,
but from an organizational point of view,
it was hilarious to see the business logic flaws
that just allowed these people to just go in
and either steal money or cost the company money.
I mean, from easy things like
someone managed to brute force a password
or a discount code for Pizza Hut,
which basically reduced the cost of a pizza to nothing.
They then made that public,
and suddenly Pizza Hut lost $70,000 in one day.
So the bad guy didn't make any money,
but he succeeded in making Pizza Hut look like idiots
and making them lose $70,000 in one day,
all because someone at Pizza Hut put the wrong code in
or put the wrong information in
is just the attacks kind of only got more hilarious from that point.
I mean, there was actually some depressing ones as well,
where someone managed to use a system
and use a cross-site scripting failure and a system,
which allowed you to gain a permit
to cut down trees in the rainforest.
And this company falsified a certificate
and then cut down hundreds of millions of dollars worth of trees.
And apparently this vulnerability still exists in the system
because the government don't want to do anything to fix it.
They don't even want to talk about it
or verify that the floor exists.
So I mean, that was more on the blackout side,
but certainly Defcon's more deep technical
than the blackout side.
The blackout side tends to talk more about
defense in depth and less technical.
Am I right in thinking that this year's Defcon was the first one
that you two had been to?
Yeah, the other side.
I mean, it was the first time in the U.S.
I think for both of us, wasn't it, Frank?
Yeah, the first blackout in the U.S.
first Defcon ever been to blackout conferences in Amsterdam
before.
So I kind of know what to expect there.
But yeah, it just turned out to be America.
It was definitely bigger.
Yeah.
Yeah.
What was it like when you first got to Vegas
and saw all the other, you know, saw the event?
Was it, you know, was it overwhelming?
Or was it quiet?
Or was it, you know, what was your initial feeling when you got that?
Because Caesar's Palace, just the casino alone,
it's probably bigger than the town I live in, which is pretty scary.
But I mean, I lived and worked in London for eight years.
So I'm used to huge, great big buildings.
But it was just crazy.
I mean, it was my first time in the U.S.
And everyone said, well, you just got to remember Vegas isn't America.
You know, Vegas is, you know, it's in city.
So the rest of the U.S. isn't like Vegas, which is probably a good thing.
It's not probably, it's definitely a good thing.
So was it like...
The first thing that strikes you when you hit Vegas is the heat.
Oh, yeah.
115 degrees Fahrenheit.
I think for me, when I landed.
And I landed at night.
And it was still so hot that you just couldn't do anything.
And the first thing I needed to do was just get into it somewhere with air conditioning.
I think during the first day we had a 42 degrees centigrade.
Like, sorry, come to the conversion that quick.
Yeah, it's hot.
Yeah.
You know what people say in the West Bank?
I mean, during the event as well was just basically Vegas overrun by kind of security
and hacking professionals.
And then was, you know, everybody go to, is there an ethical hacker there or...
Oh, no.
No, I mean, Vegas is huge.
I mean, the 10,000 people for Defcon that are after and when it's a Defcon is like a drop in the ocean for Vegas.
I was talking to a taxi driver when I was out there.
They have to fill 2 million beds a week.
It's just amazing.
So the 10,000 people for a hacker conference is not a big thing.
I mean, I saw people around who were obviously hackers, you know, Black T-Shirts and jeans.
But you could really see who was a hacker and who wasn't because they were really the pale people in Black T-Shirts
with logos on them that say things like, no, I will not fix your computer.
And there's no place like local host.
Try harder.
Yeah, first you don't succeed, conceal all evidence that you've ever tried.
I shall be replacing you with a small shell script.
Yeah.
Yeah, I mean...
I'll keep that.
Oh, don't get me started on that.
I've recently had a run with someone about that.
That's a whole different subject.
Next podcast.
No, no, I think I'll be put up on...
I think I'll be shot and quoted for...
I just bad day and people not reading man pages.
And I never thought I would ever turn around and I never actually said that.
But it was very close enough.
But what is this?
People read man pages?
Yeah, well, you know, it annoys me when you, you know, you ask a question that's covered in the first sense of a man page.
And it's...
Oh, yeah.
You know, and you say, right, okay, no problems.
Read the man page.
I've read it, and I still don't know how it works.
You quite obviously not read it.
You know what I mean?
You're just telling me, you know, and then did that.
I didn't read it.
I grabbed it.
I couldn't find anything.
I think.
But, yeah.
Kind of off the sidetrack before, really, I'm still getting complaints about my...
my neoliberalism views to reading man pages.
I mean, what was the...
What was the highlight for you at BethCon?
Was it meeting all the other hackers or, you know, kind of...
I'm using hackers in a very general term, and I'm sure you both appreciate that.
Was it a really good opportunity for you to meet other people in the industry
that maybe if you weren't at that sort of event, you wouldn't have met because it's just, you know,
the nature of business, telephone calls and emails rather than face-to-face.
Or was it more...
You know, there wasn't a chance to get a hold of this.
This really, you know, listen to these talks and then the other kind of place.
And, you know, always it just to make sure of all of those things.
You are definitely at a conference like this.
At some point, facing the challenge, okay, do I break off this interesting conversation
and do I go and sit in a talk I really want to see, or...
Yes.
Do I just continue talking to this very interesting guy I've never met before,
or have met before and finally seen for the first time?
It's not enough time for everything.
That's the thing that hits you is when you...
Even when you look at the conference and you realize there's five tracks, six tracks,
I think that there was less tracks at Black Hat and the World Defcon.
But even when you look at the tracks, you realize there's always two or three things
on at once that you want to watch.
So there is no way you can see everything.
That's just the way it is.
And then when you add to that, the fact that there's so many people who you know
through online or through chat rooms or through forums or Twitter or any other resource,
or people that you've made in person you haven't seen since last year
or haven't seen since Black Hat Europe.
And you just want to go off and talk to these people.
But you realize that if you do, you're going to miss a talk.
And there's that decision you have to make is either you're there to go to the talks
or you're there to talk to the people.
Getting that balance is very hard to do.
I always remember being taught when I first started Business Years ago.
When you went to networking events, you really had to make a choice before you went in
where you're networking or not working.
And it sounds like death kind of a lot of ways is about hard choices.
And I don't think it's fair to say that if you're sitting with a guy
that's having an interest in conversation that you're not working.
You know what I mean?
Because there might be broad news.
Oh yeah.
You have to talk to these people.
I know a lot of people through Twitter.
I know a lot of people through Twitter as in I've talked to them online
but I've never met them in person.
So I made a list of people I wanted to meet.
I made the list and I was like, okay, I need to meet these people.
And I met some people who were doing the talks.
I met people like Chris Gates, Carlos Perez, who gave a great talk.
He's known as Dark Operator.
He does quite a lot of the meta split scripts.
And I met him and we went out and we had some food and we had a chat.
And I met all the guys from Paul.com, the guys from Security Justice,
and a further podcast.
And it was really good to meet those guys and talk to them.
And I'm not that depressed that I didn't go to a lot of talks.
Because I know that I can see them again maybe in a month's time.
Maybe I'll see them acting around them in the next week or so when I'm there.
This is a couple of talks from Jason Lee Streets.
And Dan Kaminsky is doing his talk again.
So I can catch those talks at another event or I can just watch them online
when they're available online.
But those people are never going to be in the same place.
Maybe never again or maybe not until next year.
So for me it was more about socializing, getting to know these people up front
and in person.
And knowing when I come back that I'll be able to email them if I have any questions
and they know who I am now, they can email me if I have questions.
And this kind of crap was all about helping each other out.
You know, your deaf con sounds like a really scary place with lots of black cat hackers.
It's not really like that anymore.
I mean, deaf con one or two was lots of people who didn't want to tell you their name
and only went by a handle and they really did go off and hack websites.
And as times come by, people have told me it's got less and less about black cat hackers
and more about people in the security industry who just really want to have fun
and really want to do technical stuff.
I have a question.
I've heard a rumor that at deaf con you see Captain Trunch drunk dancing on a dance floor
guaranteed somewhere in the deaf con event.
Either of you two seeing Captain Trunch drunk dancing on a dance floor?
I saw some scary people dancing.
I saw Richard Mogel take his pants down in the middle of a presentation.
That was a Twitter bet.
Someone posted on Twitter while they were doing a presentation
that if 50 people retweeted that message that he'd have to take his pants down in the middle of the talk.
So immediately on Twitter everybody retweeted it and he had to take his pants down in the talk.
So definitely avoid that one on the video.
It wasn't a good thing, God, but it did have his trousers around his ankles.
But I think also when we went the last day when we ended up in...
I think it was off-ground house.
It's quite fun to be there together with people like Dan Kaminsky who are trying to manage a proper beer.
Yeah, that was hilarious because as I live in Austria, off-Browse is nothing strange to me.
I lived in Munich.
We were all drinking the huge gym beer and no problem at all.
Everyone from America at the end of one was okay, that's enough.
We were ready to just...
Okay, next.
But no, no, no.
It's fine.
We're finished with the evening now.
Time to go home.
So, yeah.
That was a funny evening.
We had Sherry Davidoff and Jonathan Hamm who did the presentation there.
Carlos Perez, Larry Pesci.
Yeah, it was like completely stocked with people who were doing talks.
And lots of famous names all over the place, which is...
It's one of the only places you can go where you can walk down a corridor and you just...
I walk down a corridor with Martin McKay, who does the netsec podcast.
And we met Kevin Mittnik.
So, you know, it's just suddenly in the round in the middle of nowhere we're Kevin Mittnik.
It's one of those things where you just see things you're not going to expect to see.
And it's definitely worth the money.
I paid for it all myself and I don't regret it at all.
I mean, just kind of a torsion to laughing, laughing off and off.
I mean, if you, you know, put a gun to your head now and said,
what was the highlight?
What was the one memory, if you were allowed?
One memory left of the event.
What was your highlight?
From what was the big moment for you at Defcon now?
I think...
I think the Maximilian Spikeworth talk was the best talk there.
I mean, every time he did another slide and he was going like,
well, actually, this is a passcage string and it does take no characters.
And he goes, oh my God, he didn't.
And then the next slide, yes, he did.
This is it.
And he goes and shows the code and says, no, just look at it out of focus.
Then you've got to be a vulnerability.
And you go, oh my God, he's not found something that if I see to be a certain certificate,
my machine gets home.
Well, yes, he did.
And that kept on happening during his talk, while he kept his speedy.
So that was in terms of talks.
That was the best experience.
And then being at the Paul Comparities and the other stuff,
that's sort of a...
But that's not a distinct moment.
That's a vibe that's there.
Well, I was very jealous that you guys were the Paul Comparities.
I mean, I was very jealous that you guys were in Vegas,
but I wasn't incredibly jealous about that as well.
And Chris, what was the crowning moment for you?
Oh, it's hard to tell really.
For me, it all kind of blows into one,
because I've got this horrible head cold, but also because I was spending too long
doing things like going to the Paul Comparities.
I mean, I have to agree, Marlon's...
Moxie, Marlon's bike.
I always get his name wrong, sorry.
His talk was really good.
I only actually caught the end of it.
I liked it when he was talking about the online certificate status protocol.
He was trying to explain how it functioned and how he could bypass it.
And finally, the final slide when he was talking about it was basically
in order to break the whole status protocol,
you just have to return the number three.
And so the next slide was, that's correct.
OCE SP is broken by the number three,
which I thought was the funniest slide I've seen at the whole conference.
But it's true.
It's just some of the things he'd found when he talks about them.
You just think, why didn't I see that before?
Why didn't no one ever notice that parts of it were written in Pascal
and accepted Noel?
And then other parts were written in C,
and Noel was the end of a line.
Of course, it's going to cause problems.
And when he finally talks about it and shows you,
it's like, well, yeah, of course it is.
It just makes it sound so easy and you actually understand it.
And it's in your head and you think,
why didn't no one ever find this before?
And it's just that great feeling where you actually,
you can sit through a technical presentation at the end of it.
You actually understand why it's a bug.
You don't just come out thinking, wow,
that was really technical, that he broke that.
And I have no idea how he did it.
You actually know how he did it and why it works,
which I thought was, yes, it is a good gift.
If someone was going to, say I was going to desk on next year,
what bit of advice would you give me?
What should I do to prepare myself about it?
Obviously, such a big event.
Lots of fluids.
Yeah, lots of fluids.
Some block.
Some block, yeah.
Yeah, definitely. Lots of some block.
It's one of those things that just,
whatever you prepare, when you go to desk on,
it doesn't matter because it will be overwhelming when you get there.
Don't stick too rigidly to your schedule.
In preparation of this pop pass,
I did a re-black on the blog that I posted on.
I think I have this big plan about attending something like,
I don't know something like 50, 60 talks that I wanted to see.
And then, of course, in the news,
Microsoft came out with this package.
I thought, no, I really want to be on the news,
so I'm going to swap this talk for that talk.
And then, at some point, I got stuck talking to somebody
which really enjoyed and was really fun.
I wouldn't have missed it.
But yeah, then you don't want to have regrets
that you didn't see that one talk that you were really intended to.
I mean, it is all, all fluid.
And I guess the other advice is,
the good thing about taking this conference abroad.
Whenever I went to desk on, sorry, blackhead Amsterdam,
it used to be okay.
Conferences over, get my car, go out.
And now that's in Vegas, I, yeah, you don't just go home,
so you stick around and get to socialize.
Oh, yeah.
Yeah, I mean, you have to socialize.
I mean, I know what I've said it before,
but the big thing for me for Defcon was meeting lots and lots of people.
And I went to consider me less talks and fractured.
As you can see by my blog,
I haven't actually mentioned the word Defcon.
He's got discussions of various things that he went to.
But I mean, everyone's got a plan until they get hit.
And my plan was to go to a load of talks.
And as soon as I got there and I realized what Defcon was,
and I saw these people I wanted to talk to,
my plan just went out the window.
I didn't even look at what was being talked about.
If I walked past the room and there was a talk I was interested in,
I'd pop in for five minutes.
If the talk was starting and it was interesting enough,
I'd stay until the end.
And if it wasn't interesting, I'd walk to the next room.
So I've seen half of certain presentations.
Or half of Moxie's talk.
I didn't see any of Dan's talk.
Because 10,000 people were trying to cram into a room big enough for about 2,000.
But as disorganized as it can be, it's just great fun.
There's so much to see.
I mean, we didn't even talk about,
there was a two-capture of the flag events going on.
There's a vendor room where the vendors actually know what they're talking about.
Where you get vendors like Paul.com.
You can buy t-shirts from people like DJ Jackal Open,
the Exotic Library Podcast and things like that.
And there's huge areas where things like all of sheep are going on,
which is hilarious by itself.
And there's lot-making village and a hardware hacking village where you can just go up
and solder chips and practice things.
There's always something to do.
And because there's so much to do,
if you just go to the talks, you're missing out on the other 75% of what's going on at the conference.
So if you just get the schedule and highlight everything you want to see,
then either you're going to not have as much fun as you could.
Or you're just going to get depressed when you get there and realize there's no way you can see that many talks.
So just didn't wrap them up and close to wrap them up.
What, you know, if I gave you one word,
what one word would you use to describe the whole BethCon experience?
Tyring would be my word, I think.
Purely because you just don't stop.
You finish talking to people and partying at three o'clock in the morning,
but then you have to get back up again at seven o'clock in the morning or eight o'clock in the morning
to go and have breakfast so you've got enough energy to do the next day.
So yeah.
Thank God I don't have kids.
I have to take one turn to describe it.
I'll go back to Hitchhiger's guy to the galaxy and describe it as infinite improbability drive.
I was thinking don't panic.
No, don't panic. Mostly harmless. We defend it as well.
Right. Well, I mean, I feel that I could talk to you guys about this for another hour.
And I'm just, obviously, I like to try and keep the shows down to 45 minutes to an hour or so.
So what I'm going to do is I'm going to wrap up.
Is there anything before we finish that either yourself,
of course, or yourself Frank would like to talk about before we wrap up?
Never use an ATM at DefCon.
Or the network.
If you haven't heard the, usually at DefCon, they hack one or more of the ATMs at one or more of the hotels,
just because you're in a different hotel doesn't mean you're safe.
This time, as well as hacking the ATMs, that someone actually brought their own ATM and put it in a corner,
which, although it's like they were possibly stealing money from people with accounts.
And although it got caught pretty quickly, I find incredibly hilarious.
The fact that they brought their own ATM with them is just always makes me laugh.
Frank, anything you'd like to add before we wrap up?
Well, when you said you wanted to talk another hour, I guess maybe next week when we both finished hacking at random,
which is going to start in two hours and this Thursday might be another good opportunity.
I would absolutely love that. I'd really love to pick your two brains again,
especially fresh from another hacking conference.
Consider a date if your two are available without doubt.
Oh, you don't want to fresh from the conference, trust me.
We're camping in the middle of a field.
You're putting an honest shower, Fred.
Fresh isn't the time.
There's probably no fresh from the conference.
Yeah, well, certainly. I'm up for that.
So if you need us, then just send us a message.
We can talk for hours.
What we'll do is we'll organize it once we've finished this up.
All that's left me to do is thank both Frank and Chris for taking the time out
to come and speak to me about this.
I really enjoyed it, and as I said earlier on, I can talk about this for another hour,
and I'm sure the listeners will feel how envious and jealous I am with YouTube
going off and basically living the hackers dream in some ways.
If you guys are just off the top of my head, I can't remember both of your blocks.
Before we wrap up, could you tell the audience where people can find out more information about Autonomous Frank?
Information about Autonomous is on www.autonomous.com and the blog posts that I wrote for
desk on and blackhead are on www.fighter.net.
Okay, okay. And are you both on Twitter?
Yes, yeah, both on Twitter.
And where can they find out and find your blog, Chris?
My blog is www.c22.cc.
I definitely recommend Frank's Cupfighter.net and blog if you want to get some good reviews of DevCon
because he was certainly going to significantly more talks than I was and significantly less hangover than I was as well.
Well, as you say, thanks very much for joining us and all that's left I need to do is thank the HPR listeners for listening to it.
Now, before I go, if you would like to do an episode for HPR, you can do an episode on all sorts of stuff.
But kind of the feeling that I have about HPR is if you're willing to talk about it, we're willing to listen.
So if you are interested in doing a talk for HPR, you can find contact details on the website.
Record an episode, contact a Nigma or Klaatu and they'll let you know about how best to get your episode out.
All that's left for me to do is thank you all once again for listening and I'll catch you again tomorrow on the next HPR episode.
Thank you for listening to HACRA Public Radio.
This is HPR sponsored by Carol.net, so head on over to C-A-R-O dot N-T for all of us here.