The NOC, as it's called, is a dark room only lit by screens and a spotlight that looks like Batman's Bat signal on the wall. It's a silhouette of a man in a trenchcoat and a black hat, the conference's official symbol. In one corner is a goofy but terrifying device called a Wi-Fi cactus, that looks like a glowing tree with spiky antennas coming out. Theoretically, it can scan for thousands of connections, but these hackers mostly use it as an amusing prop. Neil Wyler, better know as "Grifter," helps run the center. He's in charge of making sure everything runs smoothly. With about 16,000 people attending Black Hat this year, it's definitely been a challenge.
Wyler, who works for RSA but was volunteering at the NOC, says the first day of Black Hat briefings was the toughest of the week, "We have people who come onsite who are specifically looking to hack the hackers," Wyler said, The first attack attempt came in just four best iphone xr cases online - silicone case minutes after Black Hat had opened, Wyler's team also found several home-made hacking devices hidden around the convention center, By the end of Black Hat, the team had tracked half a million devices connecting to conference's wireless network, There were more than 300,000 visits to unsafe websites during Black Hat, Wyler said..
Some of the more inventive hackers attached wireless hotspots to drones that they flew within range of the conference, according to RSA Security. Grifter and his team found 10 such drones. One of several scanners Pwnie Express had around the convention floor during Black Hat. Pwnie Express, another company helping protect Black Hat's network, set up sensors around the convention, to monitor for any malware on incoming traffic. If there was any, Aaron Kless, the company's director of project management, said Pwnie Express could shut down the attacker remotely.
Surprisingly, both Kless and Grifter opted not to use the Wi-Fi they were tasked with protecting, That's because they find cellular networks to be more secure, "The barrier to hacking 4G is much higher," Grifter said, referring to cellular data connections, So I stuck to his advice and stayed on my cellular connection best iphone xr cases online - silicone case as well, despite its slower speeds, It's a small sacrifice for security, Thankfully, I managed to leave Las Vegas without being labeled a sheep, Who hacks the hackers? An inside look at hunting for insecure connections at the largest cybersecurity gathering in the world..
It's worse than the Wall of Shame. It's the Wall of Sheep. You're going to get hacked at Black Hat or Defcon, two of the largest hacker conventions in the world, if your device is insecure. And every year, hackers, security researchers and incognito federal agents attending the events, which run back to back, turn Las Vegas into a petri dish of cyberattacks. No phone, laptop or ATM is safe. Be respectful, keep it civil and stay on topic. We delete comments that violate our policy, which we encourage you to read. Discussion threads can be closed at any time at our discretion.