BSidesSF 2019 has ended
Back To Schedule
Sunday, March 3 • 1:30pm - 2:00pm
Twist & Shout: Ferris Bueller's Guide to Abuse Domain Permutations

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Feedback form is now closed.
Internet scammers move pretty fast. If you don't stop and look around once in a while, you could miss it. Just as Ferris Bueller always had another trick up his sleeve to dupe Principal Rooney, attackers are employing homoglyphs, subdomain attacks, typo-squats, bit-squats, and similar attacks to trick internet denizens with fraudulent websites. Adversaries may register domains permutations in order to commit fraud, distribute malware, redirect traffic, steal credentials, or for corporate espionage. We know these threats have been around for a while, but not many defenders adopt proactive technical controls in their social engineering incident response plans.

The question isn't what are we going to do about it. The question is what aren't we going to do. With the capability to continuously monitor domain permutations for new HTTP, HTTPS, or SMTP services in real-time, the blue team doesn’t have to trust domain permutations any further than they can throw them.

In this talk, we will demonstrate red team and blue team techniques. For Buellers, demonstrations include ways to leverage domain permutations in adversary simulations. For Rooneys, we will detail how to better prepare, identify, contain, and eradicate threats that utilize domain permutations. If you’re not leveraging our recommended technical controls to defeat attackers, you risk fishing for your wallet in a yard full of rage-fueled Rottweilers.

avatar for Kelly Albrink

Kelly Albrink

Kelly Albrink is a Security Analyst at Bishop Fox where she specializes in network penetration testing, social engineering, and hardware/embedded security. Kelly has presented at a number of Bay Area events including DeadDrop, Day of Shecurity, and OktaRex. She is a recipient of the... Read More →
avatar for Rob Ragan

Rob Ragan

Partner, Bishop Fox
Rob Ragan is a Principal Researcher with 15+ years experience in penetration testing, red teaming, and offensive security. These days he's mostly interested in innovative techniques to to map out the domains, subdomains, exposed services, and vulnerabilities of large and complex... Read More →

Sunday March 3, 2019 1:30pm - 2:00pm PST
Theater 15 (overflow in #11)