Security Mar 1, 2019

A Hacker Walks Into A Co-Working Space | Rahul Binjve (@c0dist)

Talk Abstract: Co-working spaces have become very popular in recent times as they provide valuable service to new entrepreneurs. But, as is the case in the real world, security takes a backseat over convenience. Speaker shared how he could have taken over various systems such as unpatched network devices, visitor/entry management systems, surveillance cameras, databases, desktops and source code belonging to various startups present in the co-working spaces. This talk is a case study of assessing the state of security of the co-working spaces.

About Presenter: Rahul (c0dist) currently works as Principal Threat Researcher in a threat intelligence firm, with a keen interest in information security, automation, human behavior and everything else related to computers. He has specialization in Python/Bash automation for various tasks such as pen-testing, IOCs/OSINT collection, honeypots deployment, web scraping, threat intelligence collection, and APIs integration. Rahul has previously interned with The Honeynet Project under the Google’s Summer of Code program. He has co-authored / contributed to multiple open-source security projects like SHIVA spam honeypot, Detux Linux sandbox, Android Tamer, HoneySpot, etc. Last year, Rahul presented and taken a workshop in c0c0n X and BSides Delhi. In his free time, Rahul likes to play CTF (Top 30 finalist in Nullcon’s HackIM CTF), find flaws in things (CVE-2016- 8856 Foxit Reader LPE) and go on long solo trips on his KTM Duke.

#Hacking #Security #CoWorkingSpace

Follow nullcon on Facebook: https://www.facebook.com/nullcon Twitter: https://twitter.com/nullcon Website: https://nullcon.net