ZeroNights 2017: back to the cyber 80s

Last Friday, 17th of November, I attended the ZeroNights 2017 conference in Moscow. And it was pretty awesome. Thanks to the organizers! Here I would like to share some of my impressions.

my photo ZeroNights 2017

First of all, I want to say that two main Moscow events for information security practitioners, PHDays and ZeroNights, provide an excellent opportunity to meet all of the colleagues at once and to synchronize current views on important information security issues, including, of course, Vulnerability Management, the most relevant for me. My opinion is that this year’s behind-the-scene conversations were especially good. And this is the most valuable characteristic for the event.

Every ZeroNights event has it’s own style. This time it was some geeky cyber retro from 1980s, like in popular cult movie Kung Fury. The place was also changed from familiar Cosmos Hotel  to ZIL Culture Centre. It is the largest Palace of Culture from the Soviet Moscow times. The combination of US 80s cultural artifacts, RETROWAVE music with Soviet-style interiors (including, for example, statue of Lenin) made a pretty weird combination, but I liked it =)

I was unintentionally taking photos using some strange mode in camera and recorded a very short video fragment (3-5 seconds) for each photo. I decided to combine this fragments in a small video. This does not make much sense, but, perhaps, someone will find this “time-lapse” interesting 😉

Among the great presentations and workshops, there were also a small exhibition. This year there was two Vulnerability Management vendors: Beyond Security and Qualys.

Beyond Security, however, mainly promoted theirs SecuriTeam program at ZeroNights and not the AVDS VM solution.

Beyond Security ZeroNights

The idea of SecuriTeam is that a security researcher can find a vulnerability in some software product and sell it to Beyond Security. Beyond Security is acting as middleman: collects the vulnerabilities and passes them to the software vendors.

Beyond Security ZeroNights AVDSBeyond Security ZeroNights aboutBeyond Security ZeroNights SecuriTeam

As I understand this can be useful for the researches, who don’t want to contact with vendors directly. Because there is always a risk that a requests of bounty will be potentially perceived as kind of blackmailing.

I missed Qualys Security Conference this year. So, at ZeroNights I’ve heard news that FIM and IOC (I mentioned IOC data in “Vulnerability Management vendors and massive Malware attacks“) modes are not in beta any more and soon Qualys will have patching capabilities via Qualys Cloud Agents. Vulnerability Assessment and Patching in one solution, isn’t this great? =)

Qualys ZeroNights

I spent only one day at ZeroNights and have seen only a part of Defensive Track. Here are TOP 3 reports, which I liked the most:

  1. Kheirkhabarov from Kaspersky Lab SOCHunting for Credentials Dumping in Windows Environment“. Very useful materials on retrieving passwords from memory (mimikatz and so on). It seems that Teymur really knows how to detect the usage of such utilities. I am really looking forward to study this slides carefully when they will be publicly available. Download slides here.
    Kaspersky Memory Passwords
  2. Eldar Zaitov, Andrey Abakumov from Yandex “Automation of Web Application Scanning With Burp Suite“. Guys from Yandex finally abandoned w3af and now write plug-ins for Burp and commit them to opensource. The most interesting slide was about the limitations of Burp. Download slides here.
    Yandex Burp Limitations
  3. Andrey Kovalev from Yandex Browser team “How to Implement SDL and Not Turn Grey“. I liked the criticism of SAST and the detailed description of the assessment stages. Download slides here.
    Yandex Browser SDL

Once again, a great conference. Thanks to the organizers! I hope to visit ZeroNights next year. 😉

2 thoughts on “ZeroNights 2017: back to the cyber 80s

  1. Pingback: CyberCentral Summit 2018 in Prague | Alexander V. Leonov

  2. Pingback: U.S. sanctions against Russian cybersecurity companies | Alexander V. Leonov

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.