DTS Solution presents at BalCcon 2015 – Novi Sad, Serbia

Balkan Computer Congress is an international hacker conference organized by LUGoNS – Linux Users Group of Novi Sad, Serbia and Wau Holland Foundation from Hamburg and Berlin. In the third conference edition that took place in Serbia, our very own Shah Sheikh (Sr. Security Consultant) and Mohamed Bedewi (Sr. Penetration Testing Consultant) from DTS Solution independently presented in the conference.

BalCCon Y2K15 brought together hackers, hacktivists and computer enthusiasts from the region and were joined by fellow hackers from all over the world. The event emphasized the role of hacking as a means of peaceful cooperation and international understanding. The program consisted of numerous presentations, workshops and lectures about information, privacy, technology, programming, free software and socio-political issues. One part of the congress was dedicated to hacking, project and hacks.

Mohamed Bedewi (Sr. Penetration Testing Consultant) presented "attacking the unknown".

Anonymization techniques are a double-edged sword invention as they can be used by journalists to communicate more safely with whistle blowers or by malicious users to commit cyber-crimes without getting caught but the problem is that neither party is anonymous nor safe from being exposed. In the presentation Mohamed discussed a tool that he developed "dynamicDetect" to de-anonymize TOR clients and browsers and abstracting the user's original IP address and fingerprint. The tool then uses this information as a launchpad to perform defensive and offensive against that TOR user.

Shah Sheikh (Sr. Security Consultant) presented "Building a Cyber Security Operations Center for SCADA/ICS".

Modern day cyber threats are ever increasing in sophistication and evasiveness against Process Control Networks. Organizations in the industry are facing a constant challenge to adopt modern techniques to proactively monitor the security posture within the SCADA infrastructure whilst keeping cyber attackers and threat actors at bay. In this presentation the fundamental building blocks of building a SCADA cyber security operations center with key responsibilities such as Incident Response Management, Vulnerability and Patch Management, Secure-by-design Architecture, Security Logging and Monitoring and how such security domains drive accountability and act as a line of authority across the PCN was covered.

Mohamed Bedewi - Attacking the Unknown

Shah Sheikh - Building a Cyber SOC for SCADA/ICS