Our speakers, panelists, and workshop presenters
- Alex Hogue
- Alex ‘Beardpunish’
- Ben and Tweek
- Christina Palmer
- Craig Rumball
- Grace Nolan
- Huajiang ‘Kevin2600’ Chen
- Jos Weyers
- Lucas Zhao
- Michael Maynard
- Robert ‘Bull’ Winkel
- Ryan and Jeremy
- Silvio Cesare
- Wayne Ronaldson
Alex Hoguea kid with a laptop and a pocketful of memes
Talk Tricking people using magic tricks and pickpocketing
You know magicians? Pickpockets? How do they do it? How do they trick people so consistently? This talk is about using the same techniques a magician or pickpocket would use, but for social engineering and physical security mischief. We’ll exploit the wonky default settings of human brains for the sake of sneaking what you’re doing past people. To a magician, your brain is probably running the wetware equivalent of Windows 95, so come along and get patched.
Amm0nRanoob with a laptop
Workshop Practical RFID security training [BYO gear required]
This workshop will include both lecture style teaching about RFID access cards, covering protocols, formats and security measures as well as practical hands on training with the ‘Proxmark3’ open source RFID security tool. These exercises will include how to identify an unknown RFID card, how to read the data from the card and how to clone it to a new blank card. It will cover both Low Frequency and High Frequency cards. Training will cover RFID card security measures and the options and attacks for cracking the cryptographic keys. Examples of insecure systems and suggestions for implementing secure access control systems will also be covered. You will need to bring a laptop with virtualbox installed that supports USB passthrough! You’ll need to bring your own ethernet cable and adapter as necessary. If you have a proxmark 3 or newer, please also bring it along (we only have 20 Proxmarks available for general use).
Alex ‘Beardpunish’Professional jeweller
Workshop Lost wax casting of complex keys
Explore an ancient technique of lost wax casting, where anything made in wax can be made into metal. We’ll cover casting principles and basic techniques used, non-shrink moulding techniques, RTV silicone mould making, wax injection, cleanup and finishing of the casted copy.
Ben and TweekSecurity engineers at Google
Workshop Tamper-evidence challenge
Physical seals are intended to provide assurance that the sealed object has not been tampered with — to detect theft, contamination, or unathorised access. This challenge will be a hands-on, participant-led excercise in attempting to defeat a number of different tamper evident seals of dramatically different strengths and weakness, and also show some ways to detect tampering. Fame, glory and possibly actual prizes will be awarded to participants who succeed in defeating each kind of seal.
Christina PalmerLock pick designer
Talk Wave rake design
What makes a good wave rake? Science and engineering are applied to wave rake design. The quest to improve wave rakes begins with the history of the bogota. Raking techniques are listed and tested. Critical analysis of commercial wave rakes reveal their shortcomings and what can be done to improve them. Various curve shapes are considered. Elements of pick design including shaft taper and undercuts for strain relief are optimized and integrated. Euler-Bernoulli beam theory be praised. The limits of CAD software are sorely tested. Prototypes are made with a variety of wave lengths and wave shapes, and there is much experimentation. A virtual measuring widget in a CAD program reveals undercut errors. Mathematica is used to improve the undercuts. The new wave rake designs are offered to pick manufacturers. Some of them actually accept, and there is much rejoicing.
Craig RumballSecurity advisor & locksmithPanelist
Talk Security in depth — ‘When security theatre just isn’t enough’ (a government perspective)
Get exposed to holistic security doctrine and leverage on the approach taken by government agencies and contractors. This talk will introduce you to the Australian Government Protective Security Policy Framework (PSPF) and show you how to apply to its principles to provide layered and durable security measures in your own workspace. Don’t get bogged down in the fruits of bureaucracy, this talk condenses reams of boring documents and gives you the high speed tour — hopefully slightly less boring. Whether you want to learn how to make it or break it — Security in Depth is more than just locks and firewalls. Managing the weakest links, people and policy, is part of the key to securing information and assets.
Talk History of lock picking
Get into my hyperspace time cruiser and let me take you on a tour through millennia of lock picking. We’ll learn about some of the locks the aristocracy came up with to secure their valuables. We’ll see lock picking bounties and the transient era of perfect security. Yes, that’s right. Perfect Security. These are your great-great-great grandparents’ stories so buckle up kiddo, you’re in for a wild ride.
Huajiang ‘Kevin2600’ ChenSecurity researcher at the Istuary-Security Lab in Vancouver, Canada
Talk Bluetooth that bites — BTLE unlocking
Locks are an ancient technology; the current trend in locks is to make them “Smarter” by adding wireless functionality and connecting them to the Internet! …but are they doing any better than mechanical only locks? We will walk through a case study on BTLE Smart locks. This talk will provide practical reversing examples, step by step: from APK file reversing to BTLE traffic sniffing and analysing. The talk will provide attendees an insight into the weaknesses of common BTLE implementations, and the principles of attack shared across similar such devices.
Jos WeyersVice-President of TOOOL.nl, organiser of the Dutch LockCon conference, & world-record holder in the field of lock impressioning
Talk Key impressioning
We’ve all seen lockpicking explained on several security venues. You might even have tried it yourself. But what if you need to open a lock a number of times? Wouldn’t it be great to have an opening technique that would supply you with a working key in the process? A method to do this has existed for quite some time, but until recently it has remained quite unknown. Some time ago impressioning locks got “re-invented” by the lockpick community and the skill evolved to the level now shown at several international championships. Unlike lockpicking, impressioning creates a fully working key for the lock which can be used to lock and unlock the cylinder at will. With practice, this technique can consistently open a lock in 10–15 minutes (and potentially faster)! What is it? How does it work? What skill is involved? Why is it the most interesting way to open a lock? These questions, and more will be answered in this talk.
klepasBuilding things (accessibility, front-end web), security, & lockpickerPanelist ↑ Return to top of content
Lucas ZhaoChinese and Asian lock researcher and aficionado
Talk Chinese contemporary mechanical locks
Many people are familiar with American and European lock companies as well as their designs, and defeats, such as Schlage, Corbin, Medeco, ASSA, Abloy, and EVVA. However, domestic Chinese locks, never seen outside of China, are far from typical both in terms of design and vulnerabilities. Many people know, and love/hate the Chinese produced locks at their local big-box or dollar stores. Although most of the locks sold in big-box stores here nowadays are produced in China, that is only one side of the story. There is a whole other dimension with unique and ingenious designs which are sold exclusively in China. These modern locks feature exotic mechanisms and anti-pick features, unlike the cheap exported locks that most people are used to. In fact, many of these locks are even more secure than many high security locks made in America, and yet feature simple yet ingenious designs. I will also discuss potential defeats of even seemingly impossible to defeat designs of these locks, such as the GoldAtom reverse sidebar lock, a seemingly impossible to defeat lock that can be defeated with a wire and some yarn.
Michael MaynardTinkering optometrist
Talk Safes: banks, burglars, budgets… and the average Joe
The perfect safe doesn’t exist of course, and physical security is always going to be a balancing act between the demands of the customer, the technology available at the time of manufacture, and, of course, budget. I take you through a tour of safes and safe theory, and invite you to think a bit deeper than just nuts and bolts. (Oh, and we’ll get to look at the design of a three wheel combination safe lock because, you know, it’s undeniably cool.)
Workshop Practical RF attacks workshop [BYO laptop]
Ever wished you knew how to “pick” wireless digital locks (remote keyless entry systems), disarm wireless alarm systems, and impersonate valid Radio Frequency transmissions? This is probably the workshop you’re looking for. Participants will learn to reverse engineer a basic RF signal, and transmit the reverse engineered signal to impersonate the target device. Time permitting, participants will also learn how to brute-force simple devices, and learn the anatomy of a RollJam attack. Basic Linux familiarity preferred (i.e. know how to execute terminal commands at minimum). Bring a laptop! Also, if you have any SDRs please bring them as well!
Robert ‘Bull’ WinkelSecurity consultant, pentester, online investigator, lockpicker
“BIG BADDA BOOM!”
“BIG BADDA BOOM!” is a challenge where you must disarm a (simulated) bomb counting down the seconds! In this challenge, you play a 2-person team of bomb-disposal experts. You will have to defeat a variety of sensors and countermeasures using your skills, knowledge and creativity with the materials on hand. You have 10 minutes to disarm the bomb. One small mistake and: BIG BADDA BOOM! Note that sadly this event has been cancelled due to Bull being unwell.
Ryan and Jeremy“A menance to society” —Metlstorm
Talk Contactless Access Control 2: Life, uh, finds a way
Have you ever spent days waiting to clone the right access to get (back) into your highly secure access controlled building? Remembered your lockpicks but left the proxmark and the SDR at home? We have a solution for you! Presenting the sledgehammer approach to completely avoiding the problem and exploiting the weakest link with out latest must-have portable-ish physical security appliance. [Now 86% less likely to explode…] → Twitter: @ryankurte & @jsstott
Silvio CesareBSides Canberra organiser, hacker extraordinairePanelist ↑ Return to top of content
[Cf. Satoshi Nakamoto]
Wayne RonaldsonTechnical Director, TSS
Talk Red Teaming — ‘You must go beyond the limits’
Red Teams are designed to penetrate security in a real world test of effectiveness of security controls, policy, technology and infrastructure. Red Teams view security from an adversary perspective in order to simulate realistic attack scenarios that enable an organisation as a whole to prepare and protect against both simple and sophisticated threats. Red Teams build security culture and provide opportunities for staff to be trained using real world examples.