RomHack 2019 speakers

Francesco rageman Perna

Francesco "RageMan" Perna is an italian security researcher involved since he was young with the italian hacker scene. Francesco has a strong knowledge of computer and network security related topics, has spent the last 15 years in the research field focusing on the security issues related to applications and communication protocols, both from the offensive and defensive point of view.
Francesco is involved with the italian hacker scene: he is part of the Metro Olografix executive board and he is one of the organizer of international hackers events such as Metro Olografix Hacker Camp (MOCA) and BSides (Roma and Milano)
Francesco prefers strategy to brute force: the simplest and well engineered is the attack, the more it is effective

Lorenzo lord Nicolodi

Lorenzo Nicolodi has a 10 year experience in the information security field and currently provide consultancy to national and international customers through his own company.
He is interested exclusively in high-profile technical activities and he is passionated about low-level security problems, including the network vulnerabilities and misconfigurations, subversion of incorrect implementation of network protocols and malicious interaction with embedded/IoT devices and similar stuff.
To add a little bit of spice to his life, he regularly support Francesco during non-standard activities (whatever it means).

Red teaming: from badge to domain

[ Video | Slides ]

An international company asked us to deliver a real "Red Teaming" activity, by mimiking an attacker who was provided only by physical access to one of the branch, composed by two different buildings. From there, we were asked to try to get complete control of the infrastructure.
We started by working on the legal part, that is the most critical one, expecially in Italy where laws are complex and there are multiple actors to consult (internal HR, labor unions, etc...) in order understand what can be done and what should be avoided; unluckily, every engagement is different and this part must be evaluated every time. To take care of every single aspect, we worked closely with two different teams of law expert and legals, providing to our customer all the documentation and the contracts that allowed both us and them to safely deliver the activity.
Once this part was completed, we started preparing the technical side of the activity. Plenty of tools, both hardware and software were bought, tested, tuned and then discarded or selected, based on how they performed in our labs. We also prepared a dedicated infrastructure to allow us to silently exfiltrate information and to be able to control our RATs without putting the whole infrastructure at risk.
A third step was the preparation of a "play book", where everyone in the team was acting as a different character and was aware about a "fake story" and plenty of pre-agreed answers to provide to different people in different situation (e.g.: how to answer to security guards if we get catched).
Once ready, we started by a physical reconnaissance of the buildings and a fine tuning of the various tools we prepared, to best match the requirements of the activity. We than moved on with the most malicious activities, trying to become administrator of the whole infrastructure. Did we succeed? Join the talk and you will find out :-P

[ Back to Program page ]

Cyber Saiyan

Cyber Saiyan is the non-profit organization that takes care of the organization of RomHack
Follow us, make a donation or becomes a member

Privacy policy