♫musicjinni

DEF CON 22 - Jim Denaro and Tod Beardsley - How to Disclose an Exploit Without Getting in Trouble

video thumbnail
Slides Here: https://www.defcon.org/images/defcon-22/dc-22-presentations/Denaro-Beardsley/DEFCON-22-Jim-Denaro-Tod-Beardsley-How-to-Disclose-and-Exploit-UPDATED.pdf

How to Disclose an Exploit Without Getting in Trouble
Jim Denaro CIPHERLAW
Tod Beardsley ENGINEERING MANAGER, METASPLOIT PROJECT
You have identified a vulnerability and may have developed an exploit. What should you do with it? You might consider going to the vendor, blogging about it, or selling it. There are risks in each of these options. This session will cover the risks to security researchers involved in publishing or selling information that details the operation of hacks, exploits, vulnerabilities and other techniques. This session will provide practical advice on how to reduce the risk of legal action and suggest several approaches to responsible disclosure.

Jim Denaro (@CipherLaw) is the founder of CipherLaw, a Washington, D.C.-based consultancy and focuses his practice on the legal, technical, and ethical issues faced by innovators in information security. Jim is a frequent speaker and writer on legal issues in information security and has experience in a wide range of technologies, including intrusion detection and prevention, botnet investigation, malware discovery and remediation, and cryptography. Jim is a regular consultant on responsible disclosure policies and is involved in programs to shield researchers who disclose responsibly.

Jim has completed professional coursework at MIT and Stanford in computer security and cryptography. He also holds technical certifications from the Cloud Security Alliance (CCSK) and Cisco Systems (CCENT), and has passed the CISSP examination (pending certification). Before becoming an attorney, Jim spent obscene amounts of time looking at PPC assembly in MacsBug.

Tod Beardsley (@todb) is engineering manager for the open source Metasploit project, as well as one of the core developers on the framework. His background is primarily in intrusion prevention, vulnerability assessment and identification, anti-fraud/anti-phishing countermeasures, penetration testing and compliance auditing, intrusion detection and response, protocol analysis, and host hardening. He is also interested in computer crime forensics and recovery, reverse engineering and binary analysis, steganographic communication channels, and cryptography in general.

Tod’s technical specialties include protocol analysis and reverse engineering, intrusion detection and prevention, phishing and online fraud, open source software engineering collaboration, and application vulnerability research and exploitation.

DEF CON 22 - Cesar Cerrudo - Hacking US (and UK, Australia, France, etc.) traffic control systems

DEF CON 22 - Deviant Ollam & Howard Payne - Elevator Hacking - From the Pit to the Penthouse

DEF CON 22 - Glenn Wilkinson - Practical Aerial Hacking & Surveillance

DEF CON 22 - Metacortex and Grifter - Touring the Darkside of the Internet. An Introduction to Tor

DEF CON 22 - Panel - DEF CON the Mystery, Myth, and Legend

DEF CON 22 - Nemus - An Introduction to Back Dooring Operating Systems for Fun and Trolling

DEF CON 22 - XlogicX & chap0 - Abuse of Blind Automation in Security Tools

DEF CON 22 - Chris Littlebury - Home Alone with localhost: Automating Home Defense

DEF CON 22 - Tim Strazzere and Jon Sawyer - Android Hacker Protection Level 0

DEF CON 22 - Major Malfunction - Old Skewl Hacking - Porn Free!

DEF CON 22 - Brent White - Corporate Espionage

DEF CON 22 - Ladar Levison and Stephen Watt - Dark Mail

DEF CON 22 - Blake Self and Shawn "cisc0ninja" Burrell - Don't DDoS Me Bro: Practical DDoS Defense

DEF CON 22 - Jason Healey - Saving the Internet (for the Future)

DEF CON 22 - Jim Denaro and Tod Beardsley - How to Disclose an Exploit Without Getting in Trouble

DEF CON 22 - Keren Elazari - Empowering Hackers to Create a Positive Impact

DEF CON 22 - Zoltán Balázs - Bypass firewalls, application white lists...

DEF CON 22 - Ryan Noah Shapiro - Hacking the FBI - How & Why to Liberate Government Records

DEF CON 22 - Dameff, Tully, and Hefley - Hacking 911: Adventures in Disruption, Destruction & Death

DEF CON 22 - Grant Bugher - Detecting Bluetooth Surveillance Systems

DEF CON 22 - Dominic White and Ian de Villiers - Manna from Heaven

DEF CON 22 - Paul Such 0x222 and Agix - Playing with Car Firmware or How to Brick your Car

DEF CON 22 - Christopher Soghoian - Blinding The Surveillance State

DEF CON 22 - Gene Bransfield - Weaponizing Your Pets: The War Kitteh and the Denial of Service Dog

DEF CON 22 - Charlie Miller & Chris Valasek - A Survey of Remote Automotive Attack Surfaces

DEF CON 22 - Michael Ossmann - The NSA Playset: RF Retroreflectors

DEF CON 22 - Anch - The Monkey in the Middle: A pentesters guide to playing in traffic.

DEF CON 22 - Jayson E. Street - Around the world in 80 cons

DEF CON 22 - Weston Hecker - Burner Phone DDOS 2 dollars a day : 70 Calls a Minute

DEF CON 22 - Eijah - Saving Cyberspace by Reinventing File Sharing

Disclaimer DMCA