Director at MDSec
3
Talks Delivered
3
Events Spoken At
3
Countries Visited
3
Years Speaking
3
Total Talks Given
Dominic Chell is a seasoned cybersecurity expert and one of the co-founders and directors at MDSec, a UK-based consultancy specializing in red teaming, application security, and adversary simulation. He has over 20 years of hands-on experience, delivering technical security assessments and training for major financial, government, and retail organizations .
Areas of Expertise
Presentation Types
Audience Types
You spend days or even weeks perfecting the perfect phish; your campaign has a targeted pre-text, a slick initial access payload and it slips through perimeter defences right in to your target's inbox. Moments later, your C2 pings and your beacon is awake - you're in, it's time to explore! You start by probing the endpoint, checking your privileges and getting your bearings in the network. Suddenly, silence... your beacon has stopped responding, your infrastructure is burned and you have to start over.
Command line logging, PowerShell logging, sysmon, EDR, EDP, app whitelisting, AMSI, the blue team has it all and you're playing on their turf. Unless your post-exploitation game is at it's peak, you shall not pass.
During this talk we will explore post-exploitation tradecraft, reviewing the opsec pitfalls that commonly lead to detection in mature environments as well as how to significantly reduce the indicators of compromise. It will demonstrate how DevOps principles can be applied to red teaming, focusing on the implementation of a custom CI/CD pipeline to automatically consume, build and deploy existing and custom tooling to an environment in a manner agnostic to any command and control framework. This approach also provides the operator with the capability to programmatically and automatically protect their tools from DFIR, safeguarding intellectual property and operational infrastructure when an artifact is dropped to disk.
The future of red teaming is offensive development.
As defensive technologies and detection capabilities improve, aggressors must evolve, adapting their tactics to avoid the spotlight shone by the blue team. This talk examines the most significant advances in red team tactics that have come to light over the course of the past 12 months.
In addition to the public research that bore us the most fruit, we will also detail some of the research performed by MDSec’s ActiveBreach team. Specifically, this includes some of the following:
– Domain Fronting: how to egress using high reputation domains and evade controls such as proxy categorisation,
– Attacking ADFS: how Internet facing ADFS endpoints can be abused to gain entry to corporate environments,
– Sandbox Evasion: how popular (and expensive) malware protection sandboxes can be bypassed.
Where applicable, war stories and demonstrations will illustrate successes (and failures) from the front line. Finally, we will conclude with our predictions from both an offensive and defensive standpoint for the next 12 months.
Come on a magical adventure with us through time, discovering bugs that somehow crept into a time machine in the 90's and re-surfaced in the modern world.
With buffer overflows, command injection flaws and other basic flaws, we will take you on an journey into the world of consumer security systems. Despite a plethora of low hanging fruit, these devices are being used across the world to secure residential and commercial properties and in many cases can be found on the Internet. Come and play big brother with us!
Trigger warning, may contain junk hacking.