← All talks

Speaker Floodlight: BSides Vancouver Island 2025

BSides Vancouver Island · 20253:3544 viewsPublished 2025-10Watch on YouTube ↗
Speakers
Tags
CategoryTechnical
About this talk
🔦 Speaker Floodlight: BSides Vancouver Island 2025 🚨 🕶️ Hack the planet. Channel your inner Zero Cool. In just 24 hours, the Victoria Conference Centre becomes ground zero for the annual BSides Vancouver Island Security Conference—Oct. 3, 2025. 🎟️ Tickets are vanishing fast. 📺 Watch the video if you need a reason. Here’s your final sneak peek at the minds behind the mayhem: 🔐 Simran Kaur – Navigating AI Security Explore the evolving risks of LLM-powered apps and learn how to secure AI throughout the dev lifecycle. Actionable strategies, real-world insights. 🧠 Johann Rehberger – Agentic ProbLLMs Prompt injection attacks targeting agentic systems like OpenAI Operator, Claude Code, GitHub Copilot Agent Mode, and more. Johann shows how these systems can be compromised—and what that means for AI coding. 💻 Pierre-Nicholas Allard-Coutu – Stolen Laptops: Modern Physical Access Attacks From direct memory access attacks to UEFI firmware reverse engineering, Pierre-Nicholas demonstrates how physical access can lead to full compromise—even with TPM and DMA protections enabled. Featuring new tooling (FirstStrike), updated AV/EDR bypasses, and pre-boot attack vectors for 2025. This one’s a hardware hacker’s dream. 🌐 Shu Hao – From Spoofing to Tunneling Stateless tunnels (GRE, VxLAN) as red team entry points. Shu reveals how attackers bypass IR teams, hijack encrypted tunnels, and exploit routing protocols to compromise entire domains. 🤖 Emily Choi-Greene – Beyond Vibe Coding AI AppSec tools need more than vibes. Emily walks through how to build reliable automation that interprets security requirements, handles conflicting docs, and scales across orgs. 👻 David Brunsdon – Unwanted Guest Threat actors don’t need infrastructure—they’ll hijack yours. David shows how attackers abuse misconfigured domains, home routers, and websites to launch full-stage malware campaigns. 🔓 Wade King – CBC Padding Oracles in 2025 CBC encryption is everywhere—and Wade reveals two new techniques to exploit it. Padding oracles without padding errors, IV recovery, and first-block decryption. If you’re a dev, you need to see this. 👾 Whether you’re a red teamer, blue teamer, builder, breaker, or just curious—BSides Vancouver Island is the place to be. 💥 24 hours to go. One ticket. Infinite possibilities. #BSidesVancouverIsland #HackThePlanet #Cybersecurity #AIsecurity #RedTeam #AppSec #Hackers1995 #TechConference #VictoriaBC
Show transcript [en]

[Music] My primary goal is to help customers and individuals derisk their systems and stay cyber safe. We are living in the world of AI where we're just talking about generative AI, chat, GPT and copilot. It's simple three principles lease privilege, zero trust, verify explicitly, and assume breach. Basically, you should see who have access to your system. Currently, professionally, I'm the red team director for the enterprise red team at Electronic Arts. But I do a lot of security research with AI systems, which is really sort of my my big passion. You basically sometimes might not be aware that you hand over your entire system to a large language model that cannot be trusted implicitly. An agent can modify

its own environment and reconfigure its security controls can allow list its own capabilities like running arbitrary commands by itself. I create a tools and it have been released and I scan over the internet and there's turn out like 900 or more endpoint response our VXL scanner and there are nearly 4,000 IP inside the VXN terminal. Also the ter inside the VXLAN terminal are some public address. Oh actually everyone could hijack this public address then can abuse by attacker. AI can do amazing things but it can also hallucinate or produce conflicting results which is a huge risk in security. >> One of the main reasons that hallucinations happen is because large language models are working from their

working memory instead of from the information and context that you give it. give large language models the ability and capability to say I don't know and to reward them for that. >> Another example that I've been researching is a large botnet of microick routers. These routers are installed all over the world in homes and small businesses. They've formed what we call a large proxy network which can be used for all sorts of things. People with these routers might wonder why their internet is so slow. Well, maybe they're doing a DDoS attack on Ukraine, or maybe their internet is slow because their router is doing some kind of credential stuffing or mailing out other threats. And then when I was

working on a bug bounty for a gumb gambling platform, I discovered that the password reset token was vulnerable to padding oracle and I was able to use it for account takeover. A lot of times when developers are using CBC encryption, they assume wrongly that the resulting plain text can't be manipulated by an attacker using a padding oracle or simply just by modifying the cipher text. You can cause predictable outcomes in the resulting plain text which you can sometimes use to tamper with strings that are meant to be secure. And that's why when you're doing a padding oracle attack, you can reveal the plain text of anything except for the first block because that first block depends on the initialization

vector which is hidden on the server. >> Pretty much everything most cyber attacks use DNS. It's several stages of the attack. It's hard to keep track of how many domains an organization has, let alone how many subdomains an organization has.