Tech Tackles Cancer 2016 With St. Baldrick's

Join us and St. Baldrick's in the fight against childhood cancer and to prove, once and for all, that Boston has the greatest tech community in the country. Come out to support the cause, shave your head, and help fight against childhood cancer.

Last year, the Boston tech community raised over $400,000 in support of the fight against pediatric cancer. That was enough money to fund two research grants! This year we're aiming to break $500,000!

You can help us by donating today or attending the event on November 7th at the Landsdowne Pub.

Red Team Challenge Recap

On Saturday April 23rd, hack/secure and SimSpace with sponsorship from Square 1 Bank and Rapid7, hosted the first in a series of attack and defend challenges.

We had a great turnout with over 40 cybersecurity practitioners joining. The challenge, created by SimSpace, offered each team their own network consisting of full operating systems and configured with subtle, yet real world vulnerabilities and/or misconfigurations. Teams were required to use real world scanners, exploitation tools, and post exploitation tactics to capture 10 flags.

After 6 hours of attacking the SimSpace network, the team from Booz Allen Hamilton came out on top, capturing 7 of the 10 flags. Veracode came in a close 2nd followed by Rapid7 and Sqrrl in 3rd.

A big thank you to all those who participated. We look forward to seeing everyone at the next challenge!

Meet-Up Recap July 2016

Our July meetup was another riveting post-workday gathering of Boston’s local cybersecurity pros in Cambridge’s Kendall Square. After socializing with a slice of pizza and beer in hand, everyone centered their attention to the two guest speakers prepared with lightning talks:

Mike Li - Security Engineer @Rapid7 (exploitation frameworks) Mike Arpaia - Co-founder & CSO @Kolide (Osquery: host intrusion detection product)

First up at bat, Mike Li started off the night with a focus on exploitation frameworks: what to use, how to apply that tool to derive the best outcome, and all the stages in between.

Playing offense with your security systems

Mike Li took the stage to discuss exploitation frameworks, and how to responsibly use them. The goal: find and fix your weaknesses before an attacker does. Seems like a simple task in theory, but oftentimes people don’t even know what or where their vulnerabilities are to begin with. Enter penetration testing with exploitation framework tools.– Tools like Metasploit, Veil Evasion, etc. have given insights to modern security teams that help establish where vulnerabilities exist. When ethically utilized, these tools help to simulate real world attacks and expose weak spots in a network, which will ultimately help to build a stronger system that is challenging to breach.

But… even if you have a near impenetrable infrastructure, your systems are still susceptible to outsider attacks in the form of social engineering. We often think about holes in our system, or brute-force efforts as primary methods to gain access, when in reality many breaches occur due to human naiveté. And on that thought, Mike left us with a simple reminder: Penetration testing and exploitation frameworks are both necessary and valuable. But ultimately, they help us spot vulnerabilities in our systems, not our people. Humans are not infallible, and they are oftentimes a liability that cannot be disregarded. So while we are securing our systems, we also need to take into consideration the people and their behavior in conjunction with the systems.

“When you think of exploitation frameworks, you think of Metasploit. A system, a piece of code, a piece of software. But also, you can exploit a human. People are fallible, too.” - Mike Li #BostonSecurityMeetup @hacksecure

With a high barrier to entry, OSSEC isn’t easy to use. “Aw yeah OSSEC has a great UX!” (crowd chuckles) With a high barrier to entry, OSSEC isn’t easy to use.

“Aw yeah OSSEC has a great UX!” (crowd chuckles)

Osquery is an open source framework used to easily and efficiently write SQL-based queries to accurately assess the current state of a system. It was intended to serve as a simple and reliable solution for Facebook’s intrusion detection issues, and has since evolved into a powerful community-driven framework that many companies leverage today.

After Facebook shared the initial osquery code, allowing for public use, the public in return has continued to test, alter, and make additions. What began as 27 SQL tables implemented via an easily extendable API, has now grown to 180 tables directly due to community contributions.

Mike Arpaia went on with tips on how to proactively find malware through the use of query packs and scheduling. To close, he extend an invitation to all listeners to test and reform the continuing osquery project. With over 6,434 stars, 900 contributors, and over 3,000 commits, osquery remains of the most popular repos on Github today.


Thank you Mike Li & Mike Arpaia for your time and expertise!

If you missed the July event, make sure to check us out at Boston Security Meetup, and RSVP for the upcoming meetup on August 11th!

hack/secure Unites 25 of the Top Entrepreneurs in Cyber to Help Form and Fund 100 U.S.- Based CyberSecurity Companies Over the Next Three Years

We're excited to announce our hack/secure syndicate. Check out the article from Fortune and press release below.

First Investment Kolide Raises $1.6M and Assembles Top FireEye and Facebook Technologists to Found Stealth Cybersecurity Start-Up

BOSTON – June 27, 2016 – Today, serial entrepreneur and venture capitalist Chris Lynch along with partner Cort Johnson unveiled hack/secure, an invite only investment syndicate to help U.S. citizens build cybersecurity companies to ensure the United States leads the global effort in protecting the free world. At launch, hack/secure includes a syndicate of 25 of the industry’s pre-eminent and proven entrepreneurs investing in the next generation of cybersecurity entrepreneurs. The organization already has local presences in Austin, Boston, DC and New York.

hack/secure was founded and is run by Chris Lynch and Cort Johnson. The 25 entrepreneurs and angel investors forming the syndicate serve as hack/secure leads. Using the power of the AngelList platform, when a lead finds a company they want to invest in, hack/secure backs that lead’s investment with up to $250,000 of additional investment capital.

“The world runs on software. It powers everything from the banks that govern our financial system, the computers that fly our airplanes and drive our cars, to the power plants that generate our energy,” said Lynch. “WWIII is already underway, and it’s a cyber war. We believe it will be won with hands on the keyboard, not boots on the ground. The cybersecurity industry is just as important to protecting the free world as the manufacturing industry was to supporting the Allied forces victory in WWII. hack/secure is our effort to ensuring America leads the protection of our way of life and that of the free world.”

hack/secure in action: Kolide

hack/secure’s first investment is Boston-based cybersecurity startup Kolide, a promising new venture formed by top technologists from Mandiant, FireEye and Facebook. Kolide has raised $1.6 million led by Dustin Willis Webber, CTO and co-founder of Critical Stack. Dustin has built a legendary reputation in the infosec community for his numerous key open source contributions, founding multiple successful security startups, and for the sheer speed at which he delivers innovative products. His investment is backed by hack/secure, Liam Randall, CEO of Critical Stack, and other security experts from its syndicate.

Kolide is led by co-founder and CEO Jason Meller, formerly Chief Security Strategist at FireEye. The founding team also includes Mike Arpaia and Zach Wasserman from Facebook’s elite security team, where the two built and open sourced osquery, which is used to ensure the security of hundreds of thousands of Facebook’s endpoints.

“Jason approached me with an incredible idea to leverage open source technology at the endpoint to solve some big challenges in a way I had never seen before,” said Webber. “As someone who has built their entire career contributing to and relying on open-source technology, I understood the benefits to that approach instantly. What you have here are the raw elements to break the endpoint market wide-open and I knew that if we could bring in additional open source innovators like Mike and Zach, we’d have something super special here to invest in through hack/secure. “

Kolide’s mission is to take on the nascent end-point security and dev-operations space by building an enterprise-grade experience and tooling around Facebook’s popular osquery project.

"Wide proliferation of network encryption has effectively neutered some of the best detection tools security experts have relied on for decades,” said Kolide CEO Jason Meller. “Visibility at each individual machine is the only remaining effective way for organizations who care about cyber attacks to regain that lost sight. Unfortunately, most the endpoint technologies out there are proprietary, and you are effectively trusting the vendor that you aren't introducing more holes. An open source solution like Facebook’s osquery, which can be scrutinized and improved by every expert in the field, is the solution. A ton of organizations are already making a major investment in osquery because of its current capabilities. When they see the value we add with Kolide, their bet on the technology will be paid off 100 fold.”

About hack/secure

hack/secure is an investment syndicate of 25, and growing, of the top minds in the cyber security industry. The organization’s board of directors act as managing directors of their region across the U.S., and initially include:

  • Washington D.C.: Liam Randall - Founder and CEO of Critical Stack

  • Boston: Dustin Webber - Founder and CTO of Critical Stack, Founder of Threat Stack

  • Boston: Jen Andre - Founder and CEO of Komand, Founder of Threat Stack

  • Austin: H.D. Moore - Founder of Metasploit (acquired by Rapid7), Principal at Special Circumstances

  • NYC: Dan Guido – CEO and Founder of Trail of Bits

Members of the hack/secure syndicate include:

  • Bob Brennan – CEO of Veracode

  • Corey Thomas – CEO of Rapid7

  • Mike Viscuso – CTO of Carbon Black

  • Art Coviello – Former CEO of RSA

  • Tim Belcher – Former CTO of NetWitness

  • Sam King – CSO of Veracode

  • Patrick Morley – CEO of Carbon Black

  • Dustin Webber – CTO of Critical Stack

  • H.D. Moore – Founder of Metasploit

  • Dan Guido – Founder and CEO of Trail of Bits

  • Jen Andre – CEO of Komand

  • Liam Randall – CEO of Critical Stack

  • Brian Ahern – CEO of Threat Stack

  • Adam Fuchs- Founder of Sqrrl

  • John Langton – Founder of Visitrend (Acquired by Carbon Black)

NSM WORKSHOP LEVERAING BRO

Bro is a stateful, protocol-aware, open source, high-speed network monitor with applications such as a next generation intrusion detection system, real-time network discovery tool, historical network analysis tool, real-time network intelligence, and more. With a powerful event-based programming language at its core, the Bro Platform ships with powerful frameworks-signature detection, the ability to extract and analyze files, and the capability to integrate massive amounts of local and external intel—all at incredibly high rates.

This tutorial focuses on helping you understand some of the many tasks that you can accomplish with the Bro Platform using a hands-on container based training environment. Beginning with an introduction to the Bro Platform, this fast-paced tutorial helps experienced network operators quickly get up to speed on leveraging the technology. Students work with traffic samples of distributed denial-of-service (DDoS) attacks, deploy large sets of threat intelligence, analyze compromised host traffic, dynamically generate streaming network analytics, and more.

Students should be well versed in TCP/IP and networking fundamentals and come prepared with a workstation (Linux, Windows or Mac) with an SSH client to connect to the training environment.

Speaker Info:

Liam Randall - CEO, Critical Stack

Liam (@Hectaman) founded Critical Stack to containerize security infrastructure. He has focused on end-user training, application development and advanced NSM at large scale. A frequent speaker at security conferences you can usually find him training users on the Bro Platform at workshops, conferences or online.