Your web browser is out of date. Update your browser for more security, speed and the best experience on this site.
Black Hat 2023 UK - A Dive into the World of Cybersecurity
Few conferences are as crucial to cybersecurity as Black Hat, held annually in the United Kingdom. The consultants of Axxes, of course, could not miss it. A team of no less than 6 experts headed to London and returned with a wealth of relevant insights.
For decades, those curious about the future of cybersecurity have turned to Black Hat, the event where the brightest minds in the industry converge. Held at the prestigious ExCel London venue, over 3,600 experts gather for four days to discuss the latest trends, threats, and solutions that make our field so captivating. For us, it's the prime opportunity to learn from professionals in business, academia, and leaders from both the public and private sectors

Tuesday
Because the conference center was within walking distance, everyone could enjoy a good night's sleep and indulge in the extensive English Breakfast. We guarded our conference access badge with our lives—not only because we didn't want to miss the event, but also because otherwise, we'd have to purchase a new ticket.
The first keynote was delivered by none other than Jeff Moss, the founder of Black Hat. He shared his reflections on the past year and outlined his plans to enhance cybersecurity in 2024. The key takeaway for us was his emphasis on combatting misinformation (remain critical and be mindful of the sources of information) and the need for governments to invest more in the IT security of the nation.
Next, Ollie Whitehouse, the CTO of the UK National Cyber Security Centre (NCSC), addressed the audience. He provided insights into certain challenges he personally faced. Some of his one-liners will always stick with us: “How do we build something we can trust on something we can’t trust?”, “Hollywood is Hollyfact”, and “Cybersecurity shouldn’t be an extra premium cost for SaaS”.
Several talks stood out to us, including one on an exploit where millions of patient records were vulnerable, a method to steal autofill passwords, and a case demonstrating how internet traffic can leak through a VPN client.
The latter talk was delivered by Mathy Vanhoef, a professor at KU Leuven. In a highly accessible manner, he explained two potential attacks to leak network traffic sent by a VPN client. A ‘rogue’ WIFI network can exploit these vulnerabilities to make the victim's IP packets leak readable text outside the VPN tunnel. The adversary achieves this by manipulating the victim's routing table. Our attacks are independent of the VPN protocol used, meaning they apply to protocols such as IPsec, OpenVPN, and WireGuard.
In between, there was ample time for networking in the Business Hall or exploring demos in Arsenal. And because one cannot be serious all the time, we headed to the Tower Bridge in the evening for some relaxation!

Thursday
Another day, another proper English breakfast! After breakfast, on a brisk morning stroll, we made our way to... our last day at Black Hat.
The first keynote we attended was delivered by Joe Sullivan, who served as CSO at companies including Facebook, Uber, and Cloudflare. You may recall him from 2017 when he was fired from Uber after allegedly concealing a major data breach and paying hackers $100,000. A year later, news agency Reuters reported that the decision not to disclose the breach was made by the company's legal department. The moral of the story? Being a CSO or CISO is never without risks because someone must take responsibility, even if the issue is not directly linked to you.
When we checked in on our first day, we not only received a backpack with a few stickers but also a stamp card. At certain booths, you could collect stamps, hoping to win a prize. Spoiler alert: we returned home empty-handed. Many speakers discussed APSEC, which stands for Applied Security. We learned that everyone wants to protect systems, networks, and programs from digital attacks and ensure the confidentiality, integrity, and availability of your data.
In the Business Hall, they organized a lockpicking contest, where you had to pick locks of varying difficulty. The more you could open, the greater your chance of winning a prize. Did we mention we returned home empty-handed? Additionally, there was a large inflatable pool filled with Lego blocks, where you had fifteen minutes to create the most original design possible. Again, prizes were at stake - and the rest is history.
Fortunately, there were plenty of interesting talks, including a presentation on data breaches on a TLD scale. We learned that deleted domains can still be used to send emails, potentially exposing sensitive information. Lemmings to the rescue! This was developed by SIDN to alert former owners of deleted domains when their domain is likely still in use for sending email.
We also discovered how ChatGPT-4 could be used to write code, how a million ASUS routers are vulnerable due to using ASUS DDNS, and how DHCP DNS Dynamic Updates are armed. Incredibly fascinating topics, which we can undoubtedly apply in our daily jobs.
If it wasn't clear already: Black Hat is crucial for anyone involved in cybersecurity. It is the ideal platform for collaboration, knowledge exchange, and learning new skills. Our eyes were already open, but after this conference, they are even more so. We are ready to double down on cybersecurity!