BEGIN:VCALENDAR
PRODID:-//vBulletin 6//EN
VERSION:2.0
CALSCALE:GREGORIAN
BEGIN:VEVENT
UID:4f89e927-83f0-41be-a2cb-2e98af9a509e
DTSTAMP:20260426T172041Z
SUMMARY:Moriarty : Anthony “Coin” Rose : Jake “Hubble” Krasnov
DESCRIPTION:Title: Moriarty\nPresenter: Anthony “Coin” Rose\nCo-Present
 er: Jake “Hubble” Krasnov\nLocation: W307\nDay\,Time: Sat Aug 10 \, 2P
 M - 3:45PM\nAudience: Offense\nProject: https://github.com/BC-SECURITY/Mor
 iarty\n\nAbstract:\nMoriarty is a.NET tool designed to identify vulnerabil
 ities for privilege escalation in Windows environments. Building upon Wats
 on and Sherlock\, Moriarty extends their capabilities by incorporating adv
 anced scanning techniques for newer vulnerabilities and integrating additi
 onal checks. This tool supports a wide range of Windows versions\, from Wi
 ndows 10 to Windows 11 and Server versions 2016\, 2019\, and 2022. Moriart
 y differentiates itself by its ability to enumerate missing KBs and detect
  a variety of vulnerabilities linked to privilege escalation\, offering su
 ggestions for potential exploits. The tool's extensive database includes w
 ell-known vulnerabilities such as PrintNightmare (CVE-2021-1675)\, Log4She
 ll (CVE-2021-44228)\, and SMBGhost (CVE-2020-0796)\, among others.\n\nBios
 :\n* Presenter:\nAnthony "Coin" Rose\, CISSP\, is a Lead Security Research
 er and Chief Operating Officer at BC Security\, where he specializes in ad
 versary tactic emulation planning\, Red and Blue Team operations\, and emb
 edded systems security. He has presented at numerous security conferences\
 , including Black Hat\, DEF CON\, HackMiami\, and RSA conferences. Anthony
  is the author of various offensive security tools\, including Empire and 
 Starkiller\, which he actively develops and maintains. He is recognized fo
 r his work\, revealing wide-spread vulnerabilities in Bluetooth devices an
 d is the co-author of a cybersecurity blog at https://www.bc-security.org/
 blog/.\n* Co-Presenter:\nJake "Hubble" Krasnov is the Red Team Operations 
 Lead and Chief Executive Officer of BC Security. He has spent the first ha
 lf of his career as an Astronautical Engineer overseeing rocket modificati
 ons for the Air Force. He then moved into offensive security\, running ope
 rational cyber testing for fighter aircraft and operating on a red team. J
 ake has presented at DEF CON\, where he taught courses on offensive PowerS
 hell and has been recognized by Microsoft for his discovery of a vulnerabi
 lity in AMSI. Jake has authored numerous tools\, including Invoke-PrintDem
 on and Invoke-ZeroLogon\, and is the co-author of a cybersecurity blog at 
 https://www.bc-security.org/blog/.
URL:https://forum.defcon.org/node/249637
DTSTART:20240810T220000Z
DTEND:20240810T234501Z
LOCATION:W307
END:VEVENT
END:VCALENDAR
