Bishop Fox at HackGDL
- Date:
- March 1, 2025
- Location:
- Guadalajara, Jalisco, Mexico
Bishop Fox is proud to sponsor, present, and host the Vishing Village at HackGDL 2025 on March 1, 2025 in Guadalajara, Jalisco, Mexico. HackGDL is a technical event focused on cybersecurity, hacking and breaking all kind of things. It brings together professionals, enthusiasts, and curious minds to explore the latest trends, techniques, and challenges in the field of information security.
For full details, visit: https://hackgdl.net.
Landing Your Dream Job in Cybersecurity
Date/Time: February 28, 2025 at 10 a.m. CT
Speakers: Areli Ch. Durán, Sr. Technical Recruiter
Burning Down the Walls: Android and iOS Security Bypass
Date/Time: February 28, 2025 at 12:20 p.m. CT
Speakers: Luis De la Rosa, Security Consultant III & Steeven Rodriguez, Senior Operator
Don't Worry, Be Hacky: Survival Guide for Today's Hacker
Date/Time: March 1, 2025 at 12 p.m. CT
Speakers: Yael Basurto, Senior Security Consultant
"Have you ever felt like the cyber security spectrum is too overwhelming? Pentest, red teaming, threat hunting, SOC, threat intel, DFIR, Al, cloud.., etc. Where to start or what should you know to get into an infosec career or to boost your current career?"Cyber security is not an entry-level decision" - Dave Kennedy (Trusted Sec)Whether you are just starting your infosec journey, or if you have been around for a while but have that feeling that there is so much to cover and so little time to learn it all, this talk is for you. Is this the Holy Grail of how to become the best hacker in 10 simple steps? No. The idea is to engage in an informal conversation about how I have approached the problem of the overwhelming amount of information that is cyber security; how to consume it, and what relationship can all this have with building a community...just like HackGDL!"
Inside Job: How Past Internal Pen Tests Can Highlight Vulnerability Trends
Date/Time: March 1, 2025 at 1 p.m. CT
Speakers: Killian Ditch
Internal network penetration tests assess network services and the technologies to control access that are maintained by organizations. Starting with assumed compromise of an internal device, the primary objective is accessing critical data. Standard attack paths are to compromise accounts, escalate privileges, and find a way to reach the target data. Insights can be gleaned from the success of past engagements that provide actionable guidance for all organizations to prioritize strategies that reduce real risk. This talk will examine the specifics of three engagements from 2024 and the lessons demonstrated both individually and collectively.
- An Energy sector concern evaluating overall data exposure in which insecure credential policies and management ultimately led to privilege escalation and the compromise of proprietary data that included blueprints, financial, and customer data.
- A Hospitality entity evaluating payment data security, wherein missing authentication and insecure credential management led ultimately to full control of the Active Directory environment – but only limited data compromise.
- A Hospitality organization also evaluating payment data. Insecure credential management led to account compromise, privilege escalation, and partial data compromise, but complete privilege escalation and access to the target data was unsuccessful.
Post-exploitation Techniques Used by Threat Actors in the Cloud
Date/Time: March 1, 2025 at 2 p.m. CT
Speakers: Iván Sánchez, Security Consultant at Bishop Fox & Jorge Gibbs, SOC Analyst
Vishing Village
Date/Time: March 1, 2025 - ALL DAY
Hosts: Iván Sánchez, Security Consultant; Berenice Flores Garcia, Senior Security Consultant; Samuel Santiago, Security Consultant III
In this village we will engage visitors and attendees to try out a vishing (voice phishing) challenge. The vishing challenge is a script that simulates a vishing attack by implementing AI and text to voice APIs, allowing the participants to experience firsthand the tactics used by the attackers. The participants will need to use their vishing skills in order to get sensitive information (flags). This initiative aims to engage attendees in real-world scenarios that highlight the importance of recognizing and mitigating social engineering threats.