Max van der Horst

Security Specialist NorthWave

BIOGRAPHY

Technical Security Specialist with experience in strategic and tactical reasoning inside the Cyber Security domain. Special interests include Cyber Threat Intelligence and the impact of geopolitics on Cyber Security, the (mis)application of cryptography and knowledge sharing / tutoring. I have previously worked in both operational and strategic roles, resulting in having learnt the value and application of both.

Currently, I am studying at the Security and Network Engineering master’s at the University of Amsterdam besides working as a Security Specialist for Northwave. In my evening hours, I am researching and participating in the global Coordinated Vulnerability Disclosure for the Dutch Institute for Vulnerability Disclosure and acting as board secretary for the DIVD Academy.

WSL 2 and Security: Productivity Booster or Achilles Heel?

Recent malware attacks on WSL 2 (Windows Subsystem for Linux 2) have been opening up the discussion on whether or not WSL 2 can be used for efficient and undetected cyber-attacks. However, does (the lack of) Windows’s security relate to these attacks? This research focuses on the ability of Windows to fend off or detect any attacks originating from WSL 2 with the goal of shedding a light on some weaker points inherent to the use of the subsystem.

Furthermore, some attacks are forged with the goal of cross-referencing to suggest recommendations that make Windows safer against the proposed classes of attacks. Through so-called attacker stories, the research includes the evaluation of multiple points of interest in the subsystem on which experiments have been conducted on three levels of security. The results of these experiments show that attacks are possible that mostly revolve around the inability of Windows to detect activity within WSL 2. Therefore, the proposed recommendations largely focus on expanding the detection capabilities of Windows to include logs from within WSL 2 as well as publishing in-depth documentation and making potential security risk features optional. 

With the finalization of the attack scenarios and recommendations, the conclusion could be drawn that Windows detects events passing through Windows itself, however, lacks detective capability for activity in WSL 2. This makes WSL 2 a very interesting attack vector and defense evasion tool for a potential threat actor. By implementing the recommendations, these options become a lot more limited.

This presentation is co-presented with Rares Bratean, Senior Threat Intelligence Analyst at Signify.

Are you the next cyber security superstar?

If you are passionate about an information security topic or you have strong technical skills developing researches on your own, you should definitely Apply at Call for Papers. By submitting you will have the chance to showcase your work to +2000 attendees.

Other speakers joining this year

Ioan Iacob

Senior Security Researcher CrowdStrike

Sebastian Avarvarei

Manager Information Security Canon EMEA

Greg Charitonos

Unix Engineer

Ready for this year's presentations?

By registering you will unlock access to 60+ speakers and two full days with cyber security news & showcases from worldwide leaders.

SPEAKERS
0
COUNTRIES
0
ATTENDEES
0
HACKING
COMPETITIONS
0
COMPANIES
0

Sponsors & Partners

They help us make this conference possible.

POWERED BY

Orange Business is a key division of Orange Romania, specializing in providing cutting-edge communication, technology, and digital transformation solutions tailored to businesses of all sizes. With a strong emphasis on innovation, Orange Business offers a wide array of services, including high-speed connectivity, cloud computing, cybersecurity, Internet of Things (IoT), and managed services. Their mission is to support organizations in their digital transformation journey by enhancing operational efficiency, improving customer experience, and maintaining a competitive edge in a rapidly changing digital environment.

Orange Business combines deep technological expertise with a customer-centric approach, ensuring that each solution is customized to meet the specific needs of their clients. Their commitment to innovation and excellence makes them a trusted partner for businesses seeking to thrive in the digital age.

PLATINUM PARTNERS
GOLD PARTNERS

 

SILVER PARTNER

BRONZE PARTNERS

HACKING VILLAGE PARTNERS

EXHIBITORS

VIP LOUNGE POWERED BY
ORGANIZER
INTERNATIONAL COMMUNITY PARTNERS
MEDIA PARTNERS

Add Your Heading Text Here