Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Black Hat USA
August 1-6, 2020
Las Vegas, NV, USA
Black Hat Asia
September 29 - October 2, 2020
Singapore
Black Hat Europe
November 9-12, 2020
London UK
6/5/2017
12:00 PM
Black Hat Staff
Black Hat Staff
Event Updates
50%
50%

Black Hat USA 2017:
Data Forensices and Incident Response Roadmap

Strong data forensics and incident response capabilities are critical for agile breach detection and mitigation. Challenges of multiple access points, the influx of mobile and connected devices and the large amount of resulting data makes this an arduous task. Build these highly sought after skills at Black Hat USA with the Data Forensics and Incident Response track

See a few of the highly anticipated Data Forensics and Incident Response Trainings, Briefings and Arsenal tools below:

Deep dive into the fundamentals of forensics with Digital Forensics & Incident Response. Trainers use real-world investigations to complement explanations of theory and process for extensive understanding and skill development. Over the course of four days, students gain comprehensive knowledge in file system theory, application analysis, email and photo forensics, timelining, event log review, and more for a complete induction into DFIR for Windows 8, Windows 10 and other operating systems.

Train in the latest Windows investigation tools with Windows Enterprise Incident Response: Black Hat Edition. Experimental labs and simulated attacks offer direct experience manipulating Windows-based systems and servers while providing adaptable techniques that can be used on any system. Move from initial analysis and querying to discovery and response in single system and enterprise environments. Course modules cover the unique tools and methodologies for analysis, documentation and dissemination of breach processes and reconciliations to provide a holistic view of the threat landscape.

Network Forensics: Continuous Monitoring And Instrumentation lends the tools and know-how to distill and preserve network-based evidence in a safe, isolated environment. Build upon your knowledge of TCP/IP networking and Linux systems to prevent social engineering hacks on a network scale and receive a fully-loaded, bootable forensics workstation, designed by network forensics experts exclusively for Network Forensics students.

Revoke-Obfuscation: PowerShell Obfuscation Detection (And Evasion) Using Science addresses PowerShell vulnerabilities and opportunities for evasion of embedded securities and malicious usage. While PowerShell is equipped with anti-malware detection tools, multiple evasion routes still make compromise possible. Researches introduce Revoke-Obfuscation, a PowerShell framework that utilizes statistical analysis, character distribution and command invocation checks and release new techniques for detecting obfuscation at Black Hat USA.

Ochko123 - How the Feds Caught Russian Mega-Carder Roman Seleznev shares methods used to track Seleznev, the hacker sentenced to 27 years in jail for a series of cyber schemes that resulted in over $169 million dollars in losses for US Businesses. Tools used to capture evidence and processes investigators took will be illuminated, modeling how digital footprints can be tracked, what access the federal governments have and tools the NSA uses.

Copious amounts of data complicate incident detection and response. Amplify your forensic assessments and response abilities with open-source tools presented at Black Hat USA Arsenal. CyBot - Open Source Threat Intelligence Chat Bot aggregates data from multiple endpoints for less than $35. Developers saw a need for a community-sourced threat intel repository that is customizable for individual organization needs. Likewise, DefPloreX: A Machine-Learning Toolkit for Large-scale eCrime Forensics is adaptable and combines data from open-source libraries using machine-learning and visualization techniques to provide high-level descriptions of real-time information on incidents, breaches, attacks and vulnerabilities. Also on display at Black Hat USA Arsenal, Yalda –Automated Bulk Intelligence Collection helps scale your data mining with automated scanning, testing and cataloging files.

For a comprehensive overview of everything Black Hat USA 2017 has to offer, visit blackhat.com/us-17. Register by July 7 to save on your Briefings pass and join us at Mandalay Bay Convention Center in Las Vegas, Nevada, July 22-27, 2017

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9498
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
CVE-2020-3282
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
CVE-2020-5909
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
CVE-2020-5910
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
CVE-2020-5911
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.