Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Black Hat USA
July 31 - August 5, 2021
Las Vegas, NV, USA
SecTor
November 4 - October 30, 2021
Toronto, ON, Canada
Black Hat Europe
November 8-11, 2021
Virtual Event
6/5/2017
12:00 PM
Black Hat Staff
Black Hat Staff
Event Updates
50%
50%

Black Hat USA 2017:
Data Forensices and Incident Response Roadmap

Strong data forensics and incident response capabilities are critical for agile breach detection and mitigation. Challenges of multiple access points, the influx of mobile and connected devices and the large amount of resulting data makes this an arduous task. Build these highly sought after skills at Black Hat USA with the Data Forensics and Incident Response track

See a few of the highly anticipated Data Forensics and Incident Response Trainings, Briefings and Arsenal tools below:

Deep dive into the fundamentals of forensics with Digital Forensics & Incident Response. Trainers use real-world investigations to complement explanations of theory and process for extensive understanding and skill development. Over the course of four days, students gain comprehensive knowledge in file system theory, application analysis, email and photo forensics, timelining, event log review, and more for a complete induction into DFIR for Windows 8, Windows 10 and other operating systems.

Train in the latest Windows investigation tools with Windows Enterprise Incident Response: Black Hat Edition. Experimental labs and simulated attacks offer direct experience manipulating Windows-based systems and servers while providing adaptable techniques that can be used on any system. Move from initial analysis and querying to discovery and response in single system and enterprise environments. Course modules cover the unique tools and methodologies for analysis, documentation and dissemination of breach processes and reconciliations to provide a holistic view of the threat landscape.

Network Forensics: Continuous Monitoring And Instrumentation lends the tools and know-how to distill and preserve network-based evidence in a safe, isolated environment. Build upon your knowledge of TCP/IP networking and Linux systems to prevent social engineering hacks on a network scale and receive a fully-loaded, bootable forensics workstation, designed by network forensics experts exclusively for Network Forensics students.

Revoke-Obfuscation: PowerShell Obfuscation Detection (And Evasion) Using Science addresses PowerShell vulnerabilities and opportunities for evasion of embedded securities and malicious usage. While PowerShell is equipped with anti-malware detection tools, multiple evasion routes still make compromise possible. Researches introduce Revoke-Obfuscation, a PowerShell framework that utilizes statistical analysis, character distribution and command invocation checks and release new techniques for detecting obfuscation at Black Hat USA.

Ochko123 - How the Feds Caught Russian Mega-Carder Roman Seleznev shares methods used to track Seleznev, the hacker sentenced to 27 years in jail for a series of cyber schemes that resulted in over $169 million dollars in losses for US Businesses. Tools used to capture evidence and processes investigators took will be illuminated, modeling how digital footprints can be tracked, what access the federal governments have and tools the NSA uses.

Copious amounts of data complicate incident detection and response. Amplify your forensic assessments and response abilities with open-source tools presented at Black Hat USA Arsenal. CyBot - Open Source Threat Intelligence Chat Bot aggregates data from multiple endpoints for less than $35. Developers saw a need for a community-sourced threat intel repository that is customizable for individual organization needs. Likewise, DefPloreX: A Machine-Learning Toolkit for Large-scale eCrime Forensics is adaptable and combines data from open-source libraries using machine-learning and visualization techniques to provide high-level descriptions of real-time information on incidents, breaches, attacks and vulnerabilities. Also on display at Black Hat USA Arsenal, Yalda –Automated Bulk Intelligence Collection helps scale your data mining with automated scanning, testing and cataloging files.

For a comprehensive overview of everything Black Hat USA 2017 has to offer, visit blackhat.com/us-17. Register by July 7 to save on your Briefings pass and join us at Mandalay Bay Convention Center in Las Vegas, Nevada, July 22-27, 2017

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Data Breaches Affect the Enterprise
Data breaches continue to cause negative outcomes for companies worldwide. However, many organizations report that major impacts have declined significantly compared with a year ago, suggesting that many have gotten better at containing breach fallout. Download Dark Reading's Report "How Data Breaches Affect the Enterprise" to delve more into this timely topic.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-23654
PUBLISHED: 2021-11-26
This affects all versions of package html-to-csv. When there is a formula embedded in a HTML page, it gets accepted without any validation and the same would be pushed while converting it into a CSV file. Through this a malicious actor can embed or generate a malicious link or execute commands via C...
CVE-2021-43785
PUBLISHED: 2021-11-26
@joeattardi/emoji-button is a Vanilla JavaScript emoji picker component. In affected versions there are two vectors for XSS attacks: a URL for a custom emoji, and an i18n string. In both of these cases, a value can be crafted such that it can insert a `script` tag into the page and execute malicious...
CVE-2021-43776
PUBLISHED: 2021-11-26
Backstage is an open platform for building developer portals. In affected versions the auth-backend plugin allows a malicious actor to trick another user into visiting a vulnerable URL that executes an XSS attack. This attack can potentially allow the attacker to exfiltrate access tokens or other se...
CVE-2021-41243
PUBLISHED: 2021-11-26
There is a Potential Zip Slip Vulnerability and OS Command Injection Vulnerability on the management system of baserCMS. Users with permissions to upload files may upload crafted zip files which may execute arbitrary commands on the host operating system. This is a vulnerability that needs to be add...
CVE-2021-41279
PUBLISHED: 2021-11-26
BaserCMS is an open source content management system with a focus on Japanese language support. In affected versions users with upload privilege may upload crafted zip files capable of path traversal on the host operating system. This is a vulnerability that needs to be addressed when the management...