Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Black Hat Asia
March 26-29, 2019
Singapore
Black Hat USA
August 3-8, 2019
Las Vegas, NV, USA
Black Hat Europe
December 2-5, 2019
London UK
6/5/2017
12:00 PM
Black Hat Staff
Black Hat Staff
Event Updates
50%
50%

Black Hat USA 2017:
Data Forensices and Incident Response Roadmap

Strong data forensics and incident response capabilities are critical for agile breach detection and mitigation. Challenges of multiple access points, the influx of mobile and connected devices and the large amount of resulting data makes this an arduous task. Build these highly sought after skills at Black Hat USA with the Data Forensics and Incident Response track

See a few of the highly anticipated Data Forensics and Incident Response Trainings, Briefings and Arsenal tools below:

Deep dive into the fundamentals of forensics with Digital Forensics & Incident Response. Trainers use real-world investigations to complement explanations of theory and process for extensive understanding and skill development. Over the course of four days, students gain comprehensive knowledge in file system theory, application analysis, email and photo forensics, timelining, event log review, and more for a complete induction into DFIR for Windows 8, Windows 10 and other operating systems.

Train in the latest Windows investigation tools with Windows Enterprise Incident Response: Black Hat Edition. Experimental labs and simulated attacks offer direct experience manipulating Windows-based systems and servers while providing adaptable techniques that can be used on any system. Move from initial analysis and querying to discovery and response in single system and enterprise environments. Course modules cover the unique tools and methodologies for analysis, documentation and dissemination of breach processes and reconciliations to provide a holistic view of the threat landscape.

Network Forensics: Continuous Monitoring And Instrumentation lends the tools and know-how to distill and preserve network-based evidence in a safe, isolated environment. Build upon your knowledge of TCP/IP networking and Linux systems to prevent social engineering hacks on a network scale and receive a fully-loaded, bootable forensics workstation, designed by network forensics experts exclusively for Network Forensics students.

Revoke-Obfuscation: PowerShell Obfuscation Detection (And Evasion) Using Science addresses PowerShell vulnerabilities and opportunities for evasion of embedded securities and malicious usage. While PowerShell is equipped with anti-malware detection tools, multiple evasion routes still make compromise possible. Researches introduce Revoke-Obfuscation, a PowerShell framework that utilizes statistical analysis, character distribution and command invocation checks and release new techniques for detecting obfuscation at Black Hat USA.

Ochko123 - How the Feds Caught Russian Mega-Carder Roman Seleznev shares methods used to track Seleznev, the hacker sentenced to 27 years in jail for a series of cyber schemes that resulted in over $169 million dollars in losses for US Businesses. Tools used to capture evidence and processes investigators took will be illuminated, modeling how digital footprints can be tracked, what access the federal governments have and tools the NSA uses.

Copious amounts of data complicate incident detection and response. Amplify your forensic assessments and response abilities with open-source tools presented at Black Hat USA Arsenal. CyBot - Open Source Threat Intelligence Chat Bot aggregates data from multiple endpoints for less than $35. Developers saw a need for a community-sourced threat intel repository that is customizable for individual organization needs. Likewise, DefPloreX: A Machine-Learning Toolkit for Large-scale eCrime Forensics is adaptable and combines data from open-source libraries using machine-learning and visualization techniques to provide high-level descriptions of real-time information on incidents, breaches, attacks and vulnerabilities. Also on display at Black Hat USA Arsenal, Yalda –Automated Bulk Intelligence Collection helps scale your data mining with automated scanning, testing and cataloging files.

For a comprehensive overview of everything Black Hat USA 2017 has to offer, visit blackhat.com/us-17. Register by July 7 to save on your Briefings pass and join us at Mandalay Bay Convention Center in Las Vegas, Nevada, July 22-27, 2017

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
7 Tips for Infosec Pros Considering A Lateral Career Move
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2020
For Mismanaged SOCs, The Price Is Not Right
Kelly Sheridan, Staff Editor, Dark Reading,  1/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment:   It's a PEN test of our cloud security.
Current Issue
IT 2020: A Look Ahead
Are you ready for the critical changes that will occur in 2020? We've compiled editor insights from the best of our network (Dark Reading, Data Center Knowledge, InformationWeek, ITPro Today and Network Computing) to deliver to you a look at the trends, technologies, and threats that are emerging in the coming year. Download it today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7245
PUBLISHED: 2020-01-23
Incorrect username validation in the registration processes of CTFd through 2.2.2 allows a remote attacker to take over an arbitrary account after initiating a password reset. This is related to register() and reset_password() in auth.py. To exploit the vulnerability, one must register with a userna...
CVE-2019-14885
PUBLISHED: 2020-01-23
A flaw was found in the JBoss EAP Vault system in all versions before 7.2.6.GA. Confidential information of the system property's security attribute value is revealed in the JBoss EAP log file when executing a JBoss CLI 'reload' command. This flaw can lead to the exposure of confidential information...
CVE-2019-17570
PUBLISHED: 2020-01-23
An untrusted deserialization was found in the org.apache.xmlrpc.parser.XmlRpcResponseParser:addResult method of Apache XML-RPC (aka ws-xmlrpc) library. A malicious XML-RPC server could target a XML-RPC client causing it to execute arbitrary code. Apache XML-RPC is no longer maintained and this issue...
CVE-2020-6007
PUBLISHED: 2020-01-23
Philips Hue Bridge model 2.X prior to and including version 1935144020 contains a Heap-based Buffer Overflow when handling a long ZCL string during the commissioning phase, resulting in a remote code execution.
CVE-2012-4606
PUBLISHED: 2020-01-23
Citrix XenServer 4.1, 6.0, 5.6 SP2, 5.6 Feature Pack 1, 5.6 Common Criteria, 5.6, 5.5, 5.0, and 5.0 Update 3 contains a Local Privilege Escalation Vulnerability which could allow local users with access to a guest operating system to gain elevated privileges.