Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Black Hat USA
August 1-6, 2020
Las Vegas, NV, USA
Black Hat Asia
September 29 - October 2, 2020
Singapore
Black Hat Europe
November 9-12, 2020
London UK
6/5/2017
12:00 PM
Black Hat Staff
Black Hat Staff
Event Updates
50%
50%

Black Hat USA 2017:
Data Forensices and Incident Response Roadmap

Strong data forensics and incident response capabilities are critical for agile breach detection and mitigation. Challenges of multiple access points, the influx of mobile and connected devices and the large amount of resulting data makes this an arduous task. Build these highly sought after skills at Black Hat USA with the Data Forensics and Incident Response track

See a few of the highly anticipated Data Forensics and Incident Response Trainings, Briefings and Arsenal tools below:

Deep dive into the fundamentals of forensics with Digital Forensics & Incident Response. Trainers use real-world investigations to complement explanations of theory and process for extensive understanding and skill development. Over the course of four days, students gain comprehensive knowledge in file system theory, application analysis, email and photo forensics, timelining, event log review, and more for a complete induction into DFIR for Windows 8, Windows 10 and other operating systems.

Train in the latest Windows investigation tools with Windows Enterprise Incident Response: Black Hat Edition. Experimental labs and simulated attacks offer direct experience manipulating Windows-based systems and servers while providing adaptable techniques that can be used on any system. Move from initial analysis and querying to discovery and response in single system and enterprise environments. Course modules cover the unique tools and methodologies for analysis, documentation and dissemination of breach processes and reconciliations to provide a holistic view of the threat landscape.

Network Forensics: Continuous Monitoring And Instrumentation lends the tools and know-how to distill and preserve network-based evidence in a safe, isolated environment. Build upon your knowledge of TCP/IP networking and Linux systems to prevent social engineering hacks on a network scale and receive a fully-loaded, bootable forensics workstation, designed by network forensics experts exclusively for Network Forensics students.

Revoke-Obfuscation: PowerShell Obfuscation Detection (And Evasion) Using Science addresses PowerShell vulnerabilities and opportunities for evasion of embedded securities and malicious usage. While PowerShell is equipped with anti-malware detection tools, multiple evasion routes still make compromise possible. Researches introduce Revoke-Obfuscation, a PowerShell framework that utilizes statistical analysis, character distribution and command invocation checks and release new techniques for detecting obfuscation at Black Hat USA.

Ochko123 - How the Feds Caught Russian Mega-Carder Roman Seleznev shares methods used to track Seleznev, the hacker sentenced to 27 years in jail for a series of cyber schemes that resulted in over $169 million dollars in losses for US Businesses. Tools used to capture evidence and processes investigators took will be illuminated, modeling how digital footprints can be tracked, what access the federal governments have and tools the NSA uses.

Copious amounts of data complicate incident detection and response. Amplify your forensic assessments and response abilities with open-source tools presented at Black Hat USA Arsenal. CyBot - Open Source Threat Intelligence Chat Bot aggregates data from multiple endpoints for less than $35. Developers saw a need for a community-sourced threat intel repository that is customizable for individual organization needs. Likewise, DefPloreX: A Machine-Learning Toolkit for Large-scale eCrime Forensics is adaptable and combines data from open-source libraries using machine-learning and visualization techniques to provide high-level descriptions of real-time information on incidents, breaches, attacks and vulnerabilities. Also on display at Black Hat USA Arsenal, Yalda –Automated Bulk Intelligence Collection helps scale your data mining with automated scanning, testing and cataloging files.

For a comprehensive overview of everything Black Hat USA 2017 has to offer, visit blackhat.com/us-17. Register by July 7 to save on your Briefings pass and join us at Mandalay Bay Convention Center in Las Vegas, Nevada, July 22-27, 2017

 

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/6/2020
Introducing 'Secure Access Service Edge'
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  7/3/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5604
PUBLISHED: 2020-07-09
Android App 'Mercari' (Japan version) prior to version 3.52.0 allows arbitrary method execution of a Java object by a remoto attacker via a Man-In-The-Middle attack by using Java Reflection API of JavaScript code on WebView.
CVE-2020-5974
PUBLISHED: 2020-07-08
NVIDIA JetPack SDK, version 4.2 and 4.3, contains a vulnerability in its installation scripts in which permissions are incorrectly set on certain directories, which can lead to escalation of privileges.
CVE-2020-15072
PUBLISHED: 2020-07-08
An issue was discovered in phpList through 3.5.4. An error-based SQL Injection vulnerability exists via the Import Administrators section.
CVE-2020-15073
PUBLISHED: 2020-07-08
An issue was discovered in phpList through 3.5.4. An XSS vulnerability occurs within the Import Administrators section via upload of an edited text document. This also affects the Subscriber Lists section.
CVE-2020-2034
PUBLISHED: 2020-07-08
An OS Command Injection vulnerability in the PAN-OS GlobalProtect portal allows an unauthenticated network based attacker to execute arbitrary OS commands with root privileges. An attacker requires some knowledge of the firewall to exploit this issue. This issue can not be exploited if GlobalProtect...