Black Hat USA 2017:
Data Forensics and Incident Response Roadmap
Deep dive into the fundamentals of forensics with Digital Forensics & Incident Response. Trainers use real-world investigations to complement explanations of theory and process for extensive understanding and skill development. Over the course of four days, students gain comprehensive knowledge in file system theory, application analysis, email and photo forensics, timelining, event log review, and more for a complete induction into DFIR for Windows 8, Windows 10 and other operating systems.
Train in the latest Windows investigation tools with Windows Enterprise Incident Response: Black Hat Edition. Experimental labs and simulated attacks offer direct experience manipulating Windows-based systems and servers while providing adaptable techniques that can be used on any system. Move from initial analysis and querying to discovery and response in single system and enterprise environments. Course modules cover the unique tools and methodologies for analysis, documentation and dissemination of breach processes and reconciliations to provide a holistic view of the threat landscape.
Network Forensics: Continuous Monitoring And Instrumentation lends the tools and know-how to distill and preserve network-based evidence in a safe, isolated environment. Build upon your knowledge of TCP/IP networking and Linux systems to prevent social engineering hacks on a network scale and receive a fully-loaded, bootable forensics workstation, designed by network forensics experts exclusively for Network Forensics students.
Revoke-Obfuscation: PowerShell Obfuscation Detection (And Evasion) Using Science addresses PowerShell vulnerabilities and opportunities for evasion of embedded securities and malicious usage. While PowerShell is equipped with anti-malware detection tools, multiple evasion routes still make compromise possible. Researches introduce Revoke-Obfuscation, a PowerShell framework that utilizes statistical analysis, character distribution and command invocation checks and release new techniques for detecting obfuscation at Black Hat USA.
Ochko123 - How the Feds Caught Russian Mega-Carder Roman Seleznev shares methods used to track Seleznev, the hacker sentenced to 27 years in jail for a series of cyber schemes that resulted in over $169 million dollars in losses for US Businesses. Tools used to capture evidence and processes investigators took will be illuminated, modeling how digital footprints can be tracked, what access the federal governments have and tools the NSA uses.
Copious amounts of data complicate incident detection and response. Amplify your forensic assessments and response abilities with open-source tools presented at Black Hat USA Arsenal. CyBot - Open Source Threat Intelligence Chat Bot aggregates data from multiple endpoints for less than $35. Developers saw a need for a community-sourced threat intel repository that is customizable for individual organization needs. Likewise, DefPloreX: A Machine-Learning Toolkit for Large-scale eCrime Forensics is adaptable and combines data from open-source libraries using machine-learning and visualization techniques to provide high-level descriptions of real-time information on incidents, breaches, attacks and vulnerabilities. Also on display at Black Hat USA Arsenal, Yalda –Automated Bulk Intelligence Collection helps scale your data mining with automated scanning, testing and cataloging files.
For a comprehensive overview of everything Black Hat USA 2017 has to offer, visit blackhat.com/us-17. Register by July 7 to save on your Briefings pass and join us at Mandalay Bay Convention Center in Las Vegas, Nevada, July 22-27, 2017