There will be plenty of take-home labs for additional practice. Labs start out easy and quickly progress in difficulty. Attendees will then have hands-on time in the lab to search for Indicators of Compromise (IOCs) and TTPs utilizing staged packet capture files. Throughout the workshop, we’ll examine what different attacks and malware look like while using Wireshark. This workshop will begin with a brief introduction to Wireshark and other Network Security Monitoring (NSM) tools/concepts. This workshop will take attendees’ Wireshark skills to the next level with a heavy emphasis on incident response, threat hunting, and identifying anomalous network traffic. Hunting Evil with Wireshark Michael Wylie, MBA, CISSP, Sr. She regularly speaks and holds classes at security conferences such as Defcon, Hackfest, and BSides. She is a published author, "Burp Suite Cookbook", a developer of mobile apps, such as the “Burp Tool Buddy,” and is a Pluralsight content creator, "Burp Suite for Beginners/Advanced/Writing Plugins". Sunny has more than 25 years of hands-on software programming, architecture and security experience and holds a Doctor of Science in Cybersecurity. She provides secure coding classes, creates software, and performs penetration testing against web/API and mobile applications. Sunny Wear (Twitter: is a Web Security Architect and Penetration Tester. Students will learn Injections attacks such as Cross-site Scripting and SQL Injection attacks, brute-forcing tactics, and optimization techniques for Burp Suite including configurations and macros.ĭr. Gain hands-on experience learning how to perform web application penetration testing in this two-hour workshop with the author of the Burp Suite Cookbook, Dr. Sunny Wear, Web Security Architect and Penetration Tester Workshops Abstracts and Bios Web App Penetration Testing Workshop Dr. Intrusion Analysis and Threat Hunting with Suricata To purchase workshop tickets, go to Friday, Aug(all times PDT ) Not only glory, but prizes await those that emerge victorious from this upgraded labyrinth, so only the best prepared and battle hardened will escape the crucible. Tear through the challenges, traverse a hostile enterprise class network, and diligently analyze what is found in order to make it out unscathed. Capture The PacketĬome compete in the world's most challenging cyber defense competition based on the Aries Security Cyber Range. Take the next step in your journey towards network mastery in a friendly environment still focused on learning and take another step closer to preparing yourself for the competitive environment of Capture The Packet. Looking to upgrade your skills or see how you would fare in Capture The Packet? Come check out what Packet Detective has to offer! A step up in difficulty from Packet Inspector, Packet Detective will put your network hunting abilities to the test with real-world scenarios at the intermediate level. Using a license of the world famous Capture The Packet engine from Aries Security, we have created a unique way to teach hands-on skills in a controlled real-time environment. Do you want to understand the techniques people use to tap into a network, steal passwords and listen to conversations? Packet Inspector is the place to develop these skills! For well over a decade, the Wall of Sheep has shown people how important it is to use end-to-end encryption to keep sensitive information like passwords private. The perfect introduction to network analysis, sniffing, and forensics. To purchase tickets to our workshops, go to Events and Contests The Packet Hacking Village at DEF CON 29 will be both in-person and virtual.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |