PacketCTF
Learn Network Forensics with PacketCTF!
Have you ever wanted to learn more about network traffic and network forensics? Come play PacketCTF!
PacketCTF is a capture the flag (CTF) game using packet capture files (pcaps). Participants will download and analyze pcaps using Wireshark to answer questions on the gameboard. PacketCTF uses a jeopardy-style gameboard. Questions and collaboration are encouraged, but players will compete as individuals (no teams please).
Wireshark skills will be demonstrated throughout the workshop and prizes will be awarded for top finishers.
This event is for all skill levels. A computer running Wireshark is required to play. All required pcap files will be provided.
Workshop
5 Feb 2022 2:00 PM - 4:00 PMLearn Network Forensics with PacketCTF!
Have you ever wanted to learn more about network traffic and network forensics? Come play PacketCTF!
PacketCTF is a capture the flag (CTF) game using packet capture files (pcaps). Participants will download and analyze pcaps using Wireshark to answer questions on the gameboard. PacketCTF uses a jeopardy-style gameboard. Questions and collaboration are encouraged, but players will compete as individuals (no teams please).
Wireshark skills will be demonstrated throughout the workshop and prizes will be awarded for top finishers.
This event is for all skill levels. A computer running Wireshark is required to play. All required pcap files will be provided.
Jeremy Pierson
Program Architect - CompuNet Inc.
Infosec Professional, Hackercamp Founder, DC801 grey beard, Packet Janitor and Raconteur.
Workshop: Pivoting, Tunneling, and Redirection Master Class
Pivoting, tunneling, and redirection are essential skills that separate the junior and senior operators in the offensive security landscape. This workshop describes various techniques used to creatively route traffic through multiple network segments. Various tools and techniques will be discussed and demonstrated. Attendees will be able to practice these skills in a provided cyber range during and after the workshop. These are essential skills for every pentester, bug bounty hunter, and red team operator. But that's not all! Defenders will learn techniques for detecting this sort of suspicious traffic.
Workshop
5 Feb 2022 10:00 AM - 12:00 PMPivoting, tunneling, and redirection are essential skills that separate the junior and senior operators in the offensive security landscape. This workshop describes various techniques used to creatively route traffic through multiple network segments. Various tools and techniques will be discussed and demonstrated. Attendees will be able to practice these skills in a provided cyber range during and after the workshop. These are essential skills for every pentester, bug bounty hunter, and red team operator. But that's not all! Defenders will learn techniques for detecting this sort of suspicious traffic.
Barrett Darnell
Security Researcher and Experiential Learning Lead with Threat Simulations
@pwnEIP
Barrett Darnell is a Security Researcher and Experiential Learning Lead with Threat Simulations, and a Certified Instructor for SANS. Previously he was a Managing Senior Operator at Bishop Fox, a security firm providing professional and managed services to the Fortune 1000, global financial institutions, and high-tech startups. Prior to Bishop Fox, he served as an exploitation operator in the US Department of Defense's most elite computer network exploitation (CNE) unit. As a top-rated military officer, Barrett led an offensive operations team in the US Air Force's premier selectively-manned cyber attack squadron.
Barrett holds a B.S. in Computer Science from Washington State University and a M.S. in Software Engineering from the University of West Florida. In addition Barrett also holds various industry certifications including the CISSP, GXPN, GPEN, GREM, GWAPT, GCED, GCIH, GCIA, GCTI, GMON, GAWN, and GSEC.
Workshop: Security Analytics for the Rest of Us
What exactly is security analytics? Quite simply, it's leveraging large data sets through queries and visualization. And in security…we have a lot of data! This lab will introduce the attendee to tips, tricks, and other magic to get the information out of data that helps a security organization specifically get the value out of log data.
Workshop
5 Feb 2022 9:30 AM - 12:30 PMWhat exactly is security analytics? Quite simply, it's leveraging large data sets through queries and visualization. And in security…we have a lot of data! This lab will introduce the attendee to tips, tricks, and other magic to get the information out of data that helps a security organization specifically get the value out of log data.
Kristy Westphal
VP Security Operations
Kristy Westphal is a versatile information technology professional with specific experience in providing advisory and management services in the area of information security and risk is currently employed as the Vice President, Security Operations at a financial services company. Specializing in leadership and program development, her specific expertise in security areas includes process analysis, risk assessments, security awareness programs, operating system security, network security, incident handling, vulnerability analysis, and policy development.
Workshop: Practical Dark Web Hunting using Automated Scripts
How can you effectively hunt data from the dark web using scripts? How can you circumvent scraping defenses on the dark web? How can you automate your scripts? If you are curious about the answers to these questions and want to learn how to write automated scripts for this task effectively, then this workshop is for you. There are many forums and marketplaces on the dark web where actors buy, sell, and trade goods and services like databases, exploits, trojans, ransomware, etc. Collecting data from the dark web can help any organization identify and detect risks that may arise due to their assets being sold on the dark web. In this workshop, you will learn why collecting data from the dark web is essential, what open-source tools you can use to collect these data, how you can create your tools & scripts, and automating your script for effective collection. The workshop's primary focus will be on circumventing defenses put by forums & markets on the dark web against scraping.
Prerequisites:
Basic scripting in python
Knowledge of using VMs
Knowledge of using Linux machines
Basics of Dark Web
Workshop
4 Feb 2022 2:30 PM - 4:30 PMHow can you effectively hunt data from the dark web using scripts? How can you circumvent scraping defenses on the dark web? How can you automate your scripts? If you are curious about the answers to these questions and want to learn how to write automated scripts for this task effectively, then this workshop is for you. There are many forums and marketplaces on the dark web where actors buy, sell, and trade goods and services like databases, exploits, trojans, ransomware, etc. Collecting data from the dark web can help any organization identify and detect risks that may arise due to their assets being sold on the dark web. In this workshop, you will learn why collecting data from the dark web is essential, what open-source tools you can use to collect these data, how you can create your tools & scripts, and automating your script for effective collection. The workshop's primary focus will be on circumventing defenses put by forums & markets on the dark web against scraping.
Prerequisites:
Basic scripting in python
Knowledge of using VMs
Knowledge of using Linux machines
Basics of Dark Web
Please follow the instructions here to prepare for the workshop.
Apurv Singh Gautam
Threat Researcher at Cyble
@ASG_Sc0rpi0n
https://apurvsinghgautam.me
Apurv Singh Gautam works as a Threat Researcher at Cyble. He commenced work in Threat Intel 3 years ago. He works on hunting threats from the surface and dark web by utilizing OSINT, SOCMINT, and HUMINT. He is passionate about giving back to the community and has already conducted several talks and seminars in conferences like SANS, Defcon, BSides, local security meetups, schools, and colleges. He loves volunteering with Station X to help students make their way in Cybersecurity. He looks forward to the end of the day to play and stream one of the AAA games Rainbow Six Siege.
Workshop: Mobile Security
From smartphones to tablets to watches, users are relying more and more on the convenience of mobile technology. Organizations must meet this growing trend with greater security measures to support critical business functions and protect sensitive data on enterprise devices. Mobile architectures, applications, networks and services must all be developed and managed in compliance with the oversight of a strong IT workforce.
This course provides an in-depth technical overview of the security features and limitations of modern mobile operating systems, including the top risks and vulnerabilities, every IT professional needs to know.
Workshop
4 Feb 2022 10:00 AM - 12:00 PMFrom smartphones to tablets to watches, users are relying more and more on the convenience of mobile technology. Organizations must meet this growing trend with greater security measures to support critical business functions and protect sensitive data on enterprise devices. Mobile architectures, applications, networks and services must all be developed and managed in compliance with the oversight of a strong IT workforce.
This course provides an in-depth technical overview of the security features and limitations of modern mobile operating systems, including the top risks and vulnerabilities, every IT professional needs to know.
What you will learn
· Mobile application security measures
· Models to develop and secure Android applications
· Security detection and measures in iOS
· Trends in mobile device management (MDM)
We recommend that you have the equivalent of a BS in computer science, or a background in cybersecurity. Workstation with Android Studio and Android Device. Workstation with Xcode and iOS Device.
Himanshu Dwivedi
CEO of Data Theorem
@MSAdministrator
Himanshu Dwivedi is the CEO of Data Theorem, Inc., an application security company focusing on API Security (RESTful & GraphQL), mobile apps (iOS &Android), Cloud Apps (Serverless), and Single Page WebApps (SPAs). Himanshu has been an avid start-up entrepreneur since 1999, where he and 3 friends started the west coast office of @stake, an information security firm that was later acquired by Symantec. In 2004, Himanshu co-founded iSEC Partners, an application security company that was acquired by the NCC Group in 2010. Himanshu has several publications, including six different books (Mobile Application Security, Hacking VoIP, Hacking Exposed: Web 2.0, Hacker’s Challenge 3, Storage Security, and Implementing SSH) as well as the owner of one patent (Patent number 7849504). He has also presented at numerous conferences, including 6-time BlackHat speaker. Himanshu received a B.S. from the Carlson School of Management (University of Minnesota), where he was awarded the Tomato Can Loving Cup Award, which is given to the school’s top graduating student.