SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
More visibility. Most (if not, every?) cybersecurity professional will tell you they need more visibility into the threat landscape, but also their own security posture. Join SANS Analyst, Jake Williams and Chas Clawson, CTO for security with Sumo Logic, as they talk about the importance of correlating security alerts across your entire cloud and on-prem environment, and enriching with threat intelligence and other feeds for context and improving threat investigations.
OSINTという言葉をご存知でしょうか?OSINTとは「Open Source Intelligence」を略した用語で、主に情報セキュリティの世界で使われています。インターネットをはじめとする多くの情報源からデータを収集し、分析・精査・取捨選択を行い、特定の個人やシステム、組織などについての調査を行う手法です。今回は、OSINTの基本的な要素についてご紹介した後、いくつかのデータ収集・探索・分析手法のデモを行い、押さえておくべき技術やツール、トレーニングについてもご紹介します。
Do you know what OSINT is?OSINT is an abbreviation for "Open Source Intelligence" and is mainly used in the information security world. It is a method of collecting data from many sources, including the Internet, and analyzing, scrutinizing, and discarding the data to conduct research on specific individuals, systems, or organizations.
Year after year successful phishing attacks on end users and system administrators are found to be the factor that enables over 80% damaging security incidents. This points out the need for two key security initiatives: replacing reusable passwords with multifactor authentication and making users less likely to fall for fraudulent messages.
In The 2021 State of Enterprise Breaches, Forrester® found that enterprises spend a median of 37 days and a mean of $2.4 million to find and recover from a breach.
A lot of offensive security professionals have experience weaponizing simple vulnerabilities, but may not have worked much with bug discovery. Join Jim Shewmaker and Stephen Sims as they talk through fuzzing concepts and methodology, and then jump into a demonstration on setting up a modern fuzzing harness. What should you fuzz for? What types of fuzzing is there? How do you know if a bug is weaponizable? We’ll aim to answer these questions and more in this one hour session.
Red Teamなどで働く攻撃技術の専門家の方であっても、既知の脆弱性を利用して侵入を行った経験はあるものの、自身で脆弱性の発見に取り組んだことのある方はそれほど多くありません。Jim ShewmakerとStephen Simsはファジングのコンセプトと具体的な手法について解説し、最新のファジング技術のデモを行います。何をファジングするべきか、どのような種類があるのか、どのようにそのバグを悪用するのかなどの質問を1時間のセッションでカバーしていきます。
Vulnerability management can at times seem like a problem with no solution. While there is no simple solution to vulnerability management and our work will never be done, there are solutions, and we can successfully reduce the vulnerabilities in our environment to a much more manageable level. Every week will bring new vulnerabilities, but with the right processes and procedures, out technology and development organizations will know how to respond. The biggest secret to vulnerability management is recognizing that vulnerability management isn’t the problem. Join us to discover the secret to vulnerability management.
An organized, full-coverage risk register can maximize your cybersecurity resources while improving organizational security. Without including third-party risks, however, even the best risk register can fail to stop security incidents. Your risk framework needs to map to internal and external gaps to identify weaknesses and ensure complete coverage.
Let’s face it – analysts have far too much data these days. We know how complex the modern enterprise is getting with today’s organizations needing to scale hybrid environments across the globe with a complex remote workforce. Security analysts are charged with protecting these complex environments. However, each new element brings even more data to the security team.
The Domain Name System (DNS) is essentially the central nervous system of the internet—everyone needs it to work because without DNS services, digital business would come to a halt. Cybercriminals know this, too, and use DNS services to launch their attacks while they simultaneously attack the DNS services of their targets.
Lateral movement allows attackers to damage and steal information from an entire network once they gain access to one (usually the most vulnerable) entry point. Microsegmentation solves this problem by dividing a network into very small regions called microsegments, usually up to a segment per machine. However, if implemented incorrectly, it can be time-consuming, expensive, difficult to manage, and ineffective. Join Nicholas DiCola, VP of Customers at Zero Networks, and Aaron J. Goodwin, CISO at B. Riley Financial, as they share everything you need to know to effectively utilize microsegmentation for maximum network security and minimize the risk of attacks – including best practices, use cases, and the most easily deployable solutions to keep your organization safe.