SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
Have you heard that SANS has a new Advanced Python Automation class? Are you interested in trying out some of the content? Join us for this workshop where Senior SANS Instructor and course author Mark Baggett will deliver the first hour and a half of content. But wait, isn't the first hour and a half always introductions and no real hands on material? Maybe in other classes but not in this one. Come check it out!
The ICS/OT community has long suffered from a lack of insight into cyber threats, vulnerabilities, and incident response observations. The annual Dragos ICS/OT Cybersecurity Year in Review provides a comprehensive look at the events that shaped the ICS/OT community and the current threat landscape. It also reports on how the community is performing, and surfaces areas of improvement needed to provide safe and reliable operations.
Surge in infostealer malware in recent months has allowed threat actors to gain access to victim machines. It has become very common for threat actors to spend time in the target environment, harvest confidential information, gain better understanding about the victim's environment and tailor the attack to impose maximum damage, move laterally and escalate privileges to maintain persistence and maximize their revenue.
With more and more companies moving their applications and infrastructure to the cloud, the potential attack surface has expanded dramatically. Attackers know they have a window of opportunity and have become savvier at carrying out advanced cloud and container attacks. Within seconds of entering your cloud environment, they can begin conducting cryptomining, supply chain attacks, and other forms of advanced attacks. Without the ability to detect and respond to these attacks in real-time, it’s almost impossible to stop them from causing significant damage.
ChatGPT was launched by OpenAI in November 2022. Since then, it has been the subject of many discussions. ChatGPT itself is one application that was built on top of OpenAI’s GPT-3 models. We can programmatically interact with these models via OpenAI API. In this talk, we will go beyond ChatGPT and discuss OpenAI API, fine-tuning our own models for specific tasks, and building security applications on top of them. We will be building a sample application that interprets human requests and performs the basic tasks requested.
Whether performed by an insider threat, or by an external threat that's managed to get a foothold inside, the next step in the attacker's dance is usually the pivot: moving from one host to another to expand control or pillage a particular resource. In this talk we will look at some of the more commonly encountered pivot techniques to help you understand, detect, and deter malicious, lateral movement within your network.
Data recovery is probably one of the most misunderstood technologies in the computer world. Myths abound about how to recover data, with freezing your hard drive being a very common one of these myths. This presentation will get down to the nuts and bolts of data recovery, including the actual internal workings of the drive, what to do when a drive motor fails, when read/write heads fail, and when programming turns the hard drive into a brick. This is presented in layman’s terms so it is very easy to understand. We will be showcasing the best software to use for easier recoveries, as well as live demonstrations of some of our lab equipment for advanced data recovery! We will be discussing rotational media (spinning hard drives), SSD hard drive recovery, thumb drives, cellular, and monolith recovery. By the end of this lecture, you will be much more knowledgeable on how hard drives work, how data lives, and how to recover it when all seems lost.
DDoS attacks are back in the headlines and disrupting businesses across the globe. Though these threats aren’t new, they are evolving and increasing in size, complexity, and frequency. During this session, we will uncover attack trends from the last year, and discuss what to expect in 2023.
What are the critical skills that extremely successful infosec professionals need and how can we develop these? Obviously, technology matters but it's not just about technology. In Ted Demopoulos' research, talking to, interviewing, and basically spending time with infosec professionals that are so successful that the moniker “Rock Star" is sometimes entirely appropriate, he has distilled 5 critical professional, and sometimes, life skills. This talk covers these 5 skills with plenty of practice advice.
Eric Capuano & Whitney Champion, co-founders of Recon InfoSec, share their experience building and running cyber ranges for delivering training and competitions to 1000s of students around the world. The team at Recon is well known for hosting their OpenSOC Blue Team CTF competition annually at conferences like DEF CON, providing hands-on experiential learning to cybersecurity practitioners of all skill levels. In this talk, they will share some of their approaches, methodologies, and lessons learned with running live-fire cyber ranges for high fidelity training.
InfoSecの協同設立者であるEric CapuanoとWhitney Championは、世界中の何千人もの受講者向けにトレーニングや大会を提供するために、サイバーレンジの構築・運用の経験を共有します。Reconのチームは、毎年開催されているDEF CONなどカンファレンスで、OpenSOC Blue Team CTFを開催し、様々なスキルレベルを持つサイバーセキュリティの技術者向けにハンズオンの経験を提供することで知られています。この講演では、レベルの高いサイバーレンジを運用するにあたってのアプローチや手法を共有します。
Designed for security leaders tasked with managing a growing attack surface, the SANS Attack Surface Management Solutions Forum will take place on March 8, 2023 as a virtual event. This half-day event will bring together thought leaders, subject matter experts and practitioners to discuss, share and discover best practices for addressing the operational challenges associated with organizations’ ever-growing attack surfaces. Contributing factors would be: cloud migrations, M&A, shadow IT and the rise of ransomware attacks.Attendees will gain valuable lessons on how to operationalize attack surface management in order to improve their threat intelligence, vulnerability management and offensive security programs.Topics covered will include:• A Deep Dive into Attack Surface Management• The Current State of Regulations in Cybersecurity• How to Evaluate ASM Tools• What Attack Surface Management looks like in the wild• Key trends in Hacker behaviors• Advice from SANS Experts on attack surface management